diff options
author | Nick Mathewson <nickm@torproject.org> | 2005-02-01 23:57:07 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2005-02-01 23:57:07 +0000 |
commit | b2e34616d3ed57a1a50d98890ef35ee82f942dbf (patch) | |
tree | c47975021bfe6539c7eb5fc476229ef19ffaca4e /doc/design-paper | |
parent | 1790dc67607799a080e5a841c79115148a3b10ad (diff) | |
download | tor-b2e34616d3ed57a1a50d98890ef35ee82f942dbf.tar.gz tor-b2e34616d3ed57a1a50d98890ef35ee82f942dbf.zip |
Write a few subsections
svn:r3497
Diffstat (limited to 'doc/design-paper')
-rw-r--r-- | doc/design-paper/challenges.tex | 143 |
1 files changed, 121 insertions, 22 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex index ecf4fd3dcf..2acf0b503d 100644 --- a/doc/design-paper/challenges.tex +++ b/doc/design-paper/challenges.tex @@ -433,32 +433,131 @@ during the bootstrapping phase of the network, where the first few widely publicized uses of the network can dictate the types of users it attracts next. -\subsection{Usability and bandwidth and sustainability and incentives} - -low-pain-threshold users go away until all users are willing to use it - -Sustainability. Previous attempts have been commercial which we think -adds a lot of unnecessary complexity and accountability. Freedom didn't -collect enough money to pay its servers; JAP bandwidth is supported by -continued money, and they periodically ask what they will do when it -dries up. - -"outside of academia, jap has just lost, permanently" +%% "outside of academia, jap has just lost, permanently". (That is, +%% even though the crime detection issues are resolved and are unlikely +%% to go down the same way again, public perception has not been kind.) + +\subsection{Sustainability and incentives} +One of the (arguably) unsolved problems in low-latency anonymity designs is +how to keep the servers running. Zero-Knowledge Systems's Freedom network +depended on paying third parties to run its servers; the JAP project's +bandwidth is dependent on grants from ???? to pay for its bandwidth and +administrative expenses. In Tor, bandwidth and administrative costs are +distributed across the volunteers who run Tor nodes, so at least we have +reason to think that the Tor network could survive without continued research +funding.\footnote{It also helps that Tor is implemented with free and open + source software that can be maintained by anybody with the ability and + inclination.} But why are these volunteers running nodes, and what can we +do to encourage more volunteers to do so? + +We have not surveyed Tor operators to learn why they are running ORs, but +from the information they have provided, it seems that many of them run Tor +nodes for reasons of personal interest in privacy issues. It is possible +that others are running Tor for anonymity reasons, but of course they are +hardly likely to tell us if they are. + +Significantly, Tor's threat model changes the anonymity incentives for running +a server. In a high-latency mix network, users can receive additional +anonymity by running their own server, since doing so obscures when they are +injecting messages into the network. But in Tor, anybody observing a Tor +server can tell when the server is generating traffic that corresponds to +none of its incoming traffic, and therefore originating traffic itself. +Still, anonymity and privacy incentives do remain for server operators: +\begin{tightlist} +\item Against a hostile website, running a Tor exit node can provide a degree + of ``deniaibility'' for traffic that originates at that exit node. For + example, it is likely in practise that HTTP requests from a Tor server's IP + will be assumed to have left the Tor network. +\item Local Tor entry and exit servers allow users on a network to run in an + `enclave' configuration. [XXXX say more] +\end{tightlist} -[nick will write this section] +First, we try to make the costs of running a Tor server easily minimized. +Since Tor is run by volunteers, the most crucial software usability issue is +usability by operators: when an operator leaves, the network becomes less +usable by everybody. To keep operators pleased, we must try to keep Tor's +resource and administrative demands as low as possible. [XXXX say mroe] + +Because of ISP billing structures, many Tor operators have underused capacity +that they are willing to donate to the network, at no additional monetary +cost to them. Features to limit bandwidth have been essential to adoption. +Also useful has been a ``hibernation'' feature that allows a server that +wants to provide high bandwidth, but no more than a certain amount in a +giving billing cycle, to become dormant once its bandwidth is exhausted, and +to reawaken at a random offset into the next billing cycle. This feature has +interesting policy implications, however; see +section~\ref{subsec:bandwidth-and-usability} below. + +[XXXX say more. Why else would you run a server? What else can we do/do we + already do to make running a server more attractive?] + +\subsection{Bandwidth and usability} +\label{subsec:bandwidth-and-usability} +Once users have configured their applications to work with Tor, the largest +remaining usability issue is bandwidth. When websites ``feel slow,'' users +begin to suffer. + +Clients currently try to build their connections through servers that they +guess will have enough bandwidth. But even if capacity is allocated +optimally, it seems unlikely that the current network architecture will have +enough capacity to provide every user with as much bandwidth as she would +receive if she weren't using Tor, unless far more servers join the network +(see above). + +Limited capacity does not destroy the network, however. Instead, usage tends +towards an equilibrium: when performance suffers, users who value performance +over anonymity tend to leave the system, thus freeing capacity until the +remaining users on the network are exactly those willing to use that capacity +there is. + +XXXX hibernation vs rate-limiting: do we want diversity or throughput? i +think we're shifting back to wanting diversity. \subsection{Tor and file-sharing} +One potentially problematical area with deploying Tor has been our response +to file-sharing applications. These applications make up an enormous +fraction of the traffic on the Internet today, and provide two challenges to +any anonymizing network: their intensive bandwidth requirement, and the +degree to which they are associated (correctly or not) with copyright +violation. + +As noted above, high-bandwidth protocols can make the network unresponsive, +but tend to be somewhat self-correcting. Issues of copyright violation, +however, are more interesting. Typical exit node operators want to help +people achieve privacy and anonymous speech, not to help people (say) host +Vin Diesel movies for illegal download; and typical ISPs would rather not +deal with customers who incur them the overhead of getting menacing letters +from the MPAA. While it is quite likely that the operators are doing nothing +illegal, many ISPs have policies of dropping users who get repeated legal +threats regardless of the merits of those threats, and many operators would +prefer to avoid receiving legal threats even if those threats have little +merit. So when the letters arrive, operators are likely to face +pressure to block filesharing applications entirely, in order to avoid the +hassle. + +But blocking filesharing would not necessarily be easy; most popular +protocols have evolved to run on a variety of non-standard ports in order to +get around other port-based bans. Thus, exit node operators who wanted to +block filesharing would have to find some way to integrate Tor with a +protocol-aware exit filter. This could be a technically expensive +undertaking, and one with poor prospects: it is unlikely that Tor exit nodes +would succeed where so many institutional firewalls have failed. Another +possibility for sensitive operators is to run a very restrictive server that +only permits exit connections to a very restricted range of ports which are +not frequently associated with file sharing. There are increasingly few such +ports. + +For the moment, it seems that Tor's bandwidth issues have rendered it +unattractive for bulk file-sharing traffic; this may continue to be so in the +future. Nevertheless, Tor will likely remain attractive for limited use in +filesharing protocols that have separate control and data channels. + +[xxxx We should say more -- but what? That we'll see a similar + equilibriating effect as with bandwidth, where sensitive ops switch to + middleman, and we become less useful for filesharing, so the filesharing + people back off, so we get more ops since there's less filesharing, so the + filesharers come back, etc.] -[nick will write this section] - -Bittorrent and dmca. Should we add an IDS to autodetect protocols and -snipe them? - -because only at the exit is it evident what port or protocol a given -tor stream is, you can't choose not to carry file-sharing traffic. - -hibernation vs rate-limiting: do we want diversity or throughput? i -think we're shifting back to wanting diversity. \subsection{Tor and blacklists} |