[or-cvs] r15606: Add two new proposals. (in tor/trunk: . doc/spec/proposals)

nickm at seul.org nickm at seul.org
Wed Jul 2 18:04:02 UTC 2008


Author: nickm
Date: 2008-07-02 14:04:01 -0400 (Wed, 02 Jul 2008)
New Revision: 15606

Added:
   tor/trunk/doc/spec/proposals/145-newguard-flag.txt
   tor/trunk/doc/spec/proposals/146-long-term-stability.txt
Modified:
   tor/trunk/
   tor/trunk/doc/spec/proposals/000-index.txt
Log:
 r16664 at tombo:  nickm | 2008-07-02 14:03:44 -0400
 Add two new proposals.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r16664] on 49666b30-7950-49c5-bedf-9dc8f3168102

Modified: tor/trunk/doc/spec/proposals/000-index.txt
===================================================================
--- tor/trunk/doc/spec/proposals/000-index.txt	2008-07-02 17:55:08 UTC (rev 15605)
+++ tor/trunk/doc/spec/proposals/000-index.txt	2008-07-02 18:04:01 UTC (rev 15606)
@@ -67,6 +67,8 @@
 142  Combine Introduction and Rendezvous Points [OPEN]
 143  Improvements of Distributed Storage for Tor Hidden Service Descriptors [OPEN]
 144  Increase the diversity of circuits by detecting nodes belonging the [DRAFT]
+145  Separate "suitable as a guard" from "suitable as a new guard" [DRAFT]
+146  Add new flag to reflect long-term stability [DRAFT]
 
 
 Proposals by status:
@@ -80,6 +82,8 @@
    134  More robust consensus voting with diverse authority sets
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the
+   145  Separate "suitable as a guard" from "suitable as a new guard"
+   146  Add new flag to reflect long-term stability
  OPEN:
    120  Shutdown descriptors when Tor servers stop
    121  Hidden Service Authentication

Added: tor/trunk/doc/spec/proposals/145-newguard-flag.txt
===================================================================
--- tor/trunk/doc/spec/proposals/145-newguard-flag.txt	                        (rev 0)
+++ tor/trunk/doc/spec/proposals/145-newguard-flag.txt	2008-07-02 18:04:01 UTC (rev 15606)
@@ -0,0 +1,37 @@
+Filename: 145-newguard-flag.txt
+Title: Separate "suitable as a guard" from "suitable as a new guard"
+Version: $Revision$
+Last-Modified: $Date$
+Author: Nick Mathewson
+Created: 1-Jul-2008
+Status: Draft
+
+Overview
+
+   Right now, Tor has one flag that clients use both to tell which
+   nodes should be kept as guards, and which nodes should be picked
+   when choosing new guards.  This proposal separates this flag into
+   two.
+
+Motivation
+
+   Balancing clients amoung guards is not done well by our current
+   algorithm.  When a new guard appears, it is chosen by clients
+   looking for a new guard with the same probability as all existing
+   guards... but new guards are likelier to be under capacity, whereas
+   old guards are likelier to be under more use.
+
+Implementation
+
+   We add a new flag, NewGuard.  Clients will change so that when they
+   are choosing new guards, they only consider nodes with the NewGuard
+   flag set.
+
+   For now, authorities will always set NewGuard if they are setting
+   the Guard flag.  Later, it will be easy to migrate authorities to
+   set NewGuard for underused guards.
+
+Alternatives
+
+   We might instead have authorities list weights with which nodes
+   should be picked as guards.


Property changes on: tor/trunk/doc/spec/proposals/145-newguard-flag.txt
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision
Name: svn:eol-style
   + native

Added: tor/trunk/doc/spec/proposals/146-long-term-stability.txt
===================================================================
--- tor/trunk/doc/spec/proposals/146-long-term-stability.txt	                        (rev 0)
+++ tor/trunk/doc/spec/proposals/146-long-term-stability.txt	2008-07-02 18:04:01 UTC (rev 15606)
@@ -0,0 +1,85 @@
+Filename: 146-long-term-stability.txt
+Title: Add new flag to reflect long-term stability
+Version: $Revision$
+Last-Modified: $Date$
+Author: Nick Mathewson
+Created: 19-Jun-2008
+Status: Draft
+
+Overview
+
+  This document proposes a new flag to indicate that a router has
+  existed at the same address for a long time, describes how to
+  implement it, and explains what it's good for.
+
+Motivation
+
+  Tor has had three notions of "stability" for servers.  Older
+  directory protocols based a server's stability on its
+  (self-reported) uptime: a server that had been running for a day was
+  more stable than a server that had been running for five minutes,
+  regardless of their past history.  Current directory protocols track
+  weighted mean time between failure (WMTBF) and weighted fractional
+  uptime (WFU).  WFU is computed as the fraction of time for which the
+  server is running, with measurements weighted to exponentially
+  decay such that old days count less.  WMTBF is computed as the the
+  average length of intervals for which the server runs between
+  downtime, with old intervals weighted to count less.
+
+  WMTBF is useful in answering the question: "If a server is running
+  now, how long is it likely to stay running?"  This makes it a good
+  choice for picking servers for streams that need to be long-lived.
+  WFU is useful in answering the question: "If I try connecting to
+  this server at an arbitrary time, is it likely to be running?"  This
+  makes it an important factor for picking guard nodes, since we want
+  guard nodes to be usually-up.
+
+  There are other questions that clients want to answer, however, for
+  which the current flags aren't very useful.   The one that this
+  proposal addresses is,
+
+       "If I found this server in an old consensus, is it likely to
+       still be running at the same address?"
+
+  This one is useful when we're trying to find directory mirrors in a
+  fallback-consensus file.  This property is equivalent to,
+
+       "If I find this server in a current consensus, how long is it
+       likely to exist on the network?"
+
+  This one is usefule if we're trying to pick introduction points or
+  something and care more about churn rate than about whether every IP
+  will be up all the time.
+
+Implementation:
+
+  I propose we add a new flag, called "Longterm."  Authorities should
+  set this flag for routers if their Longevity is in the upper
+  quartile of all routers.  A router's Longevity is computed as the
+  total amount of days in the last year or so[*] for which the router has
+  been Running at least once at its current IP:orport pair.
+
+  Clients should use directory servers from a fallback-consensus only
+  if they have the Longterm flag set.
+
+  Authority ops should be able to mark particular routers as not
+  Longterm, regardless of history.  (For instance, it makes sense to
+  remove the Longterm flag from a router whose op says that it will
+  need to shutdown in a month.)
+
+  [*] This is deliberately vague, to permit efficient implementations.
+
+Compatibility and migration issues:
+
+  The voting protocol already acts gracefully when new flags are
+  added, so no change to the voting protocol is needed.
+
+  Tor won't have collected this data, however.  It might be desirable
+  to bootstrap it from historical consensuses.  Alternatively, we can
+  just let the algorithm run for a month or two.
+
+Issues and future possibilities:
+
+  Longterm is a really awkward name.
+
+


Property changes on: tor/trunk/doc/spec/proposals/146-long-term-stability.txt
___________________________________________________________________
Name: svn:keywords
   + Author Date Id Revision
Name: svn:eol-style
   + native



More information about the tor-commits mailing list