[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
Tim Wilson-Brown - teor <teor2345@xxxxxxxxx> writes:
> Hi,
>
Hi, thanks for the feedback.
> I also have concerns about proposal 246, I don't think its benefits are compelling
> compared with the number of drawbacks.
>
To better understand the performance benefits of prop246, here are some
experimental graphs by Karsten that show how much time each hidden service
connection substep takes: http://ec2-54-92-231-52.compute-1.amazonaws.com/
As you can see the "fetch descriptor" step (which prop246 removes) is one of
the most lengthy ones.
> If we do want to skip the introduction point, proposal 252 (single onion services)
> provides a way for onion services to do this on an opt-in basis. (However, it doesn't
> allow onion services to skip the introduction point step and stay location-hidden.)
>
Yeah, SOS is not suitable for all the threat models we are trying to cover.
> There's also nothing preventing us from making this change in future, by modifying
> how hidden services select their introduction points. We could then teach clients
> to use the HSDir as an introduction point if it's in the list.
>
Hm, maybe. But with increased migration and engineering costs.
>> On 14 Jan 2016, at 03:50, George Kadianakis <desnacked@xxxxxxxxxx> wrote:
>>
>> Hello there,
>> ...
>> Here are some issues that make this proposal not an obvious pick:
>>
>> 1) Security issues
>> ...
>> - It was also pointed out that the HSDir algorithm does not take into
>> account the bandwidth of the nodes, making it easier to launch Sybil
>> attacks. However, the rest of the the mailing list thread suggests
>> various ways to do bandwidth weighted hash ring selections [4], so this
>> might not be an important factor.
>
> As far as I recall, there was no guarantee that a large hidden service would
> not pick 6 low-bandwidth HSDirs/IPs for a day, with serious impact on the
> reachability of that hidden service for that period.
>
>> 3) Load balancing issue
>> ...
>> - Another concern here is that hidden services would not be able to change
>> the number of their introduction points. This is not a big problem
>> currently, but it could become in the future if the network gets more
>> overloaded. As a partial solution to this, #17690 suggests making the
>> number of HSDirs a network-wide consensus parameter that could also be
>> used by proposal 246.
>
> It could also become a big problem for large hidden services which benefit from
> 10 (or more) introduction points.
>
>> 2) Reachability issue
>>
>> A final issue here is that if the relay churn of the network increases, the
>> introduction point hash ring might be changing rapidly and clients might get
>> pointed to the wrong introduction points.
>>
>> However, this does not seem like a greater problem than what hidden services
>> are facing with HSDir reachability currently. Is this right, or does prop246
>> makes it worse?
>
> Proposal 246 makes it worse, because now both HSDirs and introductions depend
> on a potentially churning hash ring. If churn makes an introduction point
> unreachable, this increases the load on the other introduction points.
>
Isn't that also the case for HSDirs currently?
> Clients also cache descriptors from HSDirs, but they need an introduction point
> to be up whenever they contact the hidden service.
>
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev