Roger Dingledine commited on 2009-01-17 19:12:32
Zeige 1 geänderte Dateien mit 43 Einfügungen und 28 Löschungen.
... | ... |
@@ -738,12 +738,11 @@ user be a relay.</a></h3> |
738 | 738 |
|
739 | 739 |
<p> |
740 | 740 |
Requiring every Tor user to be a relay would help with scaling the |
741 |
-network to handle all our users, and [#RelayAnonymity running a Tor |
|
742 |
-relay may help your anonymity]. However, many Tor users cannot be good |
|
743 |
-relays -- for example, some Tor clients operate from behind restrictive |
|
744 |
-firewalls or could be subject to penalties for relaying traffic (e.g., |
|
745 |
-potentially questionable exit connections, encrypted connections, or any |
|
746 |
-connections at all). Providing service to these clients is a critical |
|
741 |
+network to handle all our users, and <a href="#RelayAnonymity">running a Tor |
|
742 |
+relay may help your anonymity</a>. However, many Tor users cannot be good |
|
743 |
+relays — for example, some Tor clients operate from behind restrictive |
|
744 |
+firewalls, connect via modem, or otherwise aren't in a position where they |
|
745 |
+can relay traffic. Providing service to these clients is a critical |
|
747 | 746 |
part of providing effective anonymity for everyone, since many Tor users |
748 | 747 |
are subject to these or similar constraints and including these clients |
749 | 748 |
increases the size of the anonymity set. |
... | ... |
@@ -752,7 +751,10 @@ increases the size of the anonymity set. |
752 | 751 |
<p> |
753 | 752 |
That said, we do want to encourage Tor users to run relays, so what we |
754 | 753 |
really want to do is simplify the process of setting up and maintaining |
755 |
-a relay. |
|
754 |
+a relay. We've made a lot of progress with easy configuration in the past |
|
755 |
+few years: Vidalia has an easy relay configuration interface, and supports |
|
756 |
+uPnP too. Tor is good at automatically detecting whether it's reachable and |
|
757 |
+how much bandwidth it can offer. |
|
756 | 758 |
</p> |
757 | 759 |
|
758 | 760 |
<p> |
... | ... |
@@ -760,41 +762,54 @@ There are five steps we need to address before we can do this though: |
760 | 762 |
</p> |
761 | 763 |
|
762 | 764 |
<p> |
763 |
-First, we need to make Tor stable as a relay on all common operating |
|
764 |
-systems. [:TheOnionRouter/WindowsBufferProblems:We haven't achieved this |
|
765 |
-on Windows XP yet, and we need your help.] |
|
765 |
+First, we need to make Tor stable as a relay on all common |
|
766 |
+operating systems. The main remaining platform is Windows, |
|
767 |
+and we plan to finally address that in 2009. See Section 4.1 of <a |
|
768 |
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our |
|
769 |
+development roadmap</a>. |
|
766 | 770 |
</p> |
767 | 771 |
|
768 | 772 |
<p> |
769 |
-Second, we need easy configuration -- requiring users to edit text files |
|
770 |
-is bad for adoption. The [http://vidalia-project.net/ Vidalia project] |
|
771 |
-is making great progress on this part. |
|
773 |
+Second, we still need to get better at automatically estimating |
|
774 |
+the right amount of bandwidth to allow. See item #7 on the |
|
775 |
+<a href="<page volunteer>#Research">research section of the |
|
776 |
+volunteer page</a>: "Tor doesn't work very well when relays |
|
777 |
+have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a |
|
778 |
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP">switching |
|
779 |
+to UDP transport</a> is the simplest answer here — which alas is |
|
780 |
+not a very simple answer at all. |
|
772 | 781 |
</p> |
773 | 782 |
|
774 | 783 |
<p> |
775 |
-Third, Tor needs to do more tasks automatically: we need it to |
|
776 |
-automatically detect appropriate bandwidth, help you with opening ports |
|
777 |
-in your firewall, et cetera. We need to let people rate-limit outside |
|
778 |
-connections without limiting their own connections -- this is hard because |
|
779 |
-Tor puts traffic from different people on the same TCP stream, so we can't |
|
780 |
-tell whether we should read it off the network without first reading it. |
|
784 |
+Third, we need to work on scalability, both of the network (how to |
|
785 |
+stop requiring that all Tor relays be able to connect to all Tor |
|
786 |
+relays) and of the directory (how to stop requiring that all Tor |
|
787 |
+users know about all Tor relays). Changes like this can have large |
|
788 |
+impact on potential and actual anonymity. See Section 5 of the <a |
|
789 |
+href="<svnsandbox>doc/design-paper/challenges.pdf">Challenges</a> paper |
|
790 |
+for details. Again, UDP transport would help here. |
|
781 | 791 |
</p> |
782 | 792 |
|
783 | 793 |
<p> |
784 |
-Fourth, we need to work on scalability, both of the network (how |
|
785 |
-to stop requiring that all Tor relays be able to connect to all |
|
786 |
-Tor relays) and of the directory (how to stop requiring that all |
|
787 |
-Tor users know about all Tor relays). Changes like this can have |
|
788 |
-large impact on potential and actual anonymity. See Section 5 of the |
|
789 |
-[https://www.torproject.org/svn/trunk/doc/design-paper/challenges.pdf |
|
790 |
-Challenges] paper for details. |
|
794 |
+Fourth, we need to better understand the risks from |
|
795 |
+letting the attacker send traffic through your relay while |
|
796 |
+you're also initiating your own anonymized traffic. <a |
|
797 |
+href="http://freehaven.net/anonbib/#back01">Three</a> <a |
|
798 |
+href="http://freehaven.net/anonbib/#clog-the-queue">different</a> |
|
799 |
+<a href="http://freehaven.net/anonbib/#torta05">research</a> papers |
|
800 |
+describe ways to identify the relays in a circuit by running traffic |
|
801 |
+through candidate relays and looking for dips in the traffic while the |
|
802 |
+circuit is active. These clogging attacks are not that scary in the Tor |
|
803 |
+context so long as relays are never clients too. But if we're trying to |
|
804 |
+encourage more clients to turn on relay functionality too (whether as |
|
805 |
+<a href="<page bridges>">bridge relays</a> or as normal relays), then |
|
806 |
+we need to understand this threat better and learn how to mitigate it. |
|
791 | 807 |
</p> |
792 | 808 |
|
793 | 809 |
<p> |
794 | 810 |
Fifth, we might need some sort of incentive scheme to encourage people |
795 | 811 |
to relay traffic for others, and/or to become exit nodes. Here are our |
796 |
-[https://www.torproject.org/svn/trunk/doc/contrib/incentives.txt early |
|
797 |
-thoughts on Tor incentives]. |
|
812 |
+<a href="cite-upcoming-blog-post">current thoughts on Tor incentives</a>. |
|
798 | 813 |
</p> |
799 | 814 |
|
800 | 815 |
<p> |
801 | 816 |