Hi,
The top 100 relays are only 13-18% of the total advertised bandwidth: It's hard to draw accurate conclusions from less than 20% of the network. What about the other 80% of the network?
I don't think kicking relay operators off the network when they upgrade to a new version is helpful. We *want* people to upgrade. Also, abruptly reducing the capacity of the network is a bad experience for Tor users. They will have slow traffic or connection failures. We call these kinds of abrupt changes "flag days", and we try hard to avoid them. Here's a plan that will take longer, but help more relay operators get on IPv6: Automatically detect and use IPv6 on relays: 1. Release a tor version that automatically detects IPv6 on relays, and uses it if it works. But turn it off by default, and have an option and a consensus parameter to turn it on. 2. Ask relay operators to test the new feature in the alphas and release candidates. 3. Once the feature has had enough testing, turn it on for all relays using the consensus parameter. 4. Encourage relay operators to configure IPv6 on their relay's network stack and upstream connection Reduce the consensus weight for IPv4-only relays: 1. Wait until we have enough dual-stack relays, that we can afford to send them more traffic. (We need metrics for IPv6 traffic, which we don't have right now.) 2. Add a consensus parameter and consensus method that reduces the consensus weight for IPv4-only relays by a percentage. 3. Gradually reduce the weight of IPv4 relays. 4. Encourage relay operators to configure IPv6 on their relay's network stack and upstream connection Wait until we have seen some good research on non-clique anonymity networks, or remove IPv4 and allow IPv6 at the same time. Allow IPv6-only guards: 1. Add automatic IPv6 support to clients, so clients use IPv4 and IPv6 when available 2. Optional: add automatic IPv6 support to bridges, so bridges use IPv4 and IPv6 when available 3. Wait until we have enough dual-stack middle relays, and dual-stack or IPv6 clients and bridges 4. Allow IPv6-only guards 5. Optional: allow IPv6-only bridges Allow IPv6-only exits: 1. Improve Tor client and Tor exit support for IPv6 exit connections, allowing clients to discover and remember whether a site is IPv4-only, dual-stack, or IPv6-only 2. Wait until we have enough dual-stack middle relays, and enough internet sites that support IPv6 3. Allow IPv6-only exits Allow IPv6-only middles: 1. Wait until we have enough dual-stack guards and exits 2. Allow IPv6-only middles Remove IPv4-only relays: 1. Wait until the proportion of IPv4-only guards, middles, or exits is small enough 2. Remove IPv4-only relays from that role (we can turn guards and exits into middles) I've added this draft plan to the IPv6 roadmap page: T |
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays