[tor-bugs] #2286 [Tor Directory Authority]: We still use self-published relay bandwidth sometimes

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Tue May 22 06:57:19 UTC 2012


#2286: We still use self-published relay bandwidth sometimes
-------------------------------------+--------------------------------------
 Reporter:  arma                     |          Owner:                    
     Type:  defect                   |         Status:  needs_review      
 Priority:  major                    |      Milestone:  Tor: 0.2.3.x-final
Component:  Tor Directory Authority  |        Version:                    
 Keywords:  arma-cares               |         Parent:                    
   Points:                           |   Actualpoints:                    
-------------------------------------+--------------------------------------

Comment(by arma):

 Replying to [comment:29 nickm]:
 > Roger, I don't get at this point why you prefer your alternative
 approach (vote differently) vs the one I started to implement (consense
 differently).  I kind of prefer the latter, since it doesn't change the
 meaning of any vote, and it looks like we'll probably need a new consensus
 method anyway.

 I'm open to either approach. We'll want to make sure we don't cap all
 nodes to 50 in the case where there aren't enough bwauths putting in
 Measured votes. We may also find that we want to only cap weights when a
 certain threshold of the relays have a Measured vote. I'm not sure if
 we'll want to do that threshold, or what we'll want it to be, so I had
 figured leaving the flexibility to each authority might make it easier.
 For example, I worry about a case where all the bwauths restart afresh and
 have just a few votes each -- currently it makes sense for them to include
 the votes, but now they'd better think about not putting in any votes
 until they have quite a few.

 That said, we also want to avoid an attack where the adversary floods the
 network with new nodes, and suddenly the bwauths take away their caps
 because they haven't covered the required threshold of the nodes yet.

 *That* said, now that it looks like we're going to be making a new
 consensus method anyway, there's not as much reason left to avoid doing it
 in the consensus.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2286#comment:31>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list