That would imply that guard relays run at 100% capacity which i can't confirm for any of my guards. Also seeing decline in usage would maybe give a incentive for some relay operators to configure IPv6 in their torrc, because there are thousands of relays which do have IPv6 connectivity, but the operator simply didn't configure it because it is not as easy as putting "ORPort 9001" in your torrc and it listens on IPv4 and IPv6.

Sadly ORPort 9001 gives you a working relay which listens only on IPv4, so i would say the lack of IPv6 enabled relays is a problem which is created by how the config works and that a default torrc file loses no word about IPv6.

Beside that if i look at https://metrics.torproject.org/bandwidth-flags.html the Tor network could lose their entire IPv4 only guards and still work, but after that guards would indeed run at 100% capacity.

On 02.08.2019 02:05, teor wrote:
Hi,

On 2 Aug 2019, at 09:20, NOC<t...@afo-tm.org>  wrote:

I see this staying longer with IPv4 longer than we should also problematic, we 
are at the point that there are providers out there who do have more clients 
than IPv4 space which results in having them making carrier grade NAT. Some of 
them have the problem that their NAT gear gets maxed out at peak hours which 
results in heavy packet loss and very slow speeds, while their IPv6 connection 
is perfectly fine. That will not get better, i guess it will get worse in the 
future. So i would also prefer to use IPv6 if it works better.
Currently, Tor clients don't use IPv6 unless they are specifically configured 
to use it. Some apps (OnionBrowser) use the OS network APIs to automatically 
configure Tor, but most don't.

This proposal makes sure that Tor clients try IPv4, then try IPv6 after a short 
delay. If either works, the client will connect to the Tor network.

At this stage, only 20% of guards support IPv6. But we are going to make sure 
at least one of the three client primary guards has IPv6. Ensuring at least one 
IPv6 client guard will increase traffic to IPv6 guards by up to 1.7x, which 
could cause load balancing issues.

So we need to counter this load imbalance by trying IPv6 after IPv4.

Once 33% of non-exit guards support IPv6, we can reduce the delay, or try IPv6 
first at random. Once 67% of non-exit guards support IPv6, we can try IPv6 
first.

We are working on a funding proposal that will increase the number of IPv6 
relays by automatically detecting, testing, and using IPv6 addresses.

T
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to