[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [torspec/master] Add my removing-obsolete-clients proposal as 266
commit 99acfe0bb19f0a0bcb7c1ec4866c817d91ade7c8
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Thu Jan 14 11:24:16 2016 -0500
Add my removing-obsolete-clients proposal as 266
---
proposals/000-index.txt | 2 +
.../266-removing-current-obsolete-clients.txt | 204 ++++++++++++++++++++
2 files changed, 206 insertions(+)
diff --git a/proposals/000-index.txt b/proposals/000-index.txt
index 718dd31..411093b 100644
--- a/proposals/000-index.txt
+++ b/proposals/000-index.txt
@@ -186,6 +186,7 @@ Proposals by number:
263 Request to change key exchange protocol for handshake v1.1 [OPEN]
264 Putting version numbers on the Tor subprotocols [OPEN]
265 Load Balancing with Overhead Parameters [DRAFT]
+266 Removing current obsolete clients from the Tor network [DRAFT]
Proposals by status:
@@ -213,6 +214,7 @@ Proposals by status:
259 New Guard Selection Behaviour
260 Rendezvous Single Onion Services
265 Load Balancing with Overhead Parameters
+ 266 Removing current obsolete clients from the Tor network
NEEDS-REVISION:
190 Bridge Client Authorization Based on a Shared Secret
OPEN:
diff --git a/proposals/266-removing-current-obsolete-clients.txt b/proposals/266-removing-current-obsolete-clients.txt
new file mode 100644
index 0000000..3d8a6c3
--- /dev/null
+++ b/proposals/266-removing-current-obsolete-clients.txt
@@ -0,0 +1,204 @@
+Filename: 266-removing-current-obsolete-clients.txt
+Title: Removing current obsolete clients from the Tor network
+Author: Nick Mathewson
+Created: 14 Jan 2016
+Status: Draft
+
+
+1. Introduction
+
+ Frequently, we find that very old versions of Tor should no longer be
+ supported on the network. To remove relays is easy enough: we
+ simply update the directory authorities to stop listing relays that
+ advertise versions that are too old.
+
+ But to disable clients is harder.
+
+ In another proposal I describe a system for letting future clients go
+ gracefully obsolete. This proposal explains how we can safely
+ disable the obsolete clients we have today (and all other client
+ versions of Tor to date, assuming that they will someday become
+ obsolete).
+
+1.1. Why disable clients?
+
+ * Security. Anybody who hasn't updated their Tor client in 5
+ years is probably vulnerable to who-knows-what attacks. They
+ aren't likely to get much anonymity either.
+
+ * Withstand zombie installations. Some Tors out there were once
+ configured to start-on-boot systems that are now unmaintained.
+ (See 1.4 below.) They put needless load on the network, and help
+ nobody.
+
+ * Be able to remove backward-compatibility code. Currently, Tor
+ supports some truly ancient protocols in order to avoid breaking
+ ancient versions or Tor. This code needs to be maintained and
+ tested. Some of it depends on undocumented or deprecated or
+ non-portable OpenSSL features, and makes it hard to produce a
+ conforming Tor server implementation.
+
+ * Make it easier to write a conforming Tor relay. If a Tor relay
+ needs to support every Tor client back through the beginning of
+ time, that makes it harder to develop and test compatible
+ implementations.
+
+1.2. Is this dangerous?
+
+ I don't think so. This proposal describes a way to make older
+ clients gracefully disconnect from the network only when a majority
+ of authorities agree that they should. A majority of authorities
+ already have the ability to inflict arbitrary degrees of sabotage on
+ the consensus document.
+
+1.3. History
+
+ The earliest versions of Tor checked the recommended-versions field
+ in the directory to see whether they should keep running. If they
+ saw that their version wasn't recommended, they'd shut down. There
+ was an "IgnoreVersion" option that let you keep running anyway.
+
+ Later, around 2004, the rule changed to "shut down if the version is
+ _obsolete_", where obsolete was defined as "not recommended, and
+ older than a version that is recommended."
+
+ In 0.1.1.7-alpha, we made obsolete versions only produce a warning,
+ and removed IgnoreVersion. (See 3ac34ae3293ceb0f2b8c49.)
+
+ We have still disabled old tor versions. With Tor 0.2.0.5-alpha,
+ we disabled Tor versions before 0.1.1.6-alpha by having the v1
+ authorities begin publishing empty directories only.
+
+ In version 0.2.5.2-alpha, we completely removed support for the v2
+ directory protocol used before Tor 0.2.0; there are no longer any v2
+ authorities on the network.
+
+ Tor versions before 0.2.1 will currently not progress past fetching
+ an initial directory, because they believe in a number of directory
+ authority identity keys that no longer sign the directory.
+
+ Tor versions before 0.2.4 are (lightly) throttled in multihop
+ circuit creation, because we prioritize ntor CREATE cells over
+ TAP ones when under load.
+
+1.4. The big problem: slow zombies and fast zombies
+
+ It would be easy enough to 'disable' old clients by simply removing
+ server support for the obsolete protocols that they use. But there's
+ a problem with that approach: what will the clients do when they fail
+ to make connections, or to extend circuits, or whatever else they are
+ no longer able to do?
+
+ * Ideally, I'd like such clients to stop functioning _quietly_. If
+ they stop contacting the network, that would be best.
+
+ * Next best would be if these clients contacted the network only
+ occasionally and at different times. I'll call these clients
+ "slow zombies".
+
+ * Worse would be if the clients contact the network frequently,
+ over and over. I'll call these clients "fast zombies". They
+ would be at their worst when they focus on authorities, or when
+ they act in synchrony to all strike at once.
+
+ One goal of this proposal is to ensure that future clients to not
+ become zombies at all; and that ancient clients become slow zombies
+ at worst.
+
+
+2. Some ideas that don't work.
+
+2.1. Dropping connections based on link protocols.
+
+ Tor versions before before 0.2.3.6-alpha use a renegotiation-based
+ handshake instead of our current handshake. We could detect these
+ handshakes and close the connection at the relay side if the client
+ attempts to renegotiate.
+
+ I've tested these changes on versions maint-0.2.0 through
+ maint-0.2.2. They result in zombies with the following behavior:
+
+ The client contact each authority it knows about, attempting to
+ make a one-hop directory connection. It fails, detects a failure,
+ then reconnects more and more slowly ... but one hour later, it
+ resets its connection schedule and starts again.
+
+ In the steady state this appears to result in about two connections
+ per client per authority per hour. That is probably too many.
+
+ (Most authorities would be affected: of the authorities that existed
+ in 0.2.2, gabelmoo has moved and turtles has shut down. The
+ authorities Faravahar and longclaw are new. The authorities moria1,
+ tor26, dizum, dannenberg, urras, maatuska and maatuska would all get
+ hit here.)
+
+ (We could simply remove the renegotiation-detection code entirely,
+ and reply to all connections with an immediate VERSIONS cell. The
+ behavior would probably be the same, though.)
+
+ If we throttled connections rather than closing them, we'd only get
+ one connnection per authority per hour, but authorities would have to
+ keep open a potentially huge number of sockets.
+
+2.2. Blocking circuit creation under certain circumstances
+
+ In tor 0.2.5.1-alpha, we began ignoring the UseNTorHandshake option,
+ and always preferring the ntor handshake where available.
+
+ Unfortunately, we can't simply drop all TAP handshakes, since clients
+ and relays can still use them in the hidden service protocol. But
+ we could detect these versions by:
+
+ Looking for use of a TAP handshake from an IP not associated
+ with with any known relay, or on a connection where the client
+ did not authenticate. (This could be from a bridge, but clients
+ don't build circuits that go to an IntroPoint or RendPoint
+ directly after a bridge.)
+
+ This would still result in clients not having directories, however,
+ and retrying once an hours.
+
+3. Ideas that might work
+
+3.1. Move all authorities to new ports
+
+ We could have each authority known to older clients start listening
+ for connections at a new port P. We'd forward the old port to the new
+ port. Once sufficiently many clients were using the new ports, we
+ could disable the forwarding.
+
+ This would result in the old clients turning into zombies as above,
+ but they would only be scrabbling at nonexistent ports, causing less
+ load on the authorities.
+
+ [This proposal would probably be easiest to implement.]
+
+3.2. Start disabling old link protocols on relays
+
+ We could have new relays start dropping support for the old link
+ protocols, while maintaining support on the authorities and older
+ relays.
+
+ The result here would be a degradation of older client performance
+ over time. They'd still behave zombieishly if the authorities
+ dropped support, however.
+
+3.3. Changing the consensus format.
+
+ We could allow 'f' (short for "flag") as a synonym for 's' in
+ consensus documents. Later, if we want to disable all Tor versions
+ before today, we can change the consensus algorithm so that the
+ consensus (or perhaps only the microdesc consensus) is spelled with
+ 'f' lines instead of 'f' lines. This will create a consensus which
+ older clients and relays parse as having all nodes down, which will
+ make them not connect to the network at all.
+
+ We could similarly replace "r" with "n", or replace Running with
+ Online, or so on.
+
+ In doing this, we could also rename fresh-until and valid-until, so
+ that new clients would have the real expiration date, and old clients
+ would see "this consensus never expires". This would prevent them
+ from downloading new consensuses.
+
+ [This proposal would result in the quietest shutdown.]
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits