> On 2 Oct 2015, at 14:43, Tom van der Woerdt <[email protected]> wrote: > > Hi Tim, > > Thanks for your great comments, very much appreciated! > > Comments inline. > > > > Op 30/09/15 om 19:40 schreef Tim Wilson-Brown - teor: >> >>> On 30 Sep 2015, at 17:27, Tom van der Woerdt <[email protected] >>> <mailto:[email protected]>> wrote: >>> >>> ... >>> >>> Filename: xxx-intro-rendezvous-controlsocket.txt >>> Title: Load-balancing hidden services by splitting introduction from >>> rendezvous >>> Author: Tom van der Woerdt >>> Created: 2015-09-30 >>> Status: draft >>> >>> 1. Overview and motivation >>> >>> To address scaling concerns with the onion web, we want to be able to >>> spread the load of hidden services across multiple machines. >>> OnionBalance is a great stab at this, and it can currently give us 60x >>> the capacity by publishing 6 separate descriptors, each with 10 >>> introduction points, but more is better. This proposal aims to address >>> hidden service scaling up to a point where we can handle millions of >>> concurrent connections. >>> >>> The basic idea involves splitting the 'introduce' from the >>> 'rendezvous', in the tor implementation, and adding new events and >>> commands to the control specification to allow intercepting >>> introductions and transmitting them to different nodes, which will then >>> take care of the actual rendezvous. >>> … > >> In general, I’m concerned that we need to think through the >> implementation of this proposal more carefully, because it will help us >> decide whether it’s compatible with: >> * Current Hidden Services >> * Next-Generation Hidden Services >> And perhaps make changes to any of these proposals to make them work >> together. > > Thoughts welcome! I don't think I'm the right person to address those. > >> >> I’d also note that it’s definitely not compatible with Single Onion >> Services as specified in Proposal #252, as there is no rendezvous in >> that protocol. > > Indeed.
Splitting the introduction and rendezvous is another use case for NAT-punching single-rendezvous-hop onion services. However, splitting hidden services into multiple different implementations provides less cover for users who really need three-hop hidden services. We’ll need to decide what the tradeoff is here. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-dev mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
