[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #19625 [Core Tor/Tor]: Allow relays to set peering policy



#19625: Allow relays to set peering policy
----------------------------+-----------------------------------
 Reporter:  twim            |          Owner:
     Type:  project         |         Status:  needs_information
 Priority:  Medium          |      Milestone:
Component:  Core Tor/Tor    |        Version:
 Severity:  Normal          |     Resolution:
 Keywords:  needs-proposal  |  Actual Points:
Parent ID:                  |         Points:
 Reviewer:                  |        Sponsor:
----------------------------+-----------------------------------

Comment (by twim):

 Replying to [comment:1 yawning]:

 >  * Clients need to know this information when doing path selection, thus
 this information needs to be part of the descriptor/microdescriptor.  Most
 clients only fetch the latter, and those don't even have the full exit
 policy.  How will this impact bootstrapping overhead, particularly when
 relays start to do things like "block all the relays in the US because the
 NSA is spying on them from their orbital satellite platforms" leading to
 gigantic descriptors.

 True, as the network grows and quantum computers are on the way,
 descriptors are going to be huge. I don't think there is a way around it.

 >  * How would one guard against malicious relays using this mechanism to
 mount a partitioning attack.  More generically, currently clients are
 responsible for 100% of the path selection.  What is the
 security/anonymity impact of allowing potentially malicious relays to
 influence this.

 These relays can influence this right now and not be caught (we discussed
 this at tor-relays@).


 There was an idea at tor-dev@ discussion [1], that seems really nice and
 straightforward to me:

 Rob van der Hoeven:
 > Maybe a client can download all descriptors, but
 > only store a fixed number of (randomly selected) routers? This could be
 > a configuration option, something like: maxDescriptorStorageCount.

 The point is to do path selection *before* we need any paths. A client
 parses the consensus and picks relays in advance for all possible purposes
 since only small fraction of consensus is really used.
 For a passive adversary it looks like the client just downloads consensus,
 so there is no way to mount partitioning attack (all clients have the same
 consensus).
 Honestly I don't see any new attack surface with 'early path selection'.
 Maybe you are.


 [1] https://lists.torproject.org/pipermail/tor-dev/2016-May/010977.html

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19625#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs