That's a good summary, there are a few more details about Guards in: Since 0.2.9, all relays in the consensus have the Running and Valid flags, so those constraints are redundant: A recent proposal talks about removing path restrictions altogether, in favour of vanguards (layered guards):
ASN data needs to be authenticated and distributed to clients, or we introduce a security dependency on an external data provider. Search the archives for details.
Clients already impose the IPv4 /16 constraint on paths they build via bridges. What's the challenge here?
Changing path selection based on data that hasn't been verified introduces additional attack vectors. I think there are previous posts on this topic, but I'm not sure.
Country data is very poor quality: it's generally a mix of geographical location of the actual relay, and legal location of the data centre company. It's also not authenticated or validated, introducing a dependency on an external data provider. We need more research to determine what the threat models are, how country data is useful, and what the default settings should be.
The assumption is that relays with the same ports might have the same operator. ORPorts are verified by the directory authorities, so we could use them. I think the logic should be: If fewer than X% of relays have a port, consider all those relays to be in the same family. Here are the open questions: What should X be? (Look at existing port distribution.) Should we use number of relays, or consensus weight? The next step is to write a proposal:
Machine learning is easily manipulated, hard to update, and hard to distribute.
Recent tor proposals:
Physical access to the device also provides the opportunity to access data on the device. It is also out of scope.
Tor is designed so that that each relay learns some information, but no relay learns all the information. That's why we have path constraints for similar relays:
T |
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays