113-fast-authority-interface.txt 3.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. Filename: 113-fast-authority-interface.txt
  2. Title: Simplifying directory authority administration
  3. Author: Nick Mathewson
  4. Created:
  5. Status: Superseded
  6. Overview
  7. The problem:
  8. Administering a directory authority is a pain: you need to go through
  9. emails and manually add new nodes as "named". When bad things come up,
  10. you need to mark nodes (or whole regions) as invalid, badexit, etc.
  11. This means that mostly, authority admins don't: only 2/4 current authority
  12. admins actually bind names or list bad exits, and those two have often
  13. complained about how annoying it is to do so.
  14. Worse, name binding is a common path, but it's a pain in the neck: nobody
  15. has done it for a couple of months.
  16. Digression: who knows what?
  17. It's trivial for Tor to automatically keep track of all of the
  18. following information about a server:
  19. name, fingerprint, IP, last-seen time, first-seen time, declared
  20. contact.
  21. All we need to have the administrator set is:
  22. - Is this name/fingerprint pair bound?
  23. - Is this fingerprint/IP a bad exit?
  24. - Is this fingerprint/IP an invalid node?
  25. - Is this fingerprint/IP to be rejected?
  26. The workflow for authority admins has two parts:
  27. - Periodically, go through tor-ops and add new names. This doesn't
  28. need to be done urgently.
  29. - Less often, mark badly behaved serves as badly behaved. This is more
  30. urgent.
  31. Possible solution #1: Web-interface for name binding.
  32. Deprecate use of the tor-ops mailing list; instead, have operators go to a
  33. webform and enter their server info. This would put the information in a
  34. standardized format, thus allowing quick, nearly-automated approval and
  35. reply.
  36. Possible solution #2: Self-binding names.
  37. Peter Palfrader has proposed that names be assigned automatically to nodes
  38. that have been up and running and valid for a while.
  39. Possible solution #3: Self-maintaining approved-routers file
  40. Mixminion alpha has a neat feature where whenever a new server is seen,
  41. a stub line gets added to a configuration file. For Tor, it could look
  42. something like this:
  43. ## First seen with this key on 2007-04-21 13:13:14
  44. ## Stayed up for at least 12 hours on IP 192.168.10.10
  45. #RouterName AAAABBBBCCCCDDDDEFEF
  46. (Note that the implementation needs to parse commented lines to make sure
  47. that it doesn't add duplicates, but that's not so hard.)
  48. To add a router as named, administrators would only need to uncomment the
  49. entry. This automatically maintained file could be kept separately from a
  50. manually maintained one.
  51. This could be combined with solution #2, such that Tor would do the hard
  52. work of uncommenting entries for routers that should get Named, but
  53. operators could override its decisions.
  54. Possible solution #4: A separate mailing list for authority operators.
  55. Right now, the tor-ops list is very high volume. There should be another
  56. list that's only for dealing with problems that need prompt action, like
  57. marking a router as !badexit.
  58. Resolution:
  59. Solution #2 is described in "Proposal 123: Naming authorities
  60. automatically create bindings", and that approach is implemented.
  61. There are remaining issues in the problem statement above that need
  62. their own solutions.