[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)



Christopher Baines <cbaines8@xxxxxxxxx> writes:

> On 20/10/14 14:37, George Kadianakis wrote:
>> f) On a more researchy tone, this might also be a good point to start
>>    poking at the HS scalability project since it will really affect HS
>>    performance.
>> 
>>    We should look at Christopher Baines' ideas and write a Tor
>>    proposal out of them:
>>    https://lists.torproject.org/pipermail/tor-dev/2014-April/006788.html
>>    https://lists.torproject.org/pipermail/tor-dev/2014-May/006812.html
>>    Last time I looked, Christopher's ideas required implementing
>>    proposal225 and #8239.
>
> I am still around, and interested in helping out with this! :)
>

Hello,

glad to see you are still interested in this.

I think the first step here is to write a document with the various
solutions, their requirements, and how they influence the threat
model.

First of all, what do we mean by scalability and what properties are
we trying to offer?

On concrete schemes now, what features are needed to implement your
scheme [0]?  Can these requirements be changed? For example, on the
topic of selecting IPs, can we dump the requirement for global
randomness, by using the long-term private key as a seed to picking
IPs?

Also, what's the threat model of your scheme? What more information do
the IPs learn? What more information do the clients learn?

What other ways are there to do HS scalability? How does their threat
model change [1]? etc.

By the way, is your thesis somewhere public? I imagine that it tackles
a few of these questions already.

Thanks!

[0]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006788.html
[1]: https://lists.torproject.org/pipermail/tor-dev/2013-October/005683.html
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev