[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r9951: TODO file updates w/ reputation brainstorming plus some thin (torflow/trunk)



Author: mikeperry
Date: 2007-04-14 01:00:21 -0400 (Sat, 14 Apr 2007)
New Revision: 9951

Modified:
   torflow/trunk/TODO
   torflow/trunk/metatroller.py
   torflow/trunk/nodemon.py
Log:
TODO file updates w/ reputation brainstorming plus some thing arma wants to
help bootstrapping of non-dirport routers.



Modified: torflow/trunk/TODO
===================================================================
--- torflow/trunk/TODO	2007-04-14 01:12:17 UTC (rev 9950)
+++ torflow/trunk/TODO	2007-04-14 05:00:21 UTC (rev 9951)
@@ -68,11 +68,29 @@
 - Design Reputation System (not for GSoC)
   - Emit some kind of penalty multiplier based on circuit/stream failure rate
     and the ratio of directory "observed" bandwidth vs avg stream bandwidth
-    - Add keyword to directory for clients to use instead of observed
-      bandwidth for routing decisions
-      - Make sure scanners don't listen to this keyword to avoid 
-        "Creeping Death" 
-    - Queue lengths from the node monitor can also figure into this penalty
-      multiplier
+	- Add keyword to directory for clients to use instead of observed
+	  bandwidth for routing decisions
+	  - Make sure scanners don't listen to this keyword to avoid "Creeping
+	    Death" 
+	- Queue lengths from the node monitor can also figure into this penalty
+	  multiplier
   - Figure out interface to report this and also BadExit determinations
-    - Probably involves voting among many scanners
+	- Probably involves voting among many scanners
+  - Justify this is worthwhile, sane, and at least as resistant as the current
+    Tor network to attack
+	- Does a reputation system make it easier for an adversary w/ X% of the
+	  network to influence it?
+	  - Preliminary: http://archives.seul.org/or/dev/Nov-2006/msg00004.html
+      - Sybil attacks
+	- What about clients that ignore the reputations? Can their behavior game
+	  the system, or are they just behaving suboptimally?
+      - First impressions: meh; suboptimal
+	- Does changings in ratings leak any information about clients? 
+	  - Does it influence their paths in predictable ways in a greater degree
+	    than bandwidth ranking already does?
+    - What about detecting the scan and giving better service? Time of day, 
+      source IP, exit IP?
+
+- Stopgap for bootstrapping
+  - push traffic through the 0.1.1.x with 0 dirport and earlier servers 
+    that claim less than 20KB traffic

Modified: torflow/trunk/metatroller.py
===================================================================
--- torflow/trunk/metatroller.py	2007-04-14 01:12:17 UTC (rev 9950)
+++ torflow/trunk/metatroller.py	2007-04-14 05:00:21 UTC (rev 9951)
@@ -24,7 +24,7 @@
 
 # TODO: Move these to config file
 control_host = "127.0.0.1"
-control_port = 9061
+control_port = 9051
 meta_host = "127.0.0.1"
 meta_port = 9052
 max_detach = 3
@@ -33,8 +33,8 @@
 # Use PathBuilder.schedule_selmgr instead.
 # (Modifying the arguments here is OK)
 __selmgr = PathSupport.SelectionManager(
-      pathlen=3,
-      order_exits=False,
+      pathlen=2,
+      order_exits=True,
       percent_fast=100,
       percent_skip=0,
       min_bw=1024,
@@ -709,6 +709,7 @@
         s.write("510 Integer expected\r\n")
     elif command == "SETEXIT":
       if arg:
+        # XXX: This is broken.
         # FIXME: Hrmm.. if teh user is a dumbass this will fail silently
         def notlambda(sm): sm.exit_name=arg
         h.schedule_selmgr(notlambda)

Modified: torflow/trunk/nodemon.py
===================================================================
--- torflow/trunk/nodemon.py	2007-04-14 01:12:17 UTC (rev 9950)
+++ torflow/trunk/nodemon.py	2007-04-14 05:00:21 UTC (rev 9951)
@@ -10,7 +10,7 @@
 import socket
 import traceback
 import re
-from TorUtil import *
+from TorCtl.TorUtil import *
 import sched, time
 import thread