On 29/10/14 13:01, George Kadianakis wrote:
> Christopher Baines writes:
>
>> On 20/10/14 14:37, George Kadianakis wrote:
>>> f) On a more researchy tone, this might also be a good point to start
>>>poking at the HS scalability project since it will reall
On 20/10/14 14:37, George Kadianakis wrote:
> f) On a more researchy tone, this might also be a good point to start
>poking at the HS scalability project since it will really affect HS
>performance.
>
>We should look at Christopher Baines' ideas and write a Tor
t, as explained
> in [tor-dev] by Christopher Baines [1]. This means that IPs would work
> like this:
> https://people.torproject.org/~asn/hs/ip_placement_scaling.jpg
> where HS_1, HS_2 and HS_3 are the various nodes of the HS.
>
> This allows the IPs to launch the following a
On 09/05/14 20:05, waldo wrote:
> El 04/05/14 07:42, Christopher Baines escribió:
>> On 04/05/14 11:43, waldo wrote:
>>> El 02/05/14 02:34, Christopher Baines escribió:
>>>> On 02/05/14 00:45, waldo wrote:
>>>>> I am worried about an attack coming fro
On 09/05/14 10:14, Michael Rogers wrote:
> On 08/05/14 14:40, Christopher Baines wrote:
>>> Perhaps it would make sense to pick one or more IPs per guard,
>>> and change those IPs when the guard is changed? Then waldo's
>>> attack by a malicious IP would only ev
On 07/05/14 18:30, Michael Rogers wrote:
> On 07/05/14 17:32, Christopher Baines wrote:
>>> What about the attack suggested by waldo, where a malicious IP
>>> repeatedly breaks the circuit until it's rebuilt through a
>>> malicious middle node? Are entry guards
On 07/05/14 13:51, Michael Rogers wrote:
> On 06/05/14 22:17, Christopher Baines wrote:
>> If so, then yes. When I implemented the deterministic selection of
>> introduction points, I had to implement a reconnection mechanism
>> to ensure that the introduction point would
On 06/05/14 21:19, Roger Dingledine wrote:
> On Tue, May 06, 2014 at 03:29:03PM +0100, Michael Rogers wrote:
>> I'm interested in your work because the hidden service protocol
>> doesn't seem to perform very well for hidden services running on
>> mobile devices, which frequently lose network connec
On 06/05/14 22:07, Christopher Baines wrote:
> On 06/05/14 15:29, Michael Rogers wrote:
>> I'm interested in your work because the hidden service protocol
>> doesn't seem to perform very well for hidden services running on
>> mobile devices, which frequently lose
the behaviour from then on is unchanged, and
this is where I assume the problems with loosing connectivity occur?
> On 30/04/14 22:06, Christopher Baines wrote:
>> - multiple connections for one service to an introduction point is
>> allowed (previously, existing were closed)
>
> D
On 06/05/14 20:13, Nicholas Hopper wrote:
> On Sat, May 3, 2014 at 5:58 AM, Christopher Baines wrote:
>> On 03/05/14 11:21, George Kadianakis wrote:
>>>> On 08/10/13 06:52, Christopher Baines wrote:
>>>> In short, I modified tor such that:
>>>> - The
On 04/05/14 11:43, waldo wrote:
> El 02/05/14 02:34, Christopher Baines escribió:
>> On 02/05/14 00:45, waldo wrote:
>>> I am worried about an attack coming from evil IP based on forced
>>> disconnection of the HS from the IP. I don't know if this is possible
On 03/05/14 11:21, George Kadianakis wrote:
> Christopher Baines writes:
>
>> On 08/10/13 06:52, Christopher Baines wrote:
>> In short, I modified tor such that:
>> - The services public key is used in the connection to introduction
>> points (a return to the
On 02/05/14 00:45, waldo wrote:
> El 30/04/14 17:06, Christopher Baines escribió:
>> On 08/10/13 06:52, Christopher Baines wrote:
>>> I have been looking at doing some work on Tor as part of my degree, and
>>> more specifically, looking at Hidden Services. One of the i
On 08/10/13 06:52, Christopher Baines wrote:
> I have been looking at doing some work on Tor as part of my degree, and
> more specifically, looking at Hidden Services. One of the issues where I
> believe I might be able to make some progress, is the Hidden Service
> Scaling issue as de
On 27/03/14 22:14, Qingping Hou wrote:
> On 03/27/2014 03:36 PM, Christopher Baines wrote:
>> On 27/03/14 19:25, Helder Ribeiro wrote:
>>> Great! Do you know what kinds of things are most useful to measure first?
>>> Is it more useful at this point to:
>>> 1. me
On 27/03/14 19:25, Helder Ribeiro wrote:
> Great! Do you know what kinds of things are most useful to measure first?
> Is it more useful at this point to:
> 1. measure time spent on functions within a process, to see if there's
> anything taking up too much time, for example, at the hidden service'
I am attempting to use Chutney to test some hidden service related
functionality in Tor. Specifically distributed hidden services involving
more than one node.
Furthermore, to extensively test aspects of this, the network needs to
change. At the moment, I have just looked at nodes coming up and do
On 28/10/13 13:19, Matthew Finkel wrote:
> This is a proposal I wrote to implement scalable hidden services. It's
> by no means finished (there are some slight inconsistencies which I will
> be correcting later today or tomorrow) but I want to make it public in
> the meantime. I'm also working on s
On 09/10/13 18:05, Matthew Finkel wrote:
These two changes combined should help with the two goals. Reliability
is improved by having multiple OP's providing the service, and having
all of these accessible from the introduction points. Scalability is
also improved, as you are no
On 10/10/13 23:28, Paul Syverson wrote:
> On Wed, Oct 09, 2013 at 03:02:47PM +0100, Christopher Baines wrote:
>> On 09/10/13 11:41, Paul Syverson wrote:
>>>>>> These two changes combined should help with the two goals. Reliability
>>>>>> is improved
On 09/10/13 11:41, Paul Syverson wrote:
These two changes combined should help with the two goals. Reliability
is improved by having multiple OP's providing the service, and having
all of these accessible from the introduction points. Scalability is
also improved, as you are not
On 09/10/13 01:16, Matthew Finkel wrote:
>> So, before I start trying to implement a prototype, I thought I would
>> set out my ideas here to check they are reasonable (I have also been
>> discussing this a bit on #tor-dev). The goal of this is two fold, to
>> reduce the probability of failure of
On 08/10/13 23:41, Nick Mathewson wrote:
> Here are some possible desirable things. I don't know if they're all
> important, or all worth it. Let's discuss!
So, I think it makes more sense to cover the goals first.
> Goal 1) Obscure number of hidden service instances.
Good to have, as it proba
I have been looking at doing some work on Tor as part of my degree, and
more specifically, looking at Hidden Services. One of the issues where I
believe I might be able to make some progress, is the Hidden Service
Scaling issue as described here [1].
So, before I start trying to implement a protot
25 matches
Mail list logo