tor/doc/spec/proposals/xxx-bridges.txt

146 lines
5.3 KiB
Plaintext
Raw Normal View History

Filename: xxx-bridges.txt
Title: Behavior for bridge users, bridge relays, and bridge authorities
Version: $Revision: 12051 $
Last-Modified: $Date: 2007-10-19 14:56:24 -0400 (Fri, 19 Oct 2007) $
Author: Roger Dingledine
Created: xx-Oct-2007
Status: Open
0. Preface:
This document describes the design decisions around support for bridge
users, bridge relays, and bridge authorities.
For more details on what all of these mean, look at blocking.tex in
/doc/design-paper/
1. Bridge relays.
Bridge relays are just like normal Tor relays except they don't publish
their server descriptors to the main directory authorities.
1.1. PublishServerDescriptor
To configure your relay to be a bridge relay, just add
PublishServerDescriptor bridge
to your torrc. This will cause your relay to publish its descriptor
to all the bridge authorities rather than the default authorities.
Alternatively, you can say
PublishServerDescriptor 0
which will cause your relay to not publish anywhere. This could be
useful for private bridges.
1.2. Defining DirPort
Bridges need to answer BEGIN_DIR requests, both so they can answer
/server/authority questions ("what's your descriptor?") and so they
can supply their bridge users with cached copies of all the various
Tor network information.
Right now (0.2.0.9-alpha) we require that bridges turn their DirPort on
-- which means both that we answer BEGIN_DIR requests and that we fetch
and cache directory information in an aggressive way like other servers.
But:
a) we don't enforce that DirPort is on, since it's not clear how to
detect if the user meant to be a bridge. So it's easy to launch a bridge
relay that silently refuses BEGIN_DIR requests and is thus useless.
b) We don't actually care if they have an open or reachable DirPort. So
at some point we should separate having an open DirPort from answering
directory questions. Which leads to:
c) We need to investigate if there are any anonymity worries with
answering BEGIN_DIR requests when our DirPort is off. If there aren't,
we can drop the DirPort requirement.
1.3. Exit policy
Bridge relays should use an exit policy of "reject *:*". This is
because they only need to relay traffic between the bridge users
and the rest of the Tor network, so there's no need to let people
exit directly from them.
1.4. RelayBandwidthRate / RelayBandwidthBurst
We invented the RelayBandwidth* options for this situation: Tor clients
who want to allow relaying too. See proposal 111 for details. Relay
operators should feel free to rate-limit their relayed traffic.
1.5. Helping the user with port forwarding, NAT, etc.
Just as for operating normal relays, our documentation and hints for
how to make your ORPort reachable are inadequate for normal users.
We need to work harder on this step.
1.6. Vidalia integration
Vidalia has turned into "Relay" settings page into a tri-state
"Don't relay" "Relay for the Tor network" "Help censored users".
If the click the third choice, it forces your exit policy to reject *:*,
and it forces your DirPort to 9030 (see Sec 1.2 above about DirPort).
If all the bridges end up on port 9001, that's not so good. On the
other hand, putting the bridges on a low-numbered port in the Unix
world requires jumping through extra hoops. The current compromise is
that Vidalia makes the ORPort default to 443 on Windows, and 9001 on
other platforms.
2. Bridge authorities.
Bridge authorities are like normal directory authorities, except they
don't create their own network-status documents. So if you ask an
authority for a network-status document, they behave like a directory
mirror: they give you one from one of the main authorities. But if
you ask the bridge authority for a particular identity fingerprint,
it will happily give you the latest descriptor for that fingerprint.
Right now there's one bridge authority, running on the Tonga relay.
2.1. Exporting bridge-purpose descriptors
We've added a new purpose for server descriptors, the "bridge"
purpose. With the new router-descriptors file that includes annotations,
it's easy to look through it and find the bridge-purpose descriptors.
We should work with Tonga to export its router-descriptors file to
some place where we can distribute the bridge addresses according to
the policies in blocking.pdf. It might even be easier to have it write
out a separate file, just for export, that includes only the bridge
descriptors; or maybe a six-liner perl postprocessing script is the
better plan there to create a file for export.
2.2. Reachability/uptime testing
should bridge relays publish anonymously to the bridge authority?
migrating to multiple bridge authorities
3. Bridge users.
UseBridges 1
TunnelDirConns 1
Format of the bridge identifier.
bridges as entry guards
bridges as directory guards
UpdateBridgesFromAuthority 1
when to use a one-hop circuit, when to use a three-hop, to reach
the directory authority
bridge descriptor retry schedule
when to make TunnelDirConns default.
Vidalia integration:
vidalia looks up the geoip data for tor servers it knows about. which
is fine, except when they're bridges. now geoip.vidalia-project.net
is a place to go to learn bridge IP addresses.