Roger Dingledine commited on 2009-01-17 19:12:32
Zeige 1 geänderte Dateien mit 43 Einfügungen und 28 Löschungen.
| ... | ... |
@@ -738,12 +738,11 @@ user be a relay.</a></h3> |
| 738 | 738 |
|
| 739 | 739 |
<p> |
| 740 | 740 |
Requiring every Tor user to be a relay would help with scaling the |
| 741 |
-network to handle all our users, and [#RelayAnonymity running a Tor |
|
| 742 |
-relay may help your anonymity]. However, many Tor users cannot be good |
|
| 743 |
-relays -- for example, some Tor clients operate from behind restrictive |
|
| 744 |
-firewalls or could be subject to penalties for relaying traffic (e.g., |
|
| 745 |
-potentially questionable exit connections, encrypted connections, or any |
|
| 746 |
-connections at all). Providing service to these clients is a critical |
|
| 741 |
+network to handle all our users, and <a href="#RelayAnonymity">running a Tor |
|
| 742 |
+relay may help your anonymity</a>. However, many Tor users cannot be good |
|
| 743 |
+relays — for example, some Tor clients operate from behind restrictive |
|
| 744 |
+firewalls, connect via modem, or otherwise aren't in a position where they |
|
| 745 |
+can relay traffic. Providing service to these clients is a critical |
|
| 747 | 746 |
part of providing effective anonymity for everyone, since many Tor users |
| 748 | 747 |
are subject to these or similar constraints and including these clients |
| 749 | 748 |
increases the size of the anonymity set. |
| ... | ... |
@@ -752,7 +751,10 @@ increases the size of the anonymity set. |
| 752 | 751 |
<p> |
| 753 | 752 |
That said, we do want to encourage Tor users to run relays, so what we |
| 754 | 753 |
really want to do is simplify the process of setting up and maintaining |
| 755 |
-a relay. |
|
| 754 |
+a relay. We've made a lot of progress with easy configuration in the past |
|
| 755 |
+few years: Vidalia has an easy relay configuration interface, and supports |
|
| 756 |
+uPnP too. Tor is good at automatically detecting whether it's reachable and |
|
| 757 |
+how much bandwidth it can offer. |
|
| 756 | 758 |
</p> |
| 757 | 759 |
|
| 758 | 760 |
<p> |
| ... | ... |
@@ -760,41 +762,54 @@ There are five steps we need to address before we can do this though: |
| 760 | 762 |
</p> |
| 761 | 763 |
|
| 762 | 764 |
<p> |
| 763 |
-First, we need to make Tor stable as a relay on all common operating |
|
| 764 |
-systems. [:TheOnionRouter/WindowsBufferProblems:We haven't achieved this |
|
| 765 |
-on Windows XP yet, and we need your help.] |
|
| 765 |
+First, we need to make Tor stable as a relay on all common |
|
| 766 |
+operating systems. The main remaining platform is Windows, |
|
| 767 |
+and we plan to finally address that in 2009. See Section 4.1 of <a |
|
| 768 |
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our |
|
| 769 |
+development roadmap</a>. |
|
| 766 | 770 |
</p> |
| 767 | 771 |
|
| 768 | 772 |
<p> |
| 769 |
-Second, we need easy configuration -- requiring users to edit text files |
|
| 770 |
-is bad for adoption. The [http://vidalia-project.net/ Vidalia project] |
|
| 771 |
-is making great progress on this part. |
|
| 773 |
+Second, we still need to get better at automatically estimating |
|
| 774 |
+the right amount of bandwidth to allow. See item #7 on the |
|
| 775 |
+<a href="<page volunteer>#Research">research section of the |
|
| 776 |
+volunteer page</a>: "Tor doesn't work very well when relays |
|
| 777 |
+have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a |
|
| 778 |
+href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP">switching |
|
| 779 |
+to UDP transport</a> is the simplest answer here — which alas is |
|
| 780 |
+not a very simple answer at all. |
|
| 772 | 781 |
</p> |
| 773 | 782 |
|
| 774 | 783 |
<p> |
| 775 |
-Third, Tor needs to do more tasks automatically: we need it to |
|
| 776 |
-automatically detect appropriate bandwidth, help you with opening ports |
|
| 777 |
-in your firewall, et cetera. We need to let people rate-limit outside |
|
| 778 |
-connections without limiting their own connections -- this is hard because |
|
| 779 |
-Tor puts traffic from different people on the same TCP stream, so we can't |
|
| 780 |
-tell whether we should read it off the network without first reading it. |
|
| 784 |
+Third, we need to work on scalability, both of the network (how to |
|
| 785 |
+stop requiring that all Tor relays be able to connect to all Tor |
|
| 786 |
+relays) and of the directory (how to stop requiring that all Tor |
|
| 787 |
+users know about all Tor relays). Changes like this can have large |
|
| 788 |
+impact on potential and actual anonymity. See Section 5 of the <a |
|
| 789 |
+href="<svnsandbox>doc/design-paper/challenges.pdf">Challenges</a> paper |
|
| 790 |
+for details. Again, UDP transport would help here. |
|
| 781 | 791 |
</p> |
| 782 | 792 |
|
| 783 | 793 |
<p> |
| 784 |
-Fourth, we need to work on scalability, both of the network (how |
|
| 785 |
-to stop requiring that all Tor relays be able to connect to all |
|
| 786 |
-Tor relays) and of the directory (how to stop requiring that all |
|
| 787 |
-Tor users know about all Tor relays). Changes like this can have |
|
| 788 |
-large impact on potential and actual anonymity. See Section 5 of the |
|
| 789 |
-[https://www.torproject.org/svn/trunk/doc/design-paper/challenges.pdf |
|
| 790 |
-Challenges] paper for details. |
|
| 794 |
+Fourth, we need to better understand the risks from |
|
| 795 |
+letting the attacker send traffic through your relay while |
|
| 796 |
+you're also initiating your own anonymized traffic. <a |
|
| 797 |
+href="http://freehaven.net/anonbib/#back01">Three</a> <a |
|
| 798 |
+href="http://freehaven.net/anonbib/#clog-the-queue">different</a> |
|
| 799 |
+<a href="http://freehaven.net/anonbib/#torta05">research</a> papers |
|
| 800 |
+describe ways to identify the relays in a circuit by running traffic |
|
| 801 |
+through candidate relays and looking for dips in the traffic while the |
|
| 802 |
+circuit is active. These clogging attacks are not that scary in the Tor |
|
| 803 |
+context so long as relays are never clients too. But if we're trying to |
|
| 804 |
+encourage more clients to turn on relay functionality too (whether as |
|
| 805 |
+<a href="<page bridges>">bridge relays</a> or as normal relays), then |
|
| 806 |
+we need to understand this threat better and learn how to mitigate it. |
|
| 791 | 807 |
</p> |
| 792 | 808 |
|
| 793 | 809 |
<p> |
| 794 | 810 |
Fifth, we might need some sort of incentive scheme to encourage people |
| 795 | 811 |
to relay traffic for others, and/or to become exit nodes. Here are our |
| 796 |
-[https://www.torproject.org/svn/trunk/doc/contrib/incentives.txt early |
|
| 797 |
-thoughts on Tor incentives]. |
|
| 812 |
+<a href="cite-upcoming-blog-post">current thoughts on Tor incentives</a>. |
|
| 798 | 813 |
</p> |
| 799 | 814 |
|
| 800 | 815 |
<p> |
| 801 | 816 |