Browse Source

add proposal 152

svn:r15903
Nick Mathewson 17 years ago
parent
commit
36d6f50d09
2 changed files with 65 additions and 0 deletions
  1. 2 0
      doc/spec/proposals/000-index.txt
  2. 63 0
      doc/spec/proposals/152-single-hop-circuits.txt

+ 2 - 0
doc/spec/proposals/000-index.txt

@@ -74,6 +74,7 @@ Proposals by number:
 149  Using data from NETINFO cells [OPEN]
 149  Using data from NETINFO cells [OPEN]
 150  Exclude Exit Nodes from a circuit [ACCEPTED]
 150  Exclude Exit Nodes from a circuit [ACCEPTED]
 151  Improving Tor Path Selection [DRAFT]
 151  Improving Tor Path Selection [DRAFT]
+152  Optionally allow exit from single-hop circuits  [DRAFT]
 
 
 
 
 Proposals by status:
 Proposals by status:
@@ -85,6 +86,7 @@ Proposals by status:
    141  Download server descriptors on demand
    141  Download server descriptors on demand
    144  Increase the diversity of circuits by detecting nodes belonging the
    144  Increase the diversity of circuits by detecting nodes belonging the
    151  Improving Tor Path Selection
    151  Improving Tor Path Selection
+   152  Optionally allow exit from single-hop circuits 
  OPEN:
  OPEN:
    121  Hidden Service Authentication
    121  Hidden Service Authentication
    142  Combine Introduction and Rendezvous Points
    142  Combine Introduction and Rendezvous Points

+ 63 - 0
doc/spec/proposals/152-single-hop-circuits.txt

@@ -0,0 +1,63 @@
+Filename: 152-single-hop-circuits.txt
+Title: Optionally allow exit from single-hop circuits 
+Version:
+Last-Modified:
+Author: Geoff Goodell
+Created: 13-Jul-2008
+Status: Draft
+
+Overview
+
+    Provide a special configuration option that adds a line to descriptors
+    indicating that a router can be used as an exit for one-hop circuits,
+    and allow clients to attach streams to one-hop circuits provided
+    that the descriptor for the router in the circuit includes this
+    configuration option.
+
+Motivation
+
+    At some point, code was added to restrict the attachment of streams
+    to one-hop circuits.
+
+    The idea seems to be that we can use the cost of forking and
+    maintaining a patch as a lever to prevent people from writing
+    controllers that jeopardize the operational security of routers
+    and the anonymity properties of the Tor network by creating and
+    using one-hop circuits rather than the standard three-hop circuits.
+    It may be, for example, that some users do not actually seek true
+    anonymity but simply reachability through network perspectives
+    afforded by the Tor network, and since anonymity is stronger in
+    numbers, forcing users to contribute to anonymity and decrease the
+    risk to server operators by using full-length paths may be reasonable.
+
+    As presently implemented, the sweeping restriction of one-hop circuits
+    for all routers limits the usefulness of Tor as a general-purpose
+    technology for building circuits.  In particular, we should allow
+    for controllers, such as Blossom, that create and use single-hop
+    circuits involving routers that are not part of the Tor network.
+
+Design
+
+    Introduce a configuration option for Tor servers that, when set,
+    indicates that a router is willing to provide exit from one-hop
+    circuits.  Routers with this policy will not require that a circuit
+    has at least two hops when it is used as an exit.
+
+    In addition, routers for which this configuration option
+    has been set will have a line in their descriptors, "opt
+    exit-from-single-hop-circuits".  Clients will keep track of which
+    routers have this option and allow streams to be attached to
+    single-hop circuits that include such routers.
+
+Security Considerations
+
+    This approach seems to eliminate the worry about operational router
+    security, since server operators will not set the configuraiton
+    option unless they are willing to take on such risk.
+
+    To reduce the impact on anonymity of the network resulting
+    from including such "risky" routers in regular Tor path
+    selection, clients may systematically exclude routers with "opt
+    exit-from-single-hop-circuits" when choosing random paths through
+    the Tor network.
+