[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network



07.01.2016, 18:12 Nick Mathewson:

Mostly spelling corrections and one question at the bottom.

I have not enough insight to comment on the proposed ideas.

>   [...]

> One goal of this proposal is to ensure that future clients to not

*do not*

>    become zombies at all; and that ancient clients become slow zombies
>    at worst.
> 
> 
> 2. Some ideas that don't work.
> 
> 2.1. Dropping connections based on link protocols.
> 
>    Tor versions before before 0.2.3.6-alpha use a renegotiation-based
>    handshake instead of our current handshake.  We could detect these
>    handshakes and close the connection at the relay side if the client
>    attempts to renegotiate.
> 
>    I've tested these changes on versions maint-0.2.0 through
>    maint-0.2.2.  They result in zombies with the following behavior:
> 
>       The client contact each authority it knows about, attempting to

An s is missing to make 'contacts'.

>       make a one-hop directory connection.  It fails, detects a failure,
>       then reconnects more and more slowly ... but one hour later, it
>       resets its connection schedule and starts again.
> 
>    In the steady state this appears to result in about two connections
>    per client per authority per hour.  That is probably too many.
> 
>    (Most authorities would be affected: of the authorities that existed
>    in 0.2.2, gabelmoo has moved and turtles has shut down.  The
>    authorities Faravahar and longclaw are new. The authorities moria1,
>    tor26, dizum, dannenberg, urras, maatuska and maatuska would all get
>    hit here.)

maatuska is listed twice.

> 
>    (We could simply remove the renegotiation-detection code entirely,
>    and reply to all connections with an immediate VERSIONS cell.  The
>    behavior would probably be the same, though.)
> 
>    If we throttled connections rather than closing them, we'd only get
>    one connnection per authority per hour, but authorities would have to

connection

>    keep open a potentially huge number of sockets.
> 
> 2.2. Blocking circuit creation under certain circumstances
> 
>    In tor 0.2.5.1-alpha, we began ignoring the UseNTorHandshake option,
>    and always preferring the ntor handshake where available.
> 
>    Unfortunately, we can't simply drop all TAP handshakes, since clients
>    and relays can still use them in the hidden service protocol.  But
>    we could detect these versions by:
> 
>         Looking for use of a TAP handshake from an IP not associated
>         with with any known relay, or on a connection where the client

'with' is there twice.

>         did not authenticate.  (This could be from a bridge, but clients
>         don't build circuits that go to an IntroPoint or RendPoint
>         directly after a bridge.)
> 
>    This would still result in clients not having directories, however,
>    and retrying once an hours.
> 
> 3. Ideas that might work
> 
> 3.1. Move all authorities to new ports
> 
>    We could have each authority known to older clients start listening
>    for connections at a new port P. We'd forward the old port to the new
>    port.  Once sufficiently many clients were using the new ports, we
>    could disable the forwarding.
> 
>    This would result in the old clients turning into zombies as above,
>    but they would only be scrabbling at nonexistent ports, causing less
>    load on the authorities.
> 
>    [This proposal would probably be easiest to implement.]
> 
> 3.2. Start disabling old link protocols on relays
> 
>    We could have new relays start dropping support for the old link
>    protocols, while maintaining support on the authorities and older
>    relays.
> 
>    The result here would be a degradation of older client performance
>    over time.  They'd still behave zombieishly if the authorities
>    dropped support, however.
> 
> 3.3. Changing the consensus format.
> 
>    We could allow 'f' (short for "flag") as a synonym for 's' in
>    consensus documents.  Later, if we want to disable all Tor versions
>    before today, we can change the consensus algorithm so that the
>    consensus (or perhaps only the microdesc consensus) is spelled with
>    'f' lines instead of 'f' lines.  This will create a consensus which

'f' lines instead of 's' lines.

>    older clients and relays parse as having all nodes down, which will
>    make them not connect to the network at all.
> 
>    We could similarly replace "r" with "n", or replace Running with
>    Online, or so on.
> 
>    In doing this, we could also rename fresh-until and valid-until, so
>    that new clients would have the real expiration date, and old clients
>    would see "this consensus never expires".  This would prevent them
>    from downloading new consensuses.
> 
>    [This proposal would result in the quietest shutdown.]

What would be repeatable in 5 years? I imagine that you would like to
get rid of old clients again and again.

Regards,
Sebastian G.
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev