Isis, brilliant response!  Some good bedtime reading to do, but just the track 
I was needing. Thanks for the support!

Yours sincerely

Mike Fikuart

> On 18 Aug 2014, at 23:58, "isis" <[email protected]> wrote:
> 
> Mike Fikuart transcribed 4.8K bytes:
>> Thanks Virgil.  I wasn’t directly what I was after; however it was an 
>> informative read and as with this subject grows the background knowledge 
>> that will come to use in the future.  I did get an interesting link from 
>> Johan Pouweise on scalability that his students published this year 
>> http://arxiv.org/abs/1404.4818, which gives a good overview of the dilemma 
>> of decentralisation (FYI).
>> 
>> A question raised in Tor-Design (section 9) is, "if clients can no longer 
>> have a complete picture of the network, how can they perform discovery while 
>> preventing attackers from manipulating or exploiting gaps in their 
>> knowledge?”.  If the network were to be considered to scale up to 
>> significant number of all Internet users, could it be that the Directory 
>> Authority(Ies) release (to Directory Caches and clients) a uniform, random 
>> sample of relays/nodes from the FULL set of nodes, such that the randomness 
>> of the path selection is still maintained.  The random selection could be 
>> sampled on a per client basis with enough of a sample as is currently 
>> downloaded (6000 relays).  What this means is that each client (or possibly 
>> groupings of clients) is getting a different “view” of the network, but 
>> there would need to be a scaling down from the full set to the sample set at 
>> some point before the client.  Any thoughts on the idea?
>> 
>> Yours sincerely
>> 
>> Mike Fikuart
> 
> This is an interesting idea. Variants using random walks through nodes which
> only know a random subset of other nodes have been proposed before, e.g.
> MorphMix. [0]
> 
> However, it should be impossible to verify that a given sequence is, in fact,
> random, rather than being a sequence in seeded such a way that it is
> predictable, or an encrypted sequence, etc. The biggest concern with improving
> Tor's scalability via handing out random samples of nodes from the consensus
> would then be that malicious Directories (whether Authorties or simply
> mirrors) could collude to hand out predictable subsets of relays to some/all
> clients.
> 
> Further, even if we could verify that a given sample was truly random, and we
> checked the results for some subset of clients, this would not prohibit
> certain clients from being lied to. I would argue that the security of the
> group of all Tor clients is only as good as the worst case scenario, i.e. any
> mechanism which would allow a single client to subjet to targeted attacks is
> an attack against all.
> 
> Nicholas Hopper and Nikita Borisov are two of the more significant researchers
> who explore scaling specifically for Tor and/or onion routing in general.
> Perhaps some of the following may help give you an idea of the extant research
> in this area:
> 
> For a more detailed explanation of why random subsets of nodes cannot be used
> to securely pick an unbiased path (more specifically, why we won't use most
> DHT algorithms, or the Salsa/Cashmere DHT-overlays), see "Hashing it out in
> Public". [1]
> 
> For an interesting proposal for using some specific DHT algorithms which claim
> to keep maintain the current levels of security while providing better
> scalability, see the Torsk paper. [2]
> 
> And for a Private Information Retrieval (PIR) based approach (admittedly, I
> haven't read it yet, but it's been on my reading list for a while!), which,
> like other PIR systems would permit DHT-like queries albeit without the
> Directory being able to know what is being looked up, see the PIR-Tor
> paper. [3] However, I think I recall from my skimming that the lookups
> produced *routes*, not nodes... which is worrisome for another set of reasons.
> 
> 
> [0]: M. Rennhard and B. Plattner.
> "Introducing MorphMix: Peer-to-peer based anonymous internet usage with 
> collusion detection."
> In ACM Workshop on Privacy in the Electronic Society (WPES 2002),
> pp. 91–102. ACM, 2002.
> 
> [1]: Tran, Andrew, Nicholas Hopper, and Yongdae Kim.
>  "Hashing it out in public: common failure modes of DHT-based anonymity 
> schemes."
>  In Proceedings of the 8th ACM workshop on Privacy in the electronic society,
>  pp. 71-80. ACM, 2009.
>  http://www.cs.umn.edu/~hopper/hashing_it_out.pdf
> 
> [2]: McLachlan, Jon, Andrew Tran, Nicholas Hopper, and Yongdae Kim.
>  "Scalable onion routing with Torsk."
>  In Proceedings of the 16th ACM conference on Computer and communications 
> security,
>  pp. 590-599. ACM, 2009.
>  https://www-users.cs.umn.edu/~hopper/torsk-ccs.pdf
> 
> [3]: Mittal, Prateek, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, and 
> Ian Goldberg.
>  "PIR-Tor: Scalable Anonymous Communication Using Private Information 
> Retrieval."
>  In USENIX Security Symposium. 2011.
>  http://cacr.uwaterloo.ca/techreports/2011/cacr2011-05.pdf
> 
> 
> -- 
> ♥Ⓐ isis agora lovecruft
> _________________________________________________________
> GPG: 4096R/A3ADB67A2CDB8B35
> Current Keys: https://blog.patternsinthevoid.net/isis.txt
> -- 
> tor-talk mailing list - [email protected]
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to