[tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

teor teor2345 at gmail.com
Thu Sep 29 06:35:37 UTC 2016

> On 27 Sep 2016, at 09:37, Ivan Markin <twim at riseup.net> wrote:
> Hi tor-dev@,
> Ivan Markin:
>> IMO an onion service should publish its first descriptor instantly. If
>> something happens afterwards and one has to fix the descriptor - deal
>> with it with backoff/delay to prevent DoS on HSDirs.
>> I think that most of the ephemeral services are not going to use more
>> than one descriptor. Moreover, they are going to use just one
>> introduction point. So it's not a big deal if one of the published IPs
>> fails since a client is going to use one of the rest.
>> Also note the reachability issue I mentioned.
>> teor:
>>> It would be nice to have this change in 0.2.9 for Single Onion
>>> Services and I think also for HSs with OnionBalance
> Can we actually have this in 029? If yes, how should we do it exactly?

Submit a patch on the ticket that changes the interval to 5 seconds, and
see if it gets accepted before the code freeze:

It would help to come up with a reasoned argument why 5 seconds is better
than 30 seconds, and why it can't possibly be any worse under any

Alternately, write a patch to proposal 224 to specify 30 seconds, and
wait for it to be implemented in 0.3.0 or 0.3.1.


> This issue gets more and more annoying. Mostly because of the
> (un-)reachability issue.
> --
> Ivan Markin
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
xmpp: teor at torproject dot org

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20160928/c3074484/attachment-0001.sig>

More information about the tor-dev mailing list