After talking with APNIC/RIPE, it looks like that if we ask nicely we can get high-quality BGP-peering graphs for the entire Internet (not 100% complete, but it's the same data they use internally).

Spend some time thinking about exactly what kinds of attacks we wish to harden against.  Once we understand the attacks, I'll figure out the appropriate graph-theory for hardening against it.

-V

On Mon, Sep 21, 2015 at 6:48 PM Moritz Bartl <moritz@torservers.net> wrote:
Interesting, thanks for the update. Maybe we can find some time at the
dev meeting to chat. :)

Moritz

On 09/10/2015 07:12 AM, Virgil Griffith wrote:
> I'm at an APNIC conference in Jakarta, and they demoed a new tool which
> shows the interconnections (peering + transits) between AS numbers
> within a given country (will eventually work for regions).
>
> URL: http://labs.apnic.net/vizas/
> Left-panel is IPv4 and right-panel is IPv6.
>
> Here is the fellow who built it:
> https://www.linkedin.com/pub/geoff-huston/42/828/891
>
>
> For Tor, this tool helps us prioritize the ASs for new relays.  To
> maximize censorship resistance, we would want relays on AS numbers in
> the middle (lots of interconnections) that do not currently have Tor relays.
>
> We can imagine giving out Roster bonus points depending on the
> AS-number.  The points would go something like:
>
> AS_i_bonus_points = ASweight(i) / #_Tor_relays_on_AS
>
> ASweight(i) = k * \sum_{j=1}^n num_ips_routed_by_edge_i_j
> where k is an arbitrary constant (k=1 is reasonable).
>
> This could be very useful for deciding where to put new relays.  I'll
> see if I can access to the raw data that generates these graphs so we
> have more than just pretty pictures.
>
> Much love,
> -V

--
Moritz Bartl
https://www.torservers.net/