[or-cvs] r15266: a few thoughts on the in-progress hidserv report. i also sta (projects/hidserv/trunk/doc)

arma at seul.org arma at seul.org
Sun Jun 15 06:04:13 UTC 2008


Author: arma
Date: 2008-06-15 02:04:13 -0400 (Sun, 15 Jun 2008)
New Revision: 15266

Modified:
   projects/hidserv/trunk/doc/report.tex
Log:
a few thoughts on the in-progress hidserv report.
i also started fixing typos but quickly gave up :)


Modified: projects/hidserv/trunk/doc/report.tex
===================================================================
--- projects/hidserv/trunk/doc/report.tex	2008-06-15 03:27:49 UTC (rev 15265)
+++ projects/hidserv/trunk/doc/report.tex	2008-06-15 06:04:13 UTC (rev 15266)
@@ -23,7 +23,7 @@
 allow users to set up anonymous information services, like websites, that
 can only be accessed through the Tor network and are protected against
 identification of the host that runs the services. The most critical
-limitation of Tor Hidden Services is the time it takes until a hidden
+limitations of Tor Hidden Services are the time it takes until a hidden
 service is registered in the network and the latency of contact
 establishment when accessed by a user. Due to design issues in the original
 Tor protocol, the connection to a new hidden service can take several
@@ -33,7 +33,7 @@
 latency of hidden service circuit setup. 
 
 This document describes measurements of setting up and accessing a Tor
-Hidden Service. The first part of these measurements consist of an
+Hidden Service. The first part of these measurements consists of an
 \emph{external view} of a user experiencing the delay in publishing a
 hidden
 service, establishing a connection to an existing hidden service, sending
@@ -43,12 +43,12 @@
 connection establishing. The following questions shall be answered:
 
 \begin{description}
-\item[Service Publication] How long does it take from a starting Tor
+\item[Service Publication] How long does it take from starting a Tor
 process that is configured to provide a hidden service until the hidden
 service is advertised in the network and accessible by clients?
 \item[Connection Establishment] How long does it take for a client to open
-a connection to an existing hidden service. As this includes multiple
-substeps, there are two distinct measurements to answer this question, one
+a connection to an existing hidden service? As this includes multiple
+substeps, there are two distinct measurements to answer this question: one
 measuring the overall connection establishment time and one measuring the X
 internal substeps\footnote{\emph{TODO Christian: How many substeps are
 there in your setup?}}
@@ -64,10 +64,10 @@
 %% \emph{TODO Christian: Your protocol description might also help for
 %% understanding service publication, so it might be useful to have it here in
 %% a separate section.}
-This sections describes the protocol of establishing and accessing hidden
+This section describes the protocol for establishing and accessing hidden
 services in detail. An overview is shown in Figure~\ref{fig:hs_overview}.
 
-Consider a user called Bob wants to offer a location-hidden service.
+Consider a user called Bob who wants to offer a location-hidden service.
 All Bob needs to do to establish a hidden service is to set up the actual
 service to start the Tor client, which is configured to provide a hidden service.
 
@@ -96,6 +96,7 @@
 key. The hidden server uploads the descriptor and a unique identifier for the 
 service, the onion address built from a random hash, to the hidden service
 directory.
+% XXX actually, not random. based on public key, so we can self-sign -RD
 
 If a user called Alice wants to access a hidden service, she must have learned 
 the onion address before out-of-band.
@@ -537,6 +538,8 @@
 test run), resulting in a total of 1,090 data samples. A tarball with all
 log files is available
 online.\footnote{\url{http://freehaven.net/~karsten/hidserv/test-env.tar.gz}}
+% Put dates in the name or something, or you're going to be forever
+% regretting your choice of filename. :) -RD
 
 During evaluation it has turned out that there is a bug in Tor that leads
 to a delay in service publication (see below for details). This made it
@@ -613,6 +616,11 @@
 It turned out that the reason for this is a minor bug in the code which is
 now fixed. See SVN revision r15113 for
 details.\footnote{\url{http://archives.seul.org/or/cvs/Jun-2008/msg00231.html}}
+% Include "and the fix was released in Tor 0.2.0.x-rc" too for each time
+% you point to an svn revision -RD
+% Also, it would probably be good to mention in which version each bug
+% introduced. This will make it look great when you fix the bugs that
+% were in since Tor 0.0.6. -RD
 This is not meant as confirmation for the usefulness of the 30-second
 delay, but only to make the implementation consistent with the
 specification.
@@ -761,6 +769,7 @@
 Figure~\ref{fig:introcirc} shows that in most cases the introduction circuit
 is open within seconds. For the values around 60 seconds the circuit could not 
 be cannibalized successfully and after a timeout of one minute a second attempt
+% Boy, a timeout of one minute seems dumb here. Almost like it's a bug? :) -RD
 is started. The reasons for failing cannibalization can be that only the actual
 extension, i.e.\ connection to the introduction point fails or that a circuit
 was chosen for extension, that was not open yet. That means, that also the first
@@ -775,6 +784,7 @@
 
 \paragraph{Cell Transfer Over the Same Circuit}
 
+% XXX do you mean \ref{fig:estrend_rendack} here? -RD
 Figure~\ref{fig:introcirc} compares the transfer times of the 
 ESTABLISH\_RENDEZVOUS and RENDEZVOUS\_ACK cells sent over the same rendezvous
 circuit. Although for very low values below 0.1 seconds the latter is
@@ -783,6 +793,7 @@
 
 Also interesting is the formation around the acknowledgments with one second, 
 which also occur for ESTABLISH\_RENDEZVOUS cell, that are twice as fast.
+% What might that mean? That's weird. -RD
 
 \begin{figure}
 \centering
@@ -820,6 +831,10 @@
 Further, in some cases mean request times are up to two orders of magnitude
 higher than mean response times and vice versa. This is rather surprising,
 because both messages are routed via the same Tor circuit.
+% Perhaps it's because there's a high-volume flow moving in one direction
+% over one of the nodes in the circuit but it's only light in the other?
+% I would imagine that's pretty common actually. Mike Perry can speculate
+% more here. -RD
 
 At the moment, message transfer times raise more questions than can be
 answered. However, these questions are not directly related to hidden
@@ -857,6 +872,9 @@
 need to put special focus on it in the attempt to improve the hidden
 service protocol.
 
+% Also worth mentioning that most of the requested ports were not in
+% LongLivedPorts, so we can expect even higher stability for IM. -RD
+
 \section{Discussion}
 
 Ideas what changes are most likely to improve the overall performance.



More information about the tor-commits mailing list