[tor-bugs] #16297 [Tor]: Reduce Sybil harm while still getting use out of them

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Jun 5 15:08:35 UTC 2015


#16297: Reduce Sybil harm while still getting use out of them
-------------------------+---------------------
 Reporter:  phw          |          Owner:  phw
     Type:  enhancement  |         Status:  new
 Priority:  normal       |      Milestone:
Component:  Tor          |        Version:
 Keywords:  sybil        |  Actual Points:
Parent ID:               |         Points:
-------------------------+---------------------
 With the exception of bad exit relays, we have a binary approach to
 dealing with bad relays; we either let them be, or remove them from the
 network.  That's not always appropriate because Sybils can be useful,
 provided we strip them of power.  In particular, we probably want to
 prevent them from becoming:
 * Anything hidden service-related (HSDirs, introduction points, rendezvous
 points)
 * Exit relays
 * Guard relays
 * Maybe even directory mirrors?

 One possibility would be an option such as `AuthDirRestrain`, that
 specifies which relay should be stripped of powers.  Another possibility
 would be a set of more fine-grained options but that sounds less useful
 because it assumes that we know what a bad relays is up to.  Often,
 however, we are only aware of a subset of the actual attack.

 If we indeed want something like `AuthDirRestrain`, we should also think
 about the voting process.  The `AuthDirBadExit` process works well so far
 because we have three voters, whereof two are typically quick to act.  It
 doesn't work that well for `AuthDirReject` where we need the majority of
 all nine authority operators.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16297>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list