25 tbreg relays in directory

Scott Bennett bennett at cs.niu.edu
Fri May 1 09:45:59 UTC 2009


     On Thu, 30 Apr 2009 16:59:58 -0400 Andrew Lewman <andrew at torproject.org>
wrote:
>On Mon, 27 Apr 2009 23:57:17 -0500 (CDT)
>Scott Bennett <bennett at cs.niu.edu> wrote:
>
>In general, these options seem a fine way to partition the tor
>network.  Possibly more so for new releases and arbitraging the time
>during which clients and relays upgrade. Tor clients already don't

     Well, the developers themselves did that a while back when they
cut off the non-V2Dir-capable clients and servers, right?

>trust the relays. The risk is possibly more to the relay operator than

     How so?  Does a client refuse to use a relay whose version is not
in the server-versions list distributed in the V3 consensus documents
or the V2 status documents?

>the tor clients using their relay.  It's their OS in most cases that's
>at risk, not so much the Tor network.  
>
>> 	b) tor clients will not choose relays whose versions do not
>> match a version listed in server-versions when choosing routes for
>> circuits. This could be implemented as additional code in
>> circuitbuild.c or it might be implemented more simply by having the
>> authorities refuse to give a "Valid" flag to such relays.
>
>An option to allow your client to only select from a list of relays
>running a version as agreed by the DA's as recommended seems the better
>of your a vs b.

     Well, yes, I thought quite a while before suggesting a), but also
realized that there can be quite a long delay and upheaval involved in
a change to the directory standard and protocol, so I suggested the use
of b) in the interim.  Suggestion a) is, in the long run, a better approach.
>
>We should stop talking about making the relay trust the client.  I
>don't think implementing a DRM scheme serves Tor in any way.  If you

     That was not me, FWIW.  However, I did suggest that a client not trust
*itself* if its own version were not listed in client-versions in the V3
consensus or the V2 status.

>think of Tor like TCP, then the whole discussion gets silly.  Tor is an
>anonymizing protocol on top of tcp/ip, for now.  Hidden services and

     Right.  It would be good to have an SCTP implementation of tor someday.

>such are example applications that use Tor, the protocol.
>
>Roger and I have had conversations about this thread in taxis, train
>stations, and the like as we've been traveling.  I'm sure he'll comment

     My goodness!  I had no idea that it would really generate much interest
among developers.  I only hoped so.

>at some point.
>
     I predict that will interesting. :-)


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************



More information about the tor-talk mailing list