Hey Nick,

these are my notes from when I was writing the HS blog post. I updated
them a bit with some more stuff.

Might be helpful :)

"""

HS improvements:

1 performance 
    1.1 reuse IPs (#8239) 
    1.2 torperf (#8510) 
    1.3 scaling 
https://lists.torproject.org/pipermail/tor-dev/2013-October/005556.html 
    1.4 valet nodes 
    1.5 lasse's "Improving Efficiency and Simplicity of Tor circuit 
establishment and hidden services" 
        1.5.1 big design change. maybe worth it. assumes valet nodes IIRC 
2 security 
    2.1 Crypto upgrade 
        2.1.1 Upgrade id keys 
            
[https://lists.torproject.org/pipermail/tor-dev/2013-October/005536.html]
            
[https://lists.torproject.org/pipermail/tor-dev/2013-October/005534.html]
        2.1.2 Upgrade IP service keys 
        2.1.3 Fix hybrid encryption (?) 
    2.2 Onion anti-harvesting (#8106) 
https://lists.torproject.org/pipermail/tor-dev/2013-October/005534.html 
    2.3 Guard node enumeration (#9001) 
        2.3.1 Virtual Circuits? Guard tiers? 
    2.4 Unpredictable HSDirs (#8244) 
    2.5 Hide HS popularity 
        2.5.1 Oblivious transfer for HSDirs (is it needed if we have #8106? 
maybe yes.) 
        2.5.2 Unlinkable introductions in IPs (is this even possible?) (do we 
even care? we have service keys) 
3 Can we decrease the responsibility of guard nodes? It seems that security of 
HSes == their guard nodes, atm. 
    3.1 Implement stuff from 
https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
 
    3.2 Add optional padding/bitrate anti-fingerprinting transport for HSes. 
        3.2.1 Can be enabled by truly paranoid HSes. 
        3.2.2 But this is going to make HSes stand out even more! 
        3.2.3 These transports can all be broken anyway. Except a truly slow 
but theoretically secure padding/constant bitrate transport. 
    3.3 What are other anonymous publishing protocols doing here? I2P seems to 
be weak here too, according to Grothoff's recent paper. 
4 misc 
    4.1 HSDirs system 
        4.1.1 Do we still need the hash ring even after #8106? 
        4.1.2 Look into Valet nodes 
    4.2 petnames/human memorable onions? 
        4.2.1 maybe better as a third party (probably unofficial) plugin to 
tor/firefox 
    4.3 Read and compare with other HS-like designs. See: 
        4.3.1 I2P, GNUNet, rewebber, retroshare, "Anonymizing censorship 
resistant systems" by Serjantov, ... 
        4.3.2 Check uni-directional tunnels of I2P and their pros/cons. 
        4.3.3 http://freehaven.net/anonbib/ 
    4.4 Encrypted servives 
https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/ideas/xxx-encrypted-services.txt
5 What else should we do? How would we design HSes if we were not prejudiced by 
the current design?

"""
_______________________________________________
tor-dev mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to