[tor-bugs] #5707 [Tor]: Use end to end stream timing data to further prune circuits

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri May 3 00:59:35 UTC 2013


#5707: Use end to end stream timing data to further prune circuits
------------------------------------------------------------+---------------
 Reporter:  mikeperry                                       |          Owner:  mikeperry         
     Type:  enhancement                                     |         Status:  assigned          
 Priority:  normal                                          |      Milestone:  Tor: 0.2.5.x-final
Component:  Tor                                             |        Version:                    
 Keywords:  SponsorZ performance needs-research tor-client  |         Parent:                    
   Points:                                                  |   Actualpoints:                    
------------------------------------------------------------+---------------

Comment(by mikeperry):

 Replying to [comment:10 arma]:
 > All the researchers doing Tor anonymity analysis get really agitated
 when we add new path selection approaches that aren't based on global
 information. And assuming the congestion is inside the network, where
 you're connecting from shouldn't make a big impact. And finally, all these
 "local not global" approaches raise complex questions about an adversary
 who influences a target user's opinions to influence her paths.
 >
 > So the first question is, how well can we approximate your above plans
 with probers (a la bwauths)? And the followup question is, how much
 information do we need to put into e.g. the consensus for it to work?

 Tor latency has a heavy weight on local characteristics in many instances.

 In fact, the consensus is *exactly* the right place to put a timeout to
 allow a local/censorship adversary to look at the consensus, look at your
 traffic, and delay your circuit by just enough to make it fail when they
 want, so your routes go *where* they want.

 This information needs to be computed locally so we can ensure that your
 Tor client completes a predictable percentage of the total available
 network paths, exactly like the CBT math does.

 In fact, that math actually *works* in the current tor implementation. To
 within +/- 1%, 80% of your circuits build before the circuit build
 timeoutthat your client learns, and you can observe this fact in your logs
 and in the BUILDTIMEOUT_SET values captured by Torperf.

 You keep telling me not to design systems optimized for just one Internet
 connection, and I'm telling you CBT is that system. Please read the spec
 and tell me how to improve it so that this is clear to you:
 https://gitweb.torproject.org/torspec.git/blob/master:/path-spec.txt#l309

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5707#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list