[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #1855 [Tor Relay]: Project: design for UDP transport



#1855: Project: design for UDP transport
-------------------------+--------------------------------------------------
 Reporter:  arma         |          Owner:  sjmurdoch       
     Type:  enhancement  |         Status:  accepted        
 Priority:  normal       |      Milestone:  Tor: unspecified
Component:  Tor Relay    |        Version:                  
 Keywords:               |         Parent:                  
   Points:               |   Actualpoints:                  
-------------------------+--------------------------------------------------
Changes (by sjmurdoch):

  * status:  assigned => accepted


Old description:

> A popular topic over the years has been moving from TCP transport between
> Tor relays to UDP transport, and then maybe switching to some congestion
> control approach that better recognizes the real endpoints in the
> communication.
>
> We've been talking to Robert Watson and Bjoern A. Zeeb of the FreeBSD
> project about helping to fund them to port the FreeBSD network stack to
> user-space. Lately the user-space networking stack has seemed like the
> primary stumbling block.
>
> We really ought to have a better intuition about what we're going to
> actually *do* once that stumbling block is resolved.
>
> We should write a draft design doc and spec for a future version of Tor
> based on UDP transport. One main goal is to identify areas of uncertainty
> that need to be solved before such a system can be built and deployed.
> Another aspect of that goal is to identify and flesh out unsolved
> research questions, and pros and cons to various tradeoffs that designs
> like this have made. For example, should we do TCP-over-UDP pairwise, or
> end-to-end? Various research groups have very strong feelings, and often
> their recommendations conflict.
>
> We might draw on six pieces of background work for ideas:
>
> 1) Joel Reardon's thesis:
> http://freehaven.net/anonbib/#reardon-thesis
>
> 2) The old ZKS designs:
> http://freehaven.net/anonbib/#freedom2-arch
>
> 3) Zach Brown's Cebolla:
> http://freehaven.net/anonbib/#cebolla
> http://www.cypherspace.org/cebolla/
>
> 4) Camilo Viecco's UDP-Tor design:
> http://www.petsymposium.org/2008/hotpets/udp-tor.pdf
>
> 5) Csaba Kiraly's work:
> http://disi.unitn.it/locigno/preprints/TR-DISI-08-041.pdf
>
> 6) Marc Liberatore's proposal 100:
> https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/100-tor-
> spec-udp.txt
>
> The design should be sure to include a transition plan, and a plan for
> how to let clients who need blocking-resistance (e.g. they need to look
> like SSL on the wire) continue to use the network.

New description:

 A popular topic over the years has been moving from TCP transport between
 Tor relays to UDP transport, and then maybe switching to some congestion
 control approach that better recognizes the real endpoints in the
 communication.

 We've been talking to Robert Watson and Bjoern A. Zeeb of the FreeBSD
 project about helping to fund them to port the FreeBSD network stack to
 user-space. Lately the user-space networking stack has seemed like the
 primary stumbling block.

 We really ought to have a better intuition about what we're going to
 actually *do* once that stumbling block is resolved.

 We should write a draft design doc and spec for a future version of Tor
 based on UDP transport. One main goal is to identify areas of uncertainty
 that need to be solved before such a system can be built and deployed.
 Another aspect of that goal is to identify and flesh out unsolved research
 questions, and pros and cons to various tradeoffs that designs like this
 have made. For example, should we do TCP-over-UDP pairwise, or end-to-end?
 Various research groups have very strong feelings, and often their
 recommendations conflict.

 We might draw on six pieces of background work for ideas:

 1) Joel Reardon's thesis:
 http://freehaven.net/anonbib/#reardon-thesis

 2) The old ZKS designs:
 http://freehaven.net/anonbib/#freedom2-arch

 3) Zach Brown's Cebolla:
 http://freehaven.net/anonbib/#cebolla
 http://www.cypherspace.org/cebolla/

 4) Camilo Viecco's UDP-Tor design:
 http://www.petsymposium.org/2008/hotpets/udp-tor.pdf

 5) Csaba Kiraly's work:
 http://disi.unitn.it/locigno/preprints/TR-DISI-08-041.pdf

 6) Marc Liberatore's proposal 100:
 https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/100-tor-
 spec-udp.txt

 7) SHALON: Lightweight Anonymization based on Open Standards by Panchenko
 et al:
 http://lorre.uni.lu/~andriy/papers/shalon-icccn09.pdf

 The design should be sure to include a transition plan, and a plan for how
 to let clients who need blocking-resistance (e.g. they need to look like
 SSL on the wire) continue to use the network.

--

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1855#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs