This isn't how the current Tor2web implementation works. If your proposal will break the Tor2webRendezvousPoints option, or require a minimum number of relays to be specified in that option, you need to document these implementation changes or new configuration constraints clearly in the proposal. I'm not sure whether different Tor2web web clients get different hidden service circuits. But as it's critical to the correct functioning of this proposal with Tor2web mode, I'd encourage you to find out, and update the proposal accordingly. This isn't how Tor2web mode works. If your proposal needs the design to be changed, then please document that. So the number of rendezvous points required in Tor2webRendezvousPoints depends on the load on the particular hidden service, the number of web clients connecting to the particular hidden service via the Tor2web instance, and whether those clients get the same rendezvous circuit or not. Such a non-deterministic requirement essentially breaks the Tor2webRendezvousPoints feature. That's precisely why the option exists. Tor2web clients can choose a rendezvous relay controlled by the Tor2web operator, on the same machine or same network. This increases the speed of Tor2web connections. And the operator can control for load on relays they control much more precisely than picking a random rendezvous point. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev