Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Virgil Griffith
> because "the right distribution" is a function of which adversary you're
> considering, and once you consider k adversaries at once, no single
> distribution will be optimal for all of them.)

Granted.  But since we're speaking idealizations, I say take that the
expected-value over the distributions weighted by the probability of each
adversary.  In application this would be a distribution that although
unlikely to be optimal against any specific adversary, it's has robust
hardness across a wide variety of adversaries.

Or, if that distribution is unclear, pick the distribution of exit-relay
with the highest minimum hardness.  This reminds me of the average-entropy
vs min-entropy question for quantifying anonymity.  I'd be content with
either solution, and in regards to Roster I'm not sure the difference will
matter much.  I am simply asking the more knowledgeable for their opinion
and recommendation.  Is there one?

-V



On Wed, Sep 23, 2015 at 2:47 PM Roger Dingledine  wrote:

> On Wed, Sep 23, 2015 at 06:26:47AM +, Yawning Angel wrote:
> > On Wed, 23 Sep 2015 06:18:58 +
> > Virgil Griffith  wrote:
> > > * Would the number of exit nodes constitute exactly 1/3 of all Tor
> > > nodes? Would the total exit node bandwidth constitute 1/3 of all Tor
> > > bandwidth?
> >
> > No. There needs to be more interior bandwidth than externally facing
> > bandwidth since not all Tor traffic traverses through an Exit
> > (Directory queries, anything to do with HSes).
> >
> > The total Exit bandwidth required is always <= the total amount of Guard
> > + Bridge bandwidth, but I do not have HS utilization or Directory query
> > overhead figures to give an accurate representation of how much less.
>
> On the flip side, in *my* idealized Tor network, all of the relays are
> exit relays.
>
> If only 1/3 of all Tor relays are exit relays, then the diversity of
> possible exit points is much lower than if you could exit from all the
> relays. That lack of diversity would mean that it's easier for a relay
> adversary to operate or compromise relays to attack traffic, and it's
> easier for a network adversary to see more of the network than we'd like.
>
> (In an idealized Tor network, the claim about the network adversary
> might not actually be true. If you have exit relays in just the right
> locations, and capacity is infinite compared to demand, then the network
> adversary will learn the same amount whether the other relays are exit
> relays are not. But I think it is a stronger assumption to assume that we
> have exactly the right distribution of exit relay locations -- especially
> because "the right distribution" is a function of which adversary you're
> considering, and once you consider k adversaries at once, no single
> distribution will be optimal for all of them.)
>
> --Roger
>
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Paul Syverson
On Wed, Sep 23, 2015 at 11:34:54AM +, Virgil Griffith wrote:
> > because "the right distribution" is a function of which adversary you're
> > considering, and once you consider k adversaries at once, no single
> > distribution will be optimal for all of them.)
> 

I agree with Roger that ideally all relays can be exits (and since
we're being ideal, we'll assume that 'exit' means to every port). And
the network location distribution of relays by bandwidth is
proportional to both the client destination selection over time and
general Internet traffic over time, which match each other since we're
being ideal, and also matter since we're using an ideal trust-aware path
selection algorithm. And network wide route selection is such that
there is no congestion (generalizing Roger's assumption of infinite
exit capacity). Also all fast-relay operators (which here is the same
as all relay operators) don't merely get a T shirt but a pony wearing
a T shirt. Put differently, I need your ceteris paribus clause spelled
out a lot more so I know what things I can assume in this ideal world
and where I have to live with the actual world (to the extent that
we even know what that looks like).

> Granted.  But since we're speaking idealizations, I say take that the
> expected-value over the distributions weighted by the probability of each
> adversary.  In application this would be a distribution that although
> unlikely to be optimal against any specific adversary, it's has robust
> hardness across a wide variety of adversaries.

In our ongoing work on trust-aware path selection, we assume a trust
distribution that will be the default used by a Tor client if another
distribution is not specified. (Most users will not have a reasoned
understanding of who they actually need to worry most about, and even
if they somehow got that right would not have a good handle how that
adversary's resources are distributed.)  We call this adversary "The
Man", who is equally likely to be everywhere (each AS) on the
network. For relay adversaries, we assume that standing up and running
a relay has costs so weight a bit to make relays that have been around
a long time slightly more likely to be trusted.

> 
> Or, if that distribution is unclear, pick the distribution of exit-relay
> with the highest minimum hardness.  This reminds me of the average-entropy
> vs min-entropy question for quantifying anonymity.  I'd be content with
> either solution, and in regards to Roster I'm not sure the difference will
> matter much.  I am simply asking the more knowledgeable for their opinion
> and recommendation.  Is there one?

I don't think you can meaningfully do this. It's going to be based on
a particularly bad closed-world assumption (worse than the one
underlying so many website fingerprinting analyses). You would have to
assume that you know all the adversaries that all the user types have
and, if you are averaging in some way, then also the average amount of
exit utilization that each user type represents. Ignore the technical
impossibility of doing this in a privacy-safe way and then ignore the
technical impossibility of doing this in a privacy-unsafe way. You
would then be faced with the political nightmare of issuing default
policies that tells users they should route with a weighting that says
country foo has an x percent chance of being your adversary, but
country bar has a y percent chance. (Likewise also have similar
statements that substitute 'large multinational corp.', 'major
criminal organization', 'specific big government agency that is
getting all the press lately' etc.  for "country" in the last
sentence.)

aloha,
Paul

> 
> -V
> 
> 
> 
> On Wed, Sep 23, 2015 at 2:47 PM Roger Dingledine  wrote:
> 
> > On Wed, Sep 23, 2015 at 06:26:47AM +, Yawning Angel wrote:
> > > On Wed, 23 Sep 2015 06:18:58 +
> > > Virgil Griffith  wrote:
> > > > * Would the number of exit nodes constitute exactly 1/3 of all Tor
> > > > nodes? Would the total exit node bandwidth constitute 1/3 of all Tor
> > > > bandwidth?
> > >
> > > No. There needs to be more interior bandwidth than externally facing
> > > bandwidth since not all Tor traffic traverses through an Exit
> > > (Directory queries, anything to do with HSes).
> > >
> > > The total Exit bandwidth required is always <= the total amount of Guard
> > > + Bridge bandwidth, but I do not have HS utilization or Directory query
> > > overhead figures to give an accurate representation of how much less.
> >
> > On the flip side, in *my* idealized Tor network, all of the relays are
> > exit relays.
> >
> > If only 1/3 of all Tor relays are exit relays, then the diversity of
> > possible exit points is much lower than if you could exit from all the
> > relays. That lack of diversity would mean that it's easier for a relay
> > adversary to operate or compromise relays to attack traffic, and it's
> > easier for a network adversary to see more of the network than we'd like.
> 

Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Evan d'Entremont
> In application this would be a distribution that although unlikely to be
optimal against any specific adversary, it's has robust hardness across a
wide variety of adversaries.

So, the F-35?

Perhaps what needs considered is wether that is even possible; and against
which adversaries is TOR designed to resist?

On Wed, Sep 23, 2015 at 8:34 AM, Virgil Griffith  wrote:

> > because "the right distribution" is a function of which adversary you're
> > considering, and once you consider k adversaries at once, no single
> > distribution will be optimal for all of them.)
>
> Granted.  But since we're speaking idealizations, I say take that the
> expected-value over the distributions weighted by the probability of each
> adversary.  In application this would be a distribution that although
> unlikely to be optimal against any specific adversary, it's has robust
> hardness across a wide variety of adversaries.
>
> Or, if that distribution is unclear, pick the distribution of exit-relay
> with the highest minimum hardness.  This reminds me of the
> average-entropy vs min-entropy question for quantifying anonymity.  I'd be
> content with either solution, and in regards to Roster I'm not sure the
> difference will matter much.  I am simply asking the more knowledgeable for
> their opinion and recommendation.  Is there one?
>
> -V
>
>
>
> On Wed, Sep 23, 2015 at 2:47 PM Roger Dingledine  wrote:
>
>> On Wed, Sep 23, 2015 at 06:26:47AM +, Yawning Angel wrote:
>> > On Wed, 23 Sep 2015 06:18:58 +
>> > Virgil Griffith  wrote:
>> > > * Would the number of exit nodes constitute exactly 1/3 of all Tor
>> > > nodes? Would the total exit node bandwidth constitute 1/3 of all Tor
>> > > bandwidth?
>> >
>> > No. There needs to be more interior bandwidth than externally facing
>> > bandwidth since not all Tor traffic traverses through an Exit
>> > (Directory queries, anything to do with HSes).
>> >
>> > The total Exit bandwidth required is always <= the total amount of Guard
>> > + Bridge bandwidth, but I do not have HS utilization or Directory query
>> > overhead figures to give an accurate representation of how much less.
>>
>> On the flip side, in *my* idealized Tor network, all of the relays are
>> exit relays.
>>
>> If only 1/3 of all Tor relays are exit relays, then the diversity of
>> possible exit points is much lower than if you could exit from all the
>> relays. That lack of diversity would mean that it's easier for a relay
>> adversary to operate or compromise relays to attack traffic, and it's
>> easier for a network adversary to see more of the network than we'd like.
>>
>> (In an idealized Tor network, the claim about the network adversary
>> might not actually be true. If you have exit relays in just the right
>> locations, and capacity is infinite compared to demand, then the network
>> adversary will learn the same amount whether the other relays are exit
>> relays are not. But I think it is a stronger assumption to assume that we
>> have exactly the right distribution of exit relay locations -- especially
>> because "the right distribution" is a function of which adversary you're
>> considering, and once you consider k adversaries at once, no single
>> distribution will be optimal for all of them.)
>>
>> --Roger
>>
>> ___
>> tor-dev mailing list
>> tor-dev@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>>
>
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
>
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Desired exit node diversity

2015-09-23 Thread Virgil Griffith
Let's try a simple special case. In an idealized Tor network, what would
the distribution of exit nodes look like?

* Would each exit node have the same bandwidth? Or would there instead be
only one exit node per AS?

* Would the number of exit nodes constitute exactly 1/3 of all Tor nodes?
Would the total exit node bandwidth constitute 1/3 of all Tor bandwidth?

* Would their distribution of AS numbers match the distribution of AS
numbers of Tor clients? The distribution of Internet users?

Exit nodes seem a nice place to start concretizing what's meant when we say
we want relay diversity. Comments immensely appreciated because as-is I
don't know the answers to these questions.


-V
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Yawning Angel
On Wed, 23 Sep 2015 06:18:58 +
Virgil Griffith  wrote:
> * Would the number of exit nodes constitute exactly 1/3 of all Tor
> nodes? Would the total exit node bandwidth constitute 1/3 of all Tor
> bandwidth?

No. There needs to be more interior bandwidth than externally facing
bandwidth since not all Tor traffic traverses through an Exit
(Directory queries, anything to do with HSes).

The total Exit bandwidth required is always <= the total amount of Guard
+ Bridge bandwidth, but I do not have HS utilization or Directory query
overhead figures to give an accurate representation of how much less.

Regards,

-- 
Yawning Angel


pgpRhKLezTcGv.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Roger Dingledine
On Wed, Sep 23, 2015 at 06:26:47AM +, Yawning Angel wrote:
> On Wed, 23 Sep 2015 06:18:58 +
> Virgil Griffith  wrote:
> > * Would the number of exit nodes constitute exactly 1/3 of all Tor
> > nodes? Would the total exit node bandwidth constitute 1/3 of all Tor
> > bandwidth?
> 
> No. There needs to be more interior bandwidth than externally facing
> bandwidth since not all Tor traffic traverses through an Exit
> (Directory queries, anything to do with HSes).
> 
> The total Exit bandwidth required is always <= the total amount of Guard
> + Bridge bandwidth, but I do not have HS utilization or Directory query
> overhead figures to give an accurate representation of how much less.

On the flip side, in *my* idealized Tor network, all of the relays are
exit relays.

If only 1/3 of all Tor relays are exit relays, then the diversity of
possible exit points is much lower than if you could exit from all the
relays. That lack of diversity would mean that it's easier for a relay
adversary to operate or compromise relays to attack traffic, and it's
easier for a network adversary to see more of the network than we'd like.

(In an idealized Tor network, the claim about the network adversary
might not actually be true. If you have exit relays in just the right
locations, and capacity is infinite compared to demand, then the network
adversary will learn the same amount whether the other relays are exit
relays are not. But I think it is a stronger assumption to assume that we
have exactly the right distribution of exit relay locations -- especially
because "the right distribution" is a function of which adversary you're
considering, and once you consider k adversaries at once, no single
distribution will be optimal for all of them.)

--Roger

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Roger Dingledine
On Wed, Sep 23, 2015 at 06:18:58AM +, Virgil Griffith wrote:
> Exit nodes seem a nice place to start concretizing what's meant when we say
> we want relay diversity. Comments immensely appreciated because as-is I
> don't know the answers to these questions.

Hi Virgil,

I've been pondering the opposite of this topic, after looking at the
recent tor-relays thread about some ISP not wanting to let somebody
host an exit relay because they figure a lot of the Tor network is
run by government agencies. My usual answer to that concern is "no, we
*know* the operators of more than half the capacity in the Tor network,
so this cannot be the case". And I think this is increasingly true in
the era of activist non-profits that run relays -- Germany's got one,
and so do the US, the Netherlands, Sweden, France, Luxembourg, etc etc.

But it would be neat to have a mechanism for learning whether this is
actually true, and (whatever the current situation) how it's changing.

The tie-in to Roster would be some sort of "socially connected" badge,
which your relay gets because you're sufficiently tied into the Tor
relay operator community.

And then we'd have something concrete to point to for backing up, or
disputing, the claim that we know a significant fraction of the network.

Of course, the details of when to assign the badge will be tricky and
critical: too loose and you undermine the trust in it (it only takes a
few "omg the kgb runs a relay and look it's got the badge" cases to make
the news), but too strict and you undercount the social connectedness.

In a sense this is like the original 'valid' flag, which you got
by mailing me and having me manually approve your relay (and without
which you would never be used as the entry or exit point in a circuit).
Periodically I wonder if we should go back to a design like that, where
users won't pick exit relays that don't have the "socially connected"
badge. Then I opt against wanting it, since I worry that we'd lose
exactly the kind of diversity we need most, by cutting out the relays
whose operators we don't know.

But both sides of that are just guessing. Let's find out!

--Roger

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Desired exit node diversity

2015-09-23 Thread Virgil Griffith
Can we not use the argument "anonymity requires diverse company" on both
sides? For whole rational actors it seems like this should work. Tor
"exploits the military" into lending cover to activist groups, which they
would presumably support.

This may be too naive a view of the situation.

Re: socially connected. That's interesting. I'll see what I can do. Chat
more in Berlin.

-V
On Thu, 24 Sep 2015 at 13:19 Roger Dingledine  wrote:

> On Wed, Sep 23, 2015 at 06:18:58AM +, Virgil Griffith wrote:
> > Exit nodes seem a nice place to start concretizing what's meant when we
> say
> > we want relay diversity. Comments immensely appreciated because as-is I
> > don't know the answers to these questions.
>
> Hi Virgil,
>
> I've been pondering the opposite of this topic, after looking at the
> recent tor-relays thread about some ISP not wanting to let somebody
> host an exit relay because they figure a lot of the Tor network is
> run by government agencies. My usual answer to that concern is "no, we
> *know* the operators of more than half the capacity in the Tor network,
> so this cannot be the case". And I think this is increasingly true in
> the era of activist non-profits that run relays -- Germany's got one,
> and so do the US, the Netherlands, Sweden, France, Luxembourg, etc etc.
>
> But it would be neat to have a mechanism for learning whether this is
> actually true, and (whatever the current situation) how it's changing.
>
> The tie-in to Roster would be some sort of "socially connected" badge,
> which your relay gets because you're sufficiently tied into the Tor
> relay operator community.
>
> And then we'd have something concrete to point to for backing up, or
> disputing, the claim that we know a significant fraction of the network.
>
> Of course, the details of when to assign the badge will be tricky and
> critical: too loose and you undermine the trust in it (it only takes a
> few "omg the kgb runs a relay and look it's got the badge" cases to make
> the news), but too strict and you undercount the social connectedness.
>
> In a sense this is like the original 'valid' flag, which you got
> by mailing me and having me manually approve your relay (and without
> which you would never be used as the entry or exit point in a circuit).
> Periodically I wonder if we should go back to a design like that, where
> users won't pick exit relays that don't have the "socially connected"
> badge. Then I opt against wanting it, since I worry that we'd lose
> exactly the kind of diversity we need most, by cutting out the relays
> whose operators we don't know.
>
> But both sides of that are just guessing. Let's find out!
>
> --Roger
>
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev