a fresh set of excuses why we don't make you a relay by default
Roger Dingledine

Roger Dingledine commited on 2009-01-17 19:12:32
Zeige 1 geänderte Dateien mit 43 Einfügungen und 28 Löschungen.

... ...
@@ -738,12 +738,11 @@ user be a relay.</a></h3>
738 738
 
739 739
 <p>
740 740
 Requiring every Tor user to be a relay would help with scaling the
741
-network to handle all our users, and [#RelayAnonymity running a Tor
742
-relay may help your anonymity]. However, many Tor users cannot be good
743
-relays -- for example, some Tor clients operate from behind restrictive
744
-firewalls or could be subject to penalties for relaying traffic (e.g.,
745
-potentially questionable exit connections, encrypted connections, or any
746
-connections at all). Providing service to these clients is a critical
741
+network to handle all our users, and <a href="#RelayAnonymity">running a Tor
742
+relay may help your anonymity</a>. However, many Tor users cannot be good
743
+relays &mdash; for example, some Tor clients operate from behind restrictive
744
+firewalls, connect via modem, or otherwise aren't in a position where they
745
+can relay traffic. Providing service to these clients is a critical
747 746
 part of providing effective anonymity for everyone, since many Tor users
748 747
 are subject to these or similar constraints and including these clients
749 748
 increases the size of the anonymity set.
... ...
@@ -752,7 +751,10 @@ increases the size of the anonymity set.
752 751
 <p>
753 752
 That said, we do want to encourage Tor users to run relays, so what we
754 753
 really want to do is simplify the process of setting up and maintaining
755
-a relay.
754
+a relay. We've made a lot of progress with easy configuration in the past
755
+few years: Vidalia has an easy relay configuration interface, and supports
756
+uPnP too. Tor is good at automatically detecting whether it's reachable and
757
+how much bandwidth it can offer.
756 758
 </p>
757 759
 
758 760
 <p>
... ...
@@ -760,41 +762,54 @@ There are five steps we need to address before we can do this though:
760 762
 </p>
761 763
 
762 764
 <p>
763
-First, we need to make Tor stable as a relay on all common operating
764
-systems. [:TheOnionRouter/WindowsBufferProblems:We haven't achieved this
765
-on Windows XP yet, and we need your help.]
765
+First, we need to make Tor stable as a relay on all common
766
+operating systems. The main remaining platform is Windows,
767
+and we plan to finally address that in 2009. See Section 4.1 of <a
768
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our
769
+development roadmap</a>.
766 770
 </p>
767 771
 
768 772
 <p>
769
-Second, we need easy configuration -- requiring users to edit text files
770
-is bad for adoption. The [http://vidalia-project.net/ Vidalia project]
771
-is making great progress on this part.
773
+Second, we still need to get better at automatically estimating
774
+the right amount of bandwidth to allow. See item #7 on the
775
+<a href="<page volunteer>#Research">research section of the
776
+volunteer page</a>: "Tor doesn't work very well when relays
777
+have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a
778
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP">switching
779
+to UDP transport</a> is the simplest answer here &mdash; which alas is
780
+not a very simple answer at all.
772 781
 </p>
773 782
 
774 783
 <p>
775
-Third, Tor needs to do more tasks automatically: we need it to
776
-automatically detect appropriate bandwidth, help you with opening ports
777
-in your firewall, et cetera. We need to let people rate-limit outside
778
-connections without limiting their own connections -- this is hard because
779
-Tor puts traffic from different people on the same TCP stream, so we can't
780
-tell whether we should read it off the network without first reading it.
784
+Third, we need to work on scalability, both of the network (how to
785
+stop requiring that all Tor relays be able to connect to all Tor
786
+relays) and of the directory (how to stop requiring that all Tor
787
+users know about all Tor relays). Changes like this can have large
788
+impact on potential and actual anonymity. See Section 5 of the <a
789
+href="<svnsandbox>doc/design-paper/challenges.pdf">Challenges</a> paper
790
+for details. Again, UDP transport would help here.
781 791
 </p>
782 792
 
783 793
 <p>
784
-Fourth, we need to work on scalability, both of the network (how
785
-to stop requiring that all Tor relays be able to connect to all
786
-Tor relays) and of the directory (how to stop requiring that all
787
-Tor users know about all Tor relays). Changes like this can have
788
-large impact on potential and actual anonymity. See Section 5 of the
789
-[https://www.torproject.org/svn/trunk/doc/design-paper/challenges.pdf
790
-Challenges] paper for details.
794
+Fourth, we need to better understand the risks from
795
+letting the attacker send traffic through your relay while
796
+you're also initiating your own anonymized traffic. <a
797
+href="http://freehaven.net/anonbib/#back01">Three</a> <a
798
+href="http://freehaven.net/anonbib/#clog-the-queue">different</a>
799
+<a href="http://freehaven.net/anonbib/#torta05">research</a> papers
800
+describe ways to identify the relays in a circuit by running traffic
801
+through candidate relays and looking for dips in the traffic while the
802
+circuit is active. These clogging attacks are not that scary in the Tor
803
+context so long as relays are never clients too. But if we're trying to
804
+encourage more clients to turn on relay functionality too (whether as
805
+<a href="<page bridges>">bridge relays</a> or as normal relays), then
806
+we need to understand this threat better and learn how to mitigate it.
791 807
 </p>
792 808
 
793 809
 <p>
794 810
 Fifth, we might need some sort of incentive scheme to encourage people
795 811
 to relay traffic for others, and/or to become exit nodes. Here are our
796
-[https://www.torproject.org/svn/trunk/doc/contrib/incentives.txt early
797
-thoughts on Tor incentives].
812
+<a href="cite-upcoming-blog-post">current thoughts on Tor incentives</a>.
798 813
 </p>
799 814
 
800 815
 <p>
801 816