I think we could do this with fallback directory mirrors, to increase the chances of Tor bootstrapping successfully in these environments.
With two authority attempts in 0.2.7, it's roughly 47% (2/9 + 2/8).
We already have the same or greater probability of bootstrap success with fallbacks and authorities and an increased number of attempts. But it would be nice to use this trick for about 10% of fallbacks.
This will require changes to the fallback selection script and the whitelist format.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Trac: Summary: Consider including fallback directry mirrors with multiple IP addresses to Consider including fallback directory mirrors with multiple IP addresses Description: arma describes the advantages of hard-cording bootstrap IP addresses that aren't in the consensus:
I think we could do this with fallback directory mirrors, to increase the chances of Tor bootstrapping successfully in these environments.
With two authority attempts in 0.2.7, it's roughly 47% (2/9 + 2/8).
We already have the same or greater probability of bootstrap success with fallbacks and authorities and an increased number of attempts. But it would be nice to use this trick for about 10% of fallbacks.
This will require changes to the fallback selection script and the whitelist format.
to
arma describes the advantages of hard-coding bootstrap IP addresses that aren't in the consensus:
I think we could do this with fallback directory mirrors, to increase the chances of Tor bootstrapping successfully in these environments.
With two authority attempts in 0.2.7, it's roughly 47% (2/9 + 2/8).
We already have the same or greater probability of bootstrap success with fallbacks and authorities and an increased number of attempts. But it would be nice to use this trick for about 10% of fallbacks.
This will require changes to the fallback selection script and the whitelist format.
...
This will require changes to the fallback selection script and the whitelist format.
And it's safe (for reliability) to list the same fallback twice, as long as it's only some fallbacks that get this treatment. Ideally, we'd want users to get at least 1 fallback or authority on an alternate IP address before it fails bootstrap or the user gives up (nominally 30 seconds).
Authority: 22/8 = 50%
Fallback: 4N/150 = 50%
With N = 19, or 1/8 of fallbacks on alternate IP addresses, most clients would get at least one on an alternate address every bootstrap.
The challenge will be contacting each operator, and finding some operators with multiple IP addresses. We might even contact all potential operators, and then select two different lists, so we don't miss eligible relays with multiple IP addresses.
The challenge will be contacting each operator, and finding some operators with multiple IP addresses. We might even contact all potential operators, and then select two different lists, so we don't miss eligible relays with multiple IP addresses.
If you are excited to do it, go for it. If you're not excited though, I think there's no reason to put too much energy into this idea.
Remember the original phrasing in the tor-dev post: "It's certainly not a robust trick, but it has few downsides". Once you need to ask a bunch of people to set things up, and track whether they did, and bug them afterwards, it might not count as "few downsides" anymore. :)