<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA512<br>
<br>
I'm the author of Ricochet, so take this with the appropriate level
of bias.<br>
<br>
On 9/22/14, 8:28 AM, David Goulet wrote<br>
<span style="white-space: pre;">><br>
><br>
> On the question of scaling, I think it's still an open
question to be<br>
> answered as far as I know. The HS design I think might not be
that<br>
> suitable for a p2p meaning spawning a lot of HS quickly with
a low<br>
> lifetime.<br>
><br>
> Let say that a new system (ricochet) brings in 500k users
everyday. Just<br>
> adding this amount of traffic on the Tor network is probably
an issue<br>
> but staying on the HS system subject, it would mean that 500k
HS<br>
> descriptors are uploaded to directories regularly which means
500k new<br>
> rendez-vous points and introducing points are created and
that itself<br>
> might be a non negligeable point of contention on the
network. An HS<br>
> directory is basically a DHT storing HS descriptors but that
part does<br>
> not worry much to scale well.</span><br>
500k is an insane number; the total estimate of Tor clients is
around 2.5 million. There would be serious scaling issues with that
many users.<br>
<br>
It's also worse than you've described. Every descriptor is uploaded
to 6 mirrors, and each service has 3 introduction points. There
isn't much research (that I'm aware of) on how tor relays scale with
the number of circuits, so I can't very well estimate those effects.
I expect the current design won't harm the network up to around
10000-20000 active users.<br>
<br>
The most expensive part is polling for connections, not publishing
services. We can reduce that very significantly already[1], but I
hope we find a way to remove it entirely - maybe with some PIR
scheme.<br>
<span style="white-space: pre;">><br>
> Keep in mind that HS are reachable, once published meaning
started,<br>
> after 30 seconds to 2 hours since there is a component of
randomess on<br>
> when the tor HS decides to upload the descriptor to the
directories.<br>
> This alone brings a reachability issue in an IM system.</span><br>
This was the original intention, but Tor hasn't actually worked like
this for a very long time. Due to a bug[2] in the code, hidden
services are always published immediately, and in my experience they
work within 30 seconds.<br>
<span style="white-space: pre;">><br>
><br>
> There are possible solutions to improve reachability and
itself the HS<br>
> design I think can scale in terms of data structure and
holding the<br>
> information for the network to work. I'm way more worried
about the<br>
> network itself if it can handle yes the low traffic of IM
compare to<br>
> torrent but using HS on both ends means a lot of new circuits
being<br>
> created and way more inter relay communication for the HS
system. (And<br>
> I'm not including all the possible attacks to deanonymize
clients with<br>
> using HS as a p2p on desktop/phone).<br>
><br>
> Again, that "might" be a no brainer for the current Tor
network but it<br>
> absolutely needs to be measured and tested! :)</span><br>
I hope someone does! I'd like to have some clear direction on where
scalability needs to be improved, so I can help make it happen.<br>
<span style="white-space: pre;">><br>
><br>
> Cheers!<br>
> David</span><br>
[1] <a class="moz-txt-link-freetext" href="https://github.com/ricochet-im/ricochet/issues/68">https://github.com/ricochet-im/ricochet/issues/68</a><br>
[2] <a class="moz-txt-link-freetext" href="https://trac.torproject.org/projects/tor/ticket/12500">https://trac.torproject.org/projects/tor/ticket/12500</a><br>
<br>
- - John<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)<br>
<br>
iQEcBAEBCgAGBQJUIeU8AAoJEP+XxT8YPARdBbwH/2VsXjQREwMko4jiapJl7jDF<br>
+Ux7CMBFoSEUV7A2GHx3J8HVlCsfpo7gJpVp7YhIv313zSLphTZA9QeWx1J+V57z<br>
ti+CiZBmLd2lCkgZnvbHQ+2/AqJIfWnwByNzXn+S6HgUPn6T0Bw9TkTyPaGitJyi<br>
FCPjmToyL4mW6LmA+TgIFpOYhjM3neAd0vJCiD6P+I/j+sCIjR9SgZ+RMN/w7Nwn<br>
Vx5a+o49yvcqmIGdT2A2nLzlfXz+ikGvGYkWcf0MxK1Albsc2yACdF5FzE/Pdku1<br>
A6PyHpU95gKHblxDGXQs64pGzwYWFPueRWPMT1+ebCpV6LoV92x/UrWLYUXXmZk=<br>
=wa7M<br>
-----END PGP SIGNATURE-----<br>
<br>
</body>
</html>