This would provide additional cover traffic for other HSes. Another proposal from the (second) HS guard discovery protections meeting at the 2015 Berlin Tor developer meeting was to only have clients check for new Tor Browser updates via some HS(es), and then do the actual download of the update over the regular non-HS mirrors.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
since updates can be a high lattency application the download process could be split in a randomized pattern and thus be more difficult to filter out of a traffic analysis.
Another thing to add (from an email that was sent to tor-dev):
This is far easier to do for the Torbutton RecommendedTBBVersions fetch since the updater has special cert pinning that would need to be altered for hidden services.
Not an expert, but should this be postponed until prop 224 and all related HS props that are nearly complete are deployed? I know HS as it is now is still probably as secure or more than a clearnet site but would like to hear whether it is in theory safer to do so then.
I'd like to test this out, first in the alpha series, sooner than later. The idea would be to fetch the metadata file (update.xml) over .onion which is a pretty small file (around 1000 bytes) but not the full update. I am in particular concerned about TLS being the means of authenticating the contents of that xml file and think we can do better with an .onion responsible for that.
weasel, ln5: do you feel the current .onion setup for aus1 is robust enough for that test? Should we wait until we have v3 services available? Or...?
I'd like to test this out, first in the alpha series, sooner than later. The idea would be to fetch the metadata file (update.xml) over .onion which is a pretty small file (around 1000 bytes) but not the full update. I am in particular concerned about TLS being the means of authenticating the contents of that xml file and think we can do better with an .onion responsible for that.
weasel, ln5: do you feel the current .onion setup for aus1 is robust enough for that test? Should we wait until we have v3 services available? Or...?
We discussed this in Brussels a bit. It is our current consensus that the onion service providing aus1.tpo is not suitable for this purpose.
The onion service is backed by onionbalance, which appears to be unmaintained upstream and which does not support v3 onion services. Furthermore, in order for us to be comfortable relying and depending on an onion service for such an important purpose, we would want that onionbalance itself could be run in a distributed/redundant way such that we would not have any SPoFs.
Once these issues are addressed, we can reconsider the issue. For now, however, we recommend you not rely on the onion for updates.