[tor-bugs] #24010 [Core Tor/Torflow]: Make bandwidth authorities use DNS, not IP addresses
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Oct 26 21:26:27 UTC 2017
#24010: Make bandwidth authorities use DNS, not IP addresses
------------------------------+------------------------
Reporter: teor | Owner: aagbsn
Type: defect | Status: new
Priority: High | Milestone:
Component: Core Tor/Torflow | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: #21394 | Points: 1
Reviewer: | Sponsor:
------------------------------+------------------------
Comment (by teor):
Replying to [comment:5 micah]:
> This strikes me as adding a potentially fragile layer to an already
teetering edifice.
>
> …
>
> I get the point of doing this, but I am not convinced that this should
be the role of bandwidth scanners. Bandwidth scanners should be simply
testing the speed of the network, and nothing else. Its already overly
complicated, even for that one task. I think DNS reachability tests are
important, and the problem does need to be fixed, but I wonder if this
should be done some other way. Perhaps in the client itself? I am unsure.
If the role of bandwidth scanners is to measure bandwidth *as clients
experience it*, then using at least some DNS is appropriate.
We could use a mix of DNS and IP, because that's what clients do. And if
we use a CDN as the server, it will need DNS.
Maybe clients should give up on timed out circuits faster, I opened #24022
for this.
Also, exits can check their own DNS (#24014), but judging what is a slow
resolve is hard, because it needs a comparison to other exits.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24010#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list