The current hidden service behavior is that when Tor loses its intro circuits, it chooses new intro points and makes new circuits to them -- which means anybody who has the old hidden service descriptor is going to be introducing herself to the wrong intro points.
If our intro circuits close, but it was because our network failed and not because the intro points failed, we should reestablish new intro circuits to the old intro points.
Nathan wants this for running hidden services on Orbot, since Orbot users change networks (and thus lose existing circuits) quite often.
I expect the main tricky point to be distinguishing "network failed" from "intro point failed". I wonder if some of our CBT work is reusable here.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
If our intro circuits close, but it was because our network failed and not because the intro points failed, we should reestablish new intro circuits to the old intro points.
This would make a hidden service's intro-point relays appear to ‘be responsible for’ the hidden service. The fact that reopening an intro point with the same ‘address’ as a previous one is possible is a bug in Tor's protocol.
Also, merely reusing introduction points would not make HSes on flaky connections work significantly less badly. Their clients would still have to rebuild their rendezvous circuits.
The right way to help Tor clients with flaky connections maintain long-term circuits and streams is to add a circuit-resumption feature to the Tor protocol.
Also, merely reusing introduction points would not make HSes on flaky connections work significantly less badly. Their clients would still have to rebuild their rendezvous circuits.
I'm focusing on the fact that clients will fetch (or just re-use) the old hidden service descriptor, which lists the old introduction points, and be introducing themselves to the wrong place.
Also, merely reusing introduction points would not make HSes on flaky connections work significantly less badly. Their clients would still have to rebuild their rendezvous circuits.
I'm focusing on the fact that clients will fetch (or just re-use) the old hidden service descriptor, which lists the old introduction points, and be introducing themselves to the wrong place.
If a hidden service chooses new intro points after its Internet connection fails, its clients will try the old intro points and find that they no longer work, then fetch a new HS descriptor, then successfully reconnect to the HS.
If a hidden service reuses its old intro points after its Internet connection fails, its clients will try the old intro points and find that they no longer work, then try to fetch a new HS descriptor and find that there isn't one, then fail completely.
If a hidden service could resume its OR connections or circuits at the entry-guard end, its clients wouldn't have to do anything to reconnect to the HS, and they probably wouldn't notice a disruption at all. (This is not only better for performance, but also better for the HS's anonymity.)
FWIW, it's also worth mentioning that making HSes more stubborn towards old IPs might also allow guard discovery attacks from the IP. That is the IP kills incoming circuits, till a compromised middle node is selected, and since the HS is stubborn it will keep on establishing new circuits.
FWIW, it's also worth mentioning that making HSes more stubborn towards old IPs might also allow guard discovery attacks from the IP. That is the IP kills incoming circuits, till a compromised middle node is selected, and since the HS is stubborn it will keep on establishing new circuits.
That's why you should only stick to your intro point when it's your network that failed (that is, the connection between you and your guard), not the intro circuit. (This is what I meant in the body of the bug in the 'main tricky point' sentence.)
FWIW, it's also worth mentioning that making HSes more stubborn towards old IPs might also allow guard discovery attacks from the IP. That is the IP kills incoming circuits, till a compromised middle node is selected, and since the HS is stubborn it will keep on establishing new circuits.
That's why you should only stick to your intro point when it's your network that failed (that is, the connection between you and your guard), not the intro circuit. (This is what I meant in the body of the bug in the 'main tricky point' sentence.)
How many ways are there for an IP to terminate the intro circuit? Are they enumerable?
If the IP closes the connection to its previous hop, will the other hops report that it was the IP's fault that the circuit was destroyed?
Can the IP send an unexpected cell to the guard node, and force the guard node to tear down the circuit? So that it looks like it's the fault of the guard node?