[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes



Hello,
many thanks, George, for your response, feedback and sharing experience with servers within Tor.
Sharing experiences and measuring might be individual cases and conditions.
After it has been reported, we all need to make up our mind to find solutions. So one result as a contribution is the Reflec.Tor concept. 
I tried to test all the Tor-Messaging apps and yes, some had packet-loss and latency problems and others were quite workable for a 1:1 chat, all probably depending on the circumstances. Though, it is like with your GSM cat-tracker, it must work, if it is needed, that is when the cat was jumping in a foreign cellar because of bad weather, and a neigbour closing the door, not knowing the cat, and the tracker gets no signal there. Then we are lost.

So we need to focus the problem and find optimizations.
Some might have an absolutely approach to have strong anonymity. So I guess the single-hop mode with just one intermediary respective in total a 3 hop circuit might be not or never be acceptable.
Other might want strong encryption.

For the Reflec.Tor concept I judge the needs and requests as very balanced and acceptable. As the Reflec.Tor accepts only encrypted packets, these packets are multi-encrypted, are transmitted over HTTP or HTTPS and do not contain any IP-Information, the hop from an Exit-Node to a Reflec-Tor and back to another Tor-Exit-Node is just considered as super-secure and just another hop as it would be within Tor - as one more circuit.
So the approach of some projects, we MUST stay within Tor to provide anonymity is short thought. The opposite is the case, you have 3 hops to the Reflec.Tor which is the 4th Hop, and then again 3 hops back to the friend in Tor-Messaging. That are seven hops and you come with the idea of just ONE intermediary.
Again, all is multiple strong encrypted and every exit node as a Reflec.tor would in total provide many Reflec.Tors as chat servers.
Probably thouse voting against it do not want Tor-Messaging or encrypted Chat via Tor-Messaging for certain reasons, so the identity of Tor might decide on the idea on Tor-Messaging: Having a Free Internet for Surfing and Chat.

Those who want absolutely anonymous chat, should be keen on the ReflecTors and implement it with priority. Not shortening the graph to one intermediary. But beeing very reliabyl and working with seven hops, even if the middle node as Reflec.Tor is the space between two Tor Circuit-Graphs.

I have to ask for your IRC server to get that architecture right understood. I am and was not aware of an IRC server addressable by an Onion-Address? Which IRC-Client uses onion addresses as they are used by e.g. RicoChet-Refreshed, is it onion service v2 or onion service v3 your IRC server has implemented?

So I guess with your server experience we speak from the same graph as a Reflec.Tor would have,

IRC-Client bound over lokalhost => to Tor => Tor-Entryguard => Tor => Tor-Exit-Node => Internet => Your IRC Server => Internet => Tor-Exit-Node => Tor => Tor-Entry-Guard => Tor => localhost sends to  your friends IRC-Client

Now you can replace the IRC Server with the Echo-Server, on which the Reflec.Tor is based on.
So pretty good results, fast and reliably, and that is why we speak of the same architecture.

The bad results in messaging are comming over this architecture:

Chat Client on Hidden Server => to Tor => Tor-Entryguard => Tor => .. some Tor Bridges and Relays => Tor => Tor => Tor-Entry-Guard => Tor => Hidden Server with Chat Client

For sure, you can discuss any "Exit-Internet-Server-Internet-Exit"-Path - Server, it could be an IRC server, it could be a Matrix server and it could be an Echo-Server.

The Echo-Server was chosen, as this server is very simple, probably also simply to implement, it sends every incomming packet out to every connected chat node, it handles only encrypted packets, plaintext is not handled. It has no IP-Address in the packets, it is strong encryption. Others do not offer this.

So the desired path and architecture is:

Tor-Messenger bound over lokalhost => to Tor => Tor-Entryguard => Tor => Tor-Exit-Node => Internet => Echo-Server that is an Reflec-Tor => Internet => Tor-Exit-Node => Tor => Tor-Entry-Guard => Tor => localhost sends to  your friends Tor-Messenger

As all the software is there, it has been tested and works fine and fast. If an Exit-Node would host it, the middle part "Tor-Internet-Reflec.Tor- Internet-Tor"
would be shortend to "Tor--Reflec.Tor--Tor"  which makes it even more secure next to the encypted extra hop. With the existing installation in a parallel run just another port for the Reflec.Tor needs to be addressed, and the idea is now simply to use the same port as the exit-node uses for http/s and browsing. 

If you look at the Tor-Metrics page there is a symbol for "Running", the infinite arrows in a circle, that could be a symbol for a Reflec.Tor too,
I would not recomend a new extra symbol.
Because: As far as I see the relays do not have a version information for the software used, if all update to a new Tor-Software in which each running exit node has a Reflec.Tor implemented, then the world gets 2500 Chat Servers all over the world.
The Tor Metrics currently show the stable Top 250, but if you click on the symbol for running, you get all relays, also probably a security risk for those who want to block or observe all IP adresses of Exit nodes?!
However, I dont see a risk in that, the problem is more the missing version number, to see in the end, which Exit-Node has then the new release with the Reflec.Tor Echo-Chat-Server updated or not. You need to inform all relay admins to use the update. In the other case you have a new extra symbol for those adding the chat feature, but this will be not successful. That's why a statement is needed from the board to integrate Tor Messaging.

For the implementation you speak of the hope of "no extra code".
I dont think this is a valid strategic option, to promise an effortless approach of No-Extra Code with Zero Work while at the same time several messengers evolve.
As said, the echo server is there, run it parallel on your exit-node IP and you just need a different port. Instead of looking the port up in the shown exit node of the TorBrowser, you can make an extra website or integrate it into the Relay Metrics page. As said, this will be not successful, as no one will install a piece or plug in parallel. It must be intergrated into the Tor-Exit-Port for all to be successful.

However, the problem is, that the Clients for Tor-Messaging like RicoChat Refreshed and Quiet and Cwtch need to implement servers anyway, they need these for groupchat and they need it for chat to offline friends. The Tor Messenger Spot-On has that given with the use of a Reflec.Tor (Echo-Server). The Chat over OnionShare is a bit different as there only one hidden server as one common chat room seems to be given (correct me if wrong), and it makes the connections not better. 

So now the mentioned three main projects start to code each their own server?

And that server is also in the Internet as your IRC server is to be functional?

Why then not once coding in the Echo-Server - and all four Tor-Messaging Clients use the Echo-Server for Groupchat. That is based on AES and would also enable compatibility of the main clients to address a groupchat. In no case we want a competition of these three clients to have "proprietary" groupchats which means different own groupchat-servers. We can sum up the coding and forces to just implement the GroupChat of the Spot-on Client in RicoChat Refreshed and Quiet and Cwtch "with" or "and" ONE implementation of a Reflec.Tor at each Exit-Node with one update. That would save much individual hours of work. 

That is why a common discussion is needed and a statement of the board to support Tor-Messaging, otherwise every one makes an own soup and is struggling alone, but then we need not a board and no strategic discussions.

Sure, supporting Tor-Messaging with Reflec.Tors by the board is a strong input. 

But, as all three Messengers have not coded yet a groupchat server, that is now possible to announce, or in case one individual developer provides a patch for Exits, then it is immediately there.

At the same time, the three Messengers need not to feel offended, as they get a service by a common initiative. Maybe they make their own soup anway:
Cwtch switchted to flutter and seems to be quite rigid in own developmend speed and style, Quiet is also a cooperable project and seeks for and provides a professional GUI, which probably under the hood creates also own coding styles. Ricochat Refresh seems to be tied very close to the Tor development in total and make successive steps to improve. As the oldest client it seems to be the most solid one, but also slow one in coding and as all three depending on motivation and fund.
So for any three cases a common decision and adressing is helpful for the groupchat server - but overall for the better graph architecture for more reliabiliy and no packet loss. Even if not a development towards a Reflec.Tor is started, the board needs to define a standard for the Chat-Hash whether it is ricochet://39098203498 or Opion://1832761923 or Tor://9238798734 or Quiet://928397 and how they can be compatible.

However, that Reflec-Tor could be an initial model for a groupchat implementation. BTW: That Spot-On Buzz Tab can also be used for 1:1 chat, so the three clients could start with the groupchat and make thier clients at the same time optional hybrid in 1:1 chats based on Buzz (sym, AES) **and** their traditional way (hidden to hidden). Or even implement the Chat-Key for the Echo and real (asym) 1:1 Messaging too. 
Also a codebase swich could be discussed for RicoChat Refreshed R3 (with Refec.Tor rather than Onion Service V3) as at the project discussed. Open Source code needs always to be revised.

So the best is doing nothing and not deciding?, then we have all our own soup. The Reflec.Tor in Exit.Nodes makes immediately a strong code basis a Tor-Messenger - and everyone can overtake it or implement it in the own client.

As a groupchat server is not coded yet in these three clients, there is no offence and in the opposite it is a gift to have a common sense how to implement groupchat and offline chat and also to have with a Reflec.Tor a Server already provided by Tor-Developers. As said, ieven f five or more exit-operators alreay provide/install an Echo Server on their Exit-IP, then we just have a different port, but in the same minute Tor-Messaging is working reliable with the Spot-On Tor-Messenger and the new standard for a better graph architecture is set.

Why then not implementing it for all the exit-nodes and provide also the basis for groupchat for the three hidden-server based Messengers?   

So the model is less coding (and probably using less funding) by joined forces.
Kind regards, Sam

Am Mi., 14. Aug. 2024 um 16:04 Uhr schrieb George Hartley via tor-relays <tor-relays@xxxxxxxxxxxxxxxxxxxx>:
Hello,

Similar to Briar, even developers of such clients above tell the loss of messages and low reliability of the hidden to hidden path. Some of you might know, that there were use cases with missing messages in a range of 35-45 %.

Sorry, but this is just not the case from my experience - it may take a while to fetch the descriptor of the hidden service, but once a TCP connection is established, aka. the ACK packet has been received, there should be no problems with packet-loss, this is one of the core features of TCP: 

Retransmission on various conditions.

I also hosted a hidden IRC server, as well as a Tor hidden service on my grandmothers laptop, to be able to SSH in through Tor and troubleshoot problems.

Experienced no packet loss, unless a relay in the circuit suddenly went offline.

If you want, I can measure packet loss from various locations (Northern Europe, East Europe, and New York, USA).

Also, to improve latency and throughput, you could make the server a one hop hidden server by enabling:

HiddenServiceSingleHopMode

This way the looking up the server is faster, but clients remain anonymous using a normal 3-hop circuit.

I don't think we need extra code for this, you could just build your app using the programming language of your desire and use the existing network.

That's what I was doing with my ~200 user IRC server, and it worked fine, even while being hosted at home at a limited uplink of 15 Mbps, which now got upgraded to 30 Mbps.

Unfortunately fiber is not an option, so we have to rely on 60+ years old copper wires maintained by Telecom, I have a quite fancy industrial router with modem software and capabilities, and we still use VDSL2 17a G.Vector (ITU G.993.5).

I do however own a virtual machine machine on my friends colocated server at DataWagon, they are very exit friendly, zero abuse so far, I believe they just redirect abuse mails to /dev/null or something.. lol.

Anyway, point is that I never encountered packet loss, and even if, the protocol would compensate for it.

This became kind of a rant while I'm at work, so if it's not that useful, Im sorry.

Regards,
George

On Wednesday, August 14th, 2024 at 9:12 AM, Sam <alleestrasse100@xxxxxxxxx> wrote:

System wrote via Tor Project <noreply@xxxxxxxxxxxxxxxxxxxx>:

Feedback: Please submit the proposal also to tor-dev: tor-dev Info Page

Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

https://www.reddit.com/r/TOR/comments/1e4te8m/introducing_discussing_reflectors_as_concept/


==============================================================

Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes


Tor-Messaging: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay |

Hello,

I think this belongs to this core, general, relay topic-forum, as it is also a development & community issue, request and efford, I post it here into the reddit forum for your core discussion:

The idea is to add next to Bridges, Relays and Exit-Nodes also "Entry-Nodes" as "Reflec-Tor"(s) to the point of Exit-Nodes. Hence: Exit-Nodes are developed futher to be also an Entry-Node.

Some may remember when gnutella got hybrid with edonkey and then also with torrent, Mike Stokes from Shareaza did that.

The idea today, 20 years later, is to add some Echo-capabilities to Tor in regard of the servers for Exit and Entry.

Vision: Every (updated) Exit-Node is an Echo-Server - For a better Tor-Messaging.

What does that mean?

An Echo-Server is a server for chat-messaging to send an incomming message packet again out to all connected clients at the moment. Ping-in and Ping-Out to all. That simple, that's why it is called the Echo. Like a shout in front of a forrest, all connected users can hear and get the (encrypted) shout or message or packet back from the tree wall.

There are 3 software applications for Echo-Servers:

Now, the Listener function with ping in and ping out should be implemented within a Tor-Exit-Node.

When it comes to Tor-Messaging, there are some pathes possible:

A) Tor-Chat-Client-Alice - Tor - Internet - Echo-Server - Internet - Tor - Tor-Chat-Client-Bob (Tor-proxied Chat-Server, which only accepts encrypted packets)

B) Tor-Chat-Client-Alice - Echo - Tor - Tor - Echo - Tor-Chat-Client-Bob (Echo Tor-tunneled)

C) Tor-Chat-Client-Alice - Echo-Server - Tor-Chat-Client-Bob (direct connection to Echo-Server with only encypted packets)

The request here is to build and develop option A.

That is just right now also possible, by an Exit-Node of Tor running the Echo-Server-Software on the same machine in parallel. Just the port is different.

This is an idea for some might be new, but thinking Tor Messaging a bit, it comes quickly to this ideas and better soluttion.

The way to connect

D) Tor-Chat-Client-Alice - Hidden Onion Server v3 - Tor - Tor - Hidden Onion Server v3 - Tor-Chat-Client-Bob

is the current given way for clientes like RicoChet Refresh, Quiet or Cwtch.

Similar to Briar, even developers of such clients above tell the loss of messages and low reliability of the hidden to hidden path. Some of you might know, that there were use cases with missing messages in a range of 35-45 %. Don't quote me on that, but as core developers and community members you might be in contact with those who experience this.

Furthermore the Messaging clients are not advanced in functionality, nor advanced in strong encryption.

It would be third a long development way to got that route.

It is cost effective and needs cappable developers.

Some project have stamped on and made a workable client, but does that unite all our power in the sense of Tor-Messaging?

Messaging needs a Vision and Statement from the Tor-Core-Developer team with a discussion in the community in that regard with honor to the individual projects and also with support for their chosen path (Model D). At the same time we have to state that it is as it is, a HTTP-Server in the middle like in Model A is faster than Model D.

In the graph-path the Echo-Server in the middle handles only encrypted traffic, so it is just like another Relay. We can call it "Reflec-Tor". The only sense it to multiply incomming encrypted packets from one node to all connected nodes.

With that Idea, the Messenger Spot-On could be used as a Tor-Messenger.

This Messenger has stong encryption and is full of feature for messaging and also cryptography.

it is like adding Firefox to Tor-Browsing, when Spot-On is added to Tor-Messaging.

Something to read at the community forum:

https://www.reddit.com/r/Spot_On_Encryption/

Also there is a Mobile Client for Android, which also connects to Reflec-Tors, find "Smoke" Messenger at F-Droid.org.

Please, get this right, it is not about a technical view on slow and failing chat-packets to hidden servers, and it is not about those start-up clients using this inside technology, some do a good project. It is about the idea, that an Reflec-Tor mirroring and pinging back packets on the Exit-Node this hop within the path of tor is not outside, it is always fully encryted for the messaging packets and should be seen as one Tor-Path, especially if the Listener-Ping-Back function (the Echo capabilities) is build in the Exit-Node-Tor Software.

Spot-On is already a Tor-Messenger - as it uses also HTTPs and it sends only encrypted packets.

A test is easy to make:

(1) Start the Tor-Browser, which has always the Port 9051 to Tor, Tor is running.

Next to Surfing with Tor-Browser Firefox the Chat with Tor-Messenger Spot-On can start.

(2) Start Spot-On on a webserver and create in the Listeners Tab a Listener on Port 4710.

(3) Start two Spot-On Instances Alice and Bob on two Laptops, in the Neighbors Tab you connect the Webserver via Tor: Add the IP and Port 4710 to the neighbor and choose Proxy: 127.0.0.1 Port 4710.

You get the the Path:

Tor-Chat-Client-Alice - Tor - Internet - Echo-Server - Internet - Tor - Tor-Chat-Client-Bob

The idea is now to integrate this a bit more:

Tor-Chat-Client-Spot-On-Alice - Tor - [Tor-Exit-Node also Reflec-Tor (Echo-Server)] - Tor - Tor-Chat-Client-Spot-On-Bob

You see, the way stays all within the Tor-Family.

For sure, in case Alice does not want to use Tor, she also can message to Bob, who is behind Tor.

Tor-Chat-Client-Spot-On-Alice --> [Tor-Exit-Node as Entry-Node also Reflec-Tor (Echo-Server)] - Tor - Tor-Chat-Client-Spot-On-Bob

The IP of an Entry-Node is shown in the Tor-Browser and can get a port added. Then two user can simply cata over that node.

We need in times of surveillance, data retention, chat control and for sake of the needs of whistleblowser and people who want to chat privat and anonymously more decentral and open source chat server.

The mission is: Every Tor-Exit Node is an Entry-Node for Chat.

It should be not a lot of code to be added to the ports of an Exit-Node and displaying the Port of the Exit-Node in the Tor-Browser path icon.

This makes sense in several effects to be discussed and developed further:

  • Taking the next Development Step for Tor-Messaging: BTW, A Forum about Tor-Messaging could be made as a category here in the forum please.

  • directly support Tor-based Messaging for the Spot-On Messaging client

To be developed and discussed is, if this infra-structure could help to

  • support bootstrapping of Tor

  • support Censorship circumvention of Tor Reflec-Tors as SnowFlakes over the Messenger with EPKS

  • Accept, that some routing to an HTTPS internet server at the Tor-Node is faster than to an hidden onion server at the Tor Node.

Well, to add some "ping-in-and-out" for an packet is what every netcat and socat under linux can do. It is a small development step to make each Tor-Exit node a free chat server for messaging, which is a big step for mankind to have a network of free messaging chat servers.

Lets also see, how users and community will test and develop this messaging. So it is not only a discussion for developers, it is also a step forward the needs of the communities for a free internet:

  • for chat and their discussions.

A few code lines to exit nodes make them a Reflec-Tor and messaging over Tor can start really decentral and open source and free.

What do you think? does this privacy-concept bring more privacy and reliability in packet delivery to messaging with Tor?

Regards


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays