There is a case to be made that relays should stop uploading and downloading directory information via HTTP. We should consider the arguments there and see if there's a good rationale beyond the standard "why not encrypt everything" baseline.
(To be clear, bridges don't make connections over HTTP.)
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
From that ticket, my impression of why you'd do a DirPort connection from non-bridge relays:
I think the original rationale was that:
all of this information was publicly associated with the uploading IP, and as such encrypting it wouldn't actually protect anything.
using a separate port for uploads would allow directory authorities to throttle downloads without harming uploads.
Roger added:
Clients use begindir so it's harder to fingerprint and prevent their directory fetches.
Relays don't use begindir to avoid loading down the directory authorities with ssl handshakes (heavyweight) simply for an http directory publish/fetch (lightweight).
Load on directory authorities seems like it should come primarily from a) clients that are bootstrapping, though we're hoping to resolve that bottleneck with the fallback directory mirrors, and b) relays. It'd be a shame to magnify part 'b' by a lot.
At one point, I thought that b) was spurious, since bug #11469 (moved) had turned off direct connections for (most) relays, but Roger pointed out to me that it only turned off direct connections for publishing, and that relays downloading from authorities (which is much more expensive) still use HTTP.
I have a better understanding now of the reasoning behind using direct or encrypted sessions when communicating with the authorities. (1) Cost of server resources, and (2) protecting information believed to not need protecting.
I don't know the value of (1), but I do believe that removing an additional way of someone determining you are operating as part of the Tor infrastructure in valuable. Yes, someone can enumerate the Tor infrastructure by installing a client. That is one way to get information if they are looking for who is running Tor nodes. Someone trying to figure out what a particular server is running, not looking for Tor specifically, is a different attack/angle. Not encrypting that info allows someone to determine a server is running Tor when they weren't looking for it in the first place, but now they know.
Would it be reasonable have an option created to turn this capability on/off?
Similar to some other options, we could create both a consensus parameter and a torrc option.
The torrc default, auto, would be to use the consensus value, but the torrc option would also allow explicit require SSL/prefer SSL/prefer HTTP/require HTTP (or whatever preference set is considered reasonable).
The consensus parameter would then allow us to turn HTTPS directories on and off depending on the impact on the network.
Would we need separate upload SSL and download SSL parameters, or do we just need a download parameter?
using a separate port for uploads would allow directory authorities to throttle downloads without harming uploads.
For historical context: relays and clients didn't start out using separate ports. It started out that all directory stuff, for everybody, used the DirPort. Then we moved clients over to the ORPort, because they were getting censored by DPI. We decided not to move relays over at the time.
teor and I discussed this ticket more today, and one useful way forward was to simplify the current behavior, by having relays only use the DirPort when they're talking to a directory authority. (Right now relays mostly talk to dir auths, but there are some edge cases where they don't, and that complexifies all the analysis.)