blog.notmyidea.org/content/Notes/2024-12-28-guardians-of-the-onion.md
2025-01-15 15:56:09 +01:00

4.5 KiB

title speakers tags
Guardians of the onion gus and hiro 38c3, Tor

These are notes taken during and after the 38C3 conference in Hambourg. Notes might be a bit sketchy at times

This was a talk to discuss what makes a "good" community, and a good Tor network. I liked how it was focused on politics mainly, rather than tech stuff.

So, is the Tor network healthy? And how do we assess it?

It should have:

  • Strong community support
  • Continuous improvements, protocol updates
  • Wide adoption

Currently, relay diversity could be improved, the community is not necessarily sustainable, and there are adversaries.

Is tor still safe to use?

First they wanted to adress the elephan in the room, as attacks on Tor have been advertized in the past few months. They believe that the attacks were conducted before they added some security measures to the Tor network, and that the affected sotware was using a now deprecated protocol.

They learned these lessons:

  • Somebody used a retired version of Ricochet, that didn't use new security measures implemented in Tor now.
  • Vanguard measures are able to protect service operators running behind .onion services.

They added documentation on how to run hidden services. As part of this discussion, they've seen people stating things that don't really make a lot of sense:

  • Traffic padding is already used in the protocol ;
  • Some people said that mixnets is the solution, but because it adds traffic it is currently slow. They believe it will lead to people leaving the network because it is not usable.

So, how to check the health of the network?

They are using some numbers to objectify this. 8 000 relays and 2500 exit nodes.

Performance has been better, and they see a concentration of the nodes, that needs to be adressed. A lot of nodes are hosted in germany and in the US, this can be better.

Shannon entropy quantifies the diversity in the distribtion of network attributes.

Diversity is important for obvious reasons, but also for legal reasons. They compared this with some other data, and has seen that the distribution is the same.

They looked at Cloudfare data about AS and it seem that WHAT ?

They believe taht the Tor network is well distributed against AS and ISPs.

What can we do about it?

They have a tool named bandwisth scanner that picks a relay and look a its bandwidth. That allows to keep a list of running relays and influence how circuits are built.

Location bias is a thing when measuring performance, because of how we measure (and from where we measure).

Congestion control eleminates the speed limit of current C-Tor., it reduces the latency by minimizing queue lenghts at relays.

So it results in signifcant perfomance improvements, and increase the overall network capacity.

They say that the concentration they see in the Tor network is the concentration of the infrastructure.

Community

It's important to have a diverse community that is able to trust each other.

To combat bad relays, and because it's very common to have false negatives, they now have a policy explaining how to operate relays.

The relay operator community governance is also important. They have a documentation with "expectations" for relay operators. Excerpt:

not run more than 20% of the total exist capacity or more than 10% of consensus weight.

Outreach with the global south

They have a micro-grant to support the Tor community in the global south and to add geographical diversity to the network.

Snowflake outreach in the GS seem a better approach for their current capacity and resources.

Impact on the environment

Partnership between SEEKCommons and Tor project. They want to measure the Tor network carbon footprint.

Call to action

They need more bridges. This can be a Snowflake proxy or a WebTunnel bridge. They launched a campaign and you can get Tshirts

;)