[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Hidden Service Scaling Summer of Privacy Project



On 5/26/15, Donncha O'Cearbhaill <donncha@xxxxxxxxxx> wrote:
> ...
> I am interested in hearing from all existing hidden service operators.

speaking for two,



> In particular I'd like to understand the use-cases,

- file distribution
- "web services", etherpad, ethersheet, webdav
- XMPP
- IRC
- overlay network (tun/tap)



> priorities

file distribution and chat.



> limitations

fragility; zooko's triangle. (see also namecoin and onion name service
experiments for bootstrap)



> There have been anecdotal reports on the Tor
> bug tracker that hidden services have trouble scaling to more than 100
> concurrent connections [2]. Is this something that operators here have
> experienced?

it would be nice to speak of hidden service establishment rates across
distinct number of onions, rather than a simple frequency counter.
specifically, high establishment rates over many onions is the most
performance intensive use case unless under attack of any myriad
sort...

conversely, if in a constrained environment like old computer or small
device, using only a couple onions, for light traffic is advised.



> There has also been recent DoS campaigns affecting Tor
> hidden services which have been challenging to mitigate.

one word: blowback.
 [ maybe #FreeRedTeam ? gotta make lemonade, sweet sweet lemonade ]



> In my project I hope to produce a tool which will allow a hidden service
> to be backed my multiple Tor instances which can be spread across
> multiple servers and geographical locations.

in the 50G mirror experiment, even while under volatile network
conditions, this technique - using many concurrently active onions -
worked well and kept throughput and availability consistently robust.
bigsun dist uses 9 onions across three physical hosts, for reference.



>  - Redundant hidden service hosting with no single point of failure.

#1 useful.




>  - Secure storage of hidden service keys away from the Tor service on
>    smartcards or HSM's

#2 useful.



>  - From a security perspective, would you prefer to minimize the
> software running on the onion service instance servers or minimize
> connections to the management server which has access to the service keys?

both, #3 useful.



> I've anyone has time to share, I'd be very interested in learning about
> your experiences and current challenges. I'd also be delighted to hear
> about any other features that may be useful to the HS community.

this should be a trac, wiki, or doc? :P


best regards,
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk