[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #15251 [Core Tor/Tor]: Make tor support starting with 10.000 Tor Hidden Service



#15251: Make tor support starting with 10.000 Tor Hidden Service
------------------------------------------+--------------------------------
 Reporter:  naif                          |          Owner:  (none)
     Type:  task                          |         Status:  new
 Priority:  Low                           |      Milestone:  Tor:
                                          |  unspecified
Component:  Core Tor/Tor                  |        Version:  Tor:
                                          |  unspecified
 Severity:  Normal                        |     Resolution:
 Keywords:  tor-hs, scalability, tor-dos  |  Actual Points:
Parent ID:                                |         Points:  10
 Reviewer:                                |        Sponsor:
------------------------------------------+--------------------------------

Comment (by naif):

 Replying to [comment:13 asn]:
 > It's possible that 10k onion services on a single host will probably
 wreck your guard(s) because of the amount of introduction/HSDir circuits,
 even if mots of them are low/zero traffic.

 That's a thing, wondering if the Facebook-alike optimisation (where it
 does not require Server Location Anonimity) can help with that setup, or
 if it would require some different kind of of crypto-circuits-related
 aspects?



 >
 > > Each GlobaLeaks instance will have it's own HTTPS certificate enrolled
 and maintained automatically with LetsEncrypt and it's own Onion Service.
 >
 > I recently heard that LetsEncrypt can't make onion certs because they
 are DV, and not EV.

 Sorry, I meant having 2 channels: HTTPS (with letsencrypt on public IP)
 and Onion on Tor.

 Those will be used for such a national anticorruption platform, and for
 each single public agencies we will need to have the couple of an HTTPS
 URL and Onion URL.

 So those are independent.

 >
 > > If someone is going or willing to support Tor debugging to achieve
 that goal, we'll be more than happy.
 >
 > I'm interested in helping you with this, so that you achieve your goals
 without damaging the network. Perhaps we can do an IRC meeting or
 something?

 Perfect, if you can join #globaleaks channel there's evilaliv3 that's
 doing today some preliminary testing with 500 onion address, inserting 10
 onion address every 5 minutes, then trying to see what happen as we create
 a "network blackout" of few minutes.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15251#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs