[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 13/09/14 14:07, George Kadianakis wrote:
> a) To reduce the ownage probabilities we could pick a single
> middle node instead of 6. That will greatly improve guard
> discovery probabilities, and make us look like this:
> 
> HS -> guard -> middle -> <exit> -> RP (where <exit> is chosen from
> the set of all relays)
> 
> However, that will definitely degrade HS performance. I'm not sure 
> if Tor relays are able to handle all that concentrated HS traffic.
> Specifically, the guards/middles that get picked by popular HSes
> will get flooded with traffic that is never accounted for in Tor's
> load balancing equations (since HS traffic is not counted) and they
> will get hammered both by HS traffic and regular Tor traffic.

Hi George,

Could you explain what it means to say that HS traffic isn't counted
in the load balancing equations? Why is that so, and can it be changed
if that would allow a more secure HS design?

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJUFEODAAoJEBEET9GfxSfMkicH/RJFaXcI2fmgq9Qm9xV5C3Hj
cTQ2DxsMFN8TmyusdesfzbD9+2TuDGNgIP9h773mgGzUsLll6RB8QNnLgL9kHDVF
+I3KibOY7qfQ0Fu0auVeYj+9jNda+cvQggQuGBtHyiYZkbirrodOW7HfthL96RCJ
HMw+HuSFFH/62idQjuVIbqjv88Ft1y5MgwRfplslkzc1aXO+bOOmHTf7qFXLXEq9
82X57rF1XLc/pTCCiHp3uVmJF5Dwp6unXBNPQf8L8yumTjgTfgLwYBkC8NOp6X+B
Cty1cD6RalKrR++fGAmOifKHz73GAYG9VRSeAfSHYltIHHo0JRReXdLyAgUKrrU=
=x/pl
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev