On Wed, Sep 26, 2012 at 02:08:06AM -0400, Robert Ransom wrote: > On 9/26/12, meh. <meh@xxxxxxxxxxxxxx> wrote: > > > After implementing the torchat protocol and seeing how bad it is, but > > how nice the idea is, I started thinking it would be cool to have a > > more general protocol for P2P use through hidden services. > > > > My question is, how would it scale and what would be the implications > > of such a system (every user would be a hidden service and would be > > constantly connected to other hidden services it wants to interact > > with)? > > DO NOT use implement peer-to-peer software that way. You will make > your users more vulnerable to some attacks, and thrash the HS > directory system excessively, and probably overload the users' Tor > client processes to the point that they start pounding on the Tor > network in general (see https://bugs.torproject.org/1307 for one > failure mode). > > Some parts of the Tor hidden service protocol can be used for > peer-to-peer communication, but that would require new client-side > protocols (for communication between the application and the Tor > client), as well as an overhaul of the hidden service code. SOCKS and > Tor's current control-port protocol are not suitable for this. OnionCatÂ[1] can be seen as implementing P2P-over-HS. I never read a similarily strong statement about it before. [1]Âhttp://www.cypherpunk.at/onioncat/ -- JÃrÃmy Bobbio .''`. lunar@xxxxxxxxxx : :â : # apt-get install anarchism `. `'` `-
Attachment:
signature.asc
Description: Digital signature
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk