Re: [tor-dev] Proposal: Expose raw bwauth votes

2017-12-11 Thread teor
> On 12 Dec 2017, at 09:41, Tom Ritter wrote: > > I'm not sure, but I think > https://trac.torproject.org/projects/tor/ticket/21377 needed a > proposal so I tried to write one up. Thanks Tom! Proposals are great for new directory authority features, particularly when we're changing the directo

[tor-dev] IPv6 and v3 onion services

2017-12-11 Thread teor
Hi David (and others interested in IPv6), We want to add better IPv6 support to Tor relays, clients, and v3 onion services. But if we do IPv6 v3 onion services first, the hop before intro and rend points will know that the circuit is a v3 onion service circuit, because its EXTEND2 cells will hav

[tor-dev] Proposal: Expose raw bwauth votes

2017-12-11 Thread Tom Ritter
I'm not sure, but I think https://trac.torproject.org/projects/tor/ticket/21377 needed a proposal so I tried to write one up. -tom Filename: xxx-expose-bwauth_votes.txt Title: Have Directory Authorities expose raw bwauth vote documents Author: Tom Ritter Created: 11-December-2017 Status: Open 1.

Re: [tor-dev] How about capping single operators to max. 10% exit capacity of the network?

2017-12-11 Thread teor
> On 12 Dec 2017, at 07:29, nusenu wrote: > > Absolute single relay cw caps do not have that problem and would prevent > insane cw values like >80. > > I'll setup automatic notifications if certain thresholds are reached. If we can come up with a threshold that would apply for the next 5-1

Re: [tor-dev] How about capping single operators to max. 10% exit capacity of the network?

2017-12-11 Thread nusenu
teor: > Automatic limits are also a denial of service risk for the entire network. > > If we implement them poorly, they could cause a cascade effect that > pushes clients onto overloaded relays until they go down. > > For that reason alone, I'm not convinced this is a good idea. That is indeed