Added page for NLnet Hidden...
Karsten Loesing authored 16 years ago
|
1) ## translation metadata
2) # Revision: $Revision: 14486 $
3) # Translation-Priority: 3-low
4)
5) #include "head.wmi" TITLE="NLnet Project: Speed Up Tor Hidden Services"
6)
7) <div class="main-column">
8)
9) <!-- PUT CONTENT AFTER THIS TAG -->
10)
11) <h2>NLnet Project: Speed Up Tor Hidden Services</h2>
12) <hr />
13)
14) <p>
15) Tor Hidden Services allow users to set up anonymous information services,
16) like websites, that can only be accessed through the Tor network and are
17) protected against identification of the host that runs the services.
|
Minor correction to grammar.
Karsten Loesing authored 16 years ago
|
18) The most critical limitations of Tor Hidden Services are the time it takes
|
Added page for NLnet Hidden...
Karsten Loesing authored 16 years ago
|
19) until a Hidden Service is registered in the network and the latency of
20) contact establishment when accessed by a user.
21) Due to design issues in the original Tor protocol,
22) the connection to a new Hidden Service can take several minutes, which
23) leads most users to give up before the connection has been established.
24) Using Tor Hidden Services for direct interactive user-to-user
25) communication (e.g. messaging) is nearly impossible due to the high latency
26) of Hidden Service circuit setup.
27) </p>
28)
29) <p>
30) This project aims at speeding up Tor Hidden Services by improving the way
31) Tor circuits are set up between the user and the Hidden Service as well as
32) the way a Hidden Service is registered in the Tor network.
33) In a first step precise diagnostics of the behavior of the Hidden Services
34) in lab setups and real world situations will be conducted to find the
35) root causes of the bad timing effects.
36) Based on these diagnostics, optimization strategies will be designed and
37) verified for unwanted implications for the security and anonymity of the
38) Tor network.
39) The most promising optimizations will then be implemented to achieve a
40) notable improvement for the users. Precise success metrics will be
41) developed in the diagnostics phase, after it becomes clear where the time
42) is lost and what improvements are realistic.
43) The ultimate goal is to have the Hidden Services protocol change production
44) ready and propagated to the Tor users within a timeframe of less than
45) 12 months.
46) </p>
47)
48) <p>
|
Added NLnet logo to project...
Karsten Loesing authored 16 years ago
|
49) This project is generously funded by:
50) </p>
51)
52) <p>
53) <a href="http://www.nlnet.nl/news/2008/20080514-awards.html">
54) <img src="$(IMGROOT)/nlnet-160x60.png" alt="The NLnet foundation" /></a>
|
Added page for NLnet Hidden...
Karsten Loesing authored 16 years ago
|
55) </p>
56)
57) <table width="100%" border="0" cellspacing="0" cellpadding="3">
|
Fix the table column headers.
Andrew Lewman authored 16 years ago
|
58) <thead>
59) <tr>
60) <th><big>Project</big></th>
61) <th><big>Due Date</big></th>
|
Added page for NLnet Hidden...
Karsten Loesing authored 16 years ago
|
62) </tr>
|
Fix the table column headers.
Andrew Lewman authored 16 years ago
|
63) </thead>
|
Added page for NLnet Hidden...
Karsten Loesing authored 16 years ago
|
64)
65) <tr bgcolor="#e5e5e5">
66) <td>
67) <b>Deliverable A:</b> Analysis, measurements and problem
68) clarification<br />
69) <small><em>As Tor Hidden Services have not been actively developed
70) further in the last year or so of Tor development, certain aspects of
71) the problems are under-diagnosed. To identify the precise sources of
72) latency and time loss, an extensive analysis of the deeper reasons for
73) them needs to be conducted. Deliverable A will require about one month
74) of work. The results of the analysis will influence the design
75) decisions to be taken in Deliverable B.</em></small>
76) </td>
77) <td>
78) June 15, 2008
79) </td>
80) </tr>
81)
82) <tr>
83) <td>
84) <b>Deliverable B:</b> Design and evaluation of the necessary
85) changes<br />
86) <small><em>The changes to Tor Hidden Services will affect core
87) functionality of the protocol and therefore require a careful
88) evaluation of possible repercussions for the security and anonymity. A
89) two-month period is planned for the design and evaluation phase, which
90) concludes with an extensive peer review.</em></small>
91) </td>
92) <td>
93) August 15, 2008
94) </td>
95) </tr>
96)
97) <tr bgcolor="#e5e5e5">
98) <td>
99) <b>Deliverable C:</b> Implementation<br />
100) <small><em>After design, evaluation and peer review the modifications
101) need to be implemented and integrated with the current Tor code base.
102) The actual implementation of the necessary changes will take
103) approximately two months.</em></small>
104) </td>
105) <td>
106) October 15, 2008
107) </td>
108) </tr>
109)
110) <tr>
111) <td>
112) <b>Deliverable D:</b> Implementation and test of the change up to
113) release state<br />
114) <small><em>The modification is highly critical to the security and
115) anonymity of the Tor network, it requires extensive testing and
116) debugging in laboratory and real life conditions. A period of three
117) months is projected for testing and debugging, where the responsible
118) developer is committed to the testing effort with 1/3 of its time. Part
119) of the testing phase will be a public beta period.</em></small>
120) </td>
121) <td>
122) January 15, 2009
123) </td>
124) </tr>
125)
126) <tr bgcolor="#e5e5e5">
127) <td>
128) <b>Deliverable E:</b> Rollout<br />
129) <small><em>The actual rollout to the Tor server network will be
130) conducted in sync with the regular Tor release schedule. As this
131) schedule is dependent on a number of external factors, like the
132) completion of other software projects that should go into the same
133) release, the actual release time and the time until this release has
134) been accepted and installed by most Tor server operators can vary. From
135) experience a period of three to four months can be
136) expected.</em></small>
137) </td>
138) <td>
139) May 15, 2009
140) </td>
141) </tr>
142) </table>
143)
144) <br />
145)
146) <a id="Reports"></a>
147) <h2><a class="anchor" href="#Reports">Monthly Status Reports</a></h2>
148) <p>
149) There will be in total eight monthly status reports beginning with the
150) first deliverable on June 15, 2008 and ending with completion of
151) implementation and testing work on January 15, 2009.
152) </p>
153)
|
Added first monthly status...
Karsten Loesing authored 16 years ago
|
154) <table width="100%" border="0" cellspacing="0" cellpadding="3">
155) <thead>
156) <tr>
157) <th><big>Month,</big></th>
158) <th><big>Status Report</big></th>
159) </tr>
160) </thead>
161)
162) <tr bgcolor="#e5e5e5">
163) <td>
164) Jun 08
165) </td>
166) <td>
167) <small><em>The original goal of analyzing the problems that lead to
168) slowdown of Tor Hidden Services has been accomplished. Part of this
169) analysis were measurements of the delay that a user experiences when
170) setting up or accessing a hidden service. Furthermore, measurement data
171) from April 2008 could be leveraged to explore timings of internal
172) substeps of establishing a connection to a hidden service. The results
173) of this analysis are contained in a 22-page
174) <a href="http://freehaven.net/~karsten/hidserv/perfanalysis-2008-06-15.pdf">report</a>
175) that has been made public on the Tor
176) <a href="http://archives.seul.org/or/dev/Jun-2008/msg00019.html">developer
177) mailing list</a>.</small></em>
178) <br/>
179) <small><em>The analysis has unveiled a few bugs which were responsible
180) in parts for the delay in making a hidden service available for
181) clients. Some bugs have been fixed subsequent to the analysis, others
182) will be fixed soon. The evaluation has further brought up several
183) possible approaches to improve Tor Hidden Service performance. Some of
184) these ideas can be applied immediately, while others require deeper
185) analysis and new measurements. Finally, in the course of the analysis,
186) it has been discovered that some improvements require more in-depth
187) changes to Tor which are not directly related to hidden services. These
188) changes cannot be achieved in the time frame of this
189) project.</small></em>
190) </td>
191) </tr>
192)
193) <tr>
194) <td>
195) Jul 08
196) </td>
197) <td>
198) </td>
199) </tr>
200)
201) <tr bgcolor="#e5e5e5">
202) <td>
203) Aug 08
204) </td>
205) <td>
206) </td>
207) </tr>
208)
209) <tr>
210) <td>
211) Sep 08
212) </td>
213) <td>
214) </td>
215) </tr>
216)
217) <tr bgcolor="#e5e5e5">
218) <td>
219) Oct 08
220) </td>
221) <td>
222) </td>
223) </tr>
224)
225) <tr>
226) <td>
227) Nov 08
228) </td>
229) <td>
230) </td>
231) </tr>
232)
233) <tr bgcolor="#e5e5e5">
234) <td>
235) Dec 08
236) </td>
237) <td>
238) </td>
239) </tr>
240)
241) <tr>
242) <td>
243) Jan 09
244) </td>
245) <td>
246) </td>
247) </tr>
248) </table>
249)
250) <br />
|