Christopher Baines cbaines8@gmail.com writes:
On 20/10/14 14:37, George Kadianakis wrote:
f) On a more researchy tone, this might also be a good point to start poking at the HS scalability project since it will really affect HS performance.
We should look at Christopher Baines' ideas and write a Tor proposal out of them: https://lists.torproject.org/pipermail/tor-dev/2014-April/006788.html https://lists.torproject.org/pipermail/tor-dev/2014-May/006812.html Last time I looked, Christopher's ideas required implementing proposal225 and #8239.
I am still around, and interested in helping out with this! :)
Hello,
glad to see you are still interested in this.
I think the first step here is to write a document with the various solutions, their requirements, and how they influence the threat model.
First of all, what do we mean by scalability and what properties are we trying to offer?
On concrete schemes now, what features are needed to implement your scheme [0]? Can these requirements be changed? For example, on the topic of selecting IPs, can we dump the requirement for global randomness, by using the long-term private key as a seed to picking IPs?
Also, what's the threat model of your scheme? What more information do the IPs learn? What more information do the clients learn?
What other ways are there to do HS scalability? How does their threat model change [1]? etc.
By the way, is your thesis somewhere public? I imagine that it tackles a few of these questions already.
Thanks!
[0]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006788.html [1]: https://lists.torproject.org/pipermail/tor-dev/2013-October/005683.html