[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #2980 [Tor Relay]: feature request: better privacy for node operators
#2980: feature request: better privacy for node operators
-------------------------+--------------------------------------------------
Reporter: tagnaq | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: Tor Relay | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Changes (by tagnaq):
* cc: tagnaq@â (added)
Comment:
Replying to [comment:1 Sebastian]:
> I don't like the proposal, tbh. I don't buy that this will make relays
who are on dynip connections less traceable, because they will make a new
key and disappear with the old key at roughly the same time.
This is true unless there are enough other nodes on your network
"colliding" with your IP+key renew. For networks with lease times >12h and
a low number of tor nodes this good collision is rather unlikely, but
there are ISPs enforcing IP renews every <12h. So this feature is becoming
more useful in the future with more nodes on the same network.
> Not reporting version is actively harmful, because Tor clients use that
to decide what to use a given relay for. This design isn't great
(especially because it prohibits alternative implementations of Tor
relays, but while we have it we can't introduce an option like that).
Yes I was not so sure about tor version and BW - lets drop them from the
common list of settings.
* ORPort: 9001,
* !DirPort: 9030
* Nickname: "Unnamed"
* !ContactInfo: ""
* exit policy: reject *:*
[[BR]]
> I also worry that a bunch of people set that option without actually
understanding what it does, thus harming our metrics-related goals without
a real need.
So the config option should probably not contain 'Privacy' in the name -
which is too desireable to have :) ...so probably 'CommonDescriptor' reads
less desirable ;)
> I don't see a real threat model that this change could detect against.
Do you disagree that this feature (rekeying ones in a while + common
descriptor) would make it harder to link tor nodes to there past ip
addresses and reduce the privacy impact of running a tor node at home?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2980#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs