Delivery-Date: Wed, 11 Mar 2015 13:36:23 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,
	URIBL_BLOCKED autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 56A901E0B96
	for <archiver@seul.org>; Wed, 11 Mar 2015 13:36:21 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 67F8A347E4;
	Wed, 11 Mar 2015 17:36:16 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B86A6347E2
 for <tor-talk@lists.torproject.org>; Wed, 11 Mar 2015 17:36:12 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 5l8X9c8FyLv0 for <tor-talk@lists.torproject.org>;
 Wed, 11 Mar 2015 17:36:12 +0000 (UTC)
Received: from mail-ig0-x22a.google.com (mail-ig0-x22a.google.com
 [IPv6:2607:f8b0:4001:c05::22a])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 92D653457B
 for <tor-talk@lists.torproject.org>; Wed, 11 Mar 2015 17:36:12 +0000 (UTC)
Received: by igkb16 with SMTP id b16so14258401igk.1
 for <tor-talk@lists.torproject.org>; Wed, 11 Mar 2015 10:36:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=6HlTBcS0BLKnZWR9Ve92zI7p8BiH5bxQmhf3jhx7ppI=;
 b=jXE1AWbm6aITWIqa/eb/NyeFioisq7y+YpBUetbaBd5TAsUTZ04MdgZ12Qf83zaoFK
 Ra+ESJcOwa+tx2m80JfZdtyYZP9dA8is1o6vCM6zYJgpOMQ6YzwUdkEU1SzPvQOyktIZ
 ouinEaC1H4hi4qOnvi/hNbnWhQyGcV5lXl5n2VCGSZUShrj616uwETmSR1gIIZtQ6y7k
 sdtNZ28D5tnVe/9zL5zzt/mleslZpoYluiT68m//yB/nGp/wTCeTNrSUqMxbJ2lhJlDi
 R06e5n6uRIjcauRkELhLeQ1teMJdsPtEsLjMMiobnQxaDUt5swHDFCKt6KuYK2B0j6i6
 vL4g==
MIME-Version: 1.0
X-Received: by 10.107.163.65 with SMTP id m62mr31487504ioe.40.1426095370290;
 Wed, 11 Mar 2015 10:36:10 -0700 (PDT)
Received: by 10.36.104.78 with HTTP; Wed, 11 Mar 2015 10:36:10 -0700 (PDT)
In-Reply-To: <A6DD5B99-8E6D-4B21-AC82-14E92C8C6332@maclemon.at>
References: <A6DD5B99-8E6D-4B21-AC82-14E92C8C6332@maclemon.at>
Date: Wed, 11 Mar 2015 13:36:10 -0400
Message-ID: <CAD2Ti289OLAe-Xs2XrkqM4zTx=YM3=PTkbwH+7oV4sHEp4wqPQ@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Load Balancing/High Availability Hidden Services
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Wed, Mar 11, 2015 at 11:27 AM, MacLemon <tor@maclemon.at> wrote:
> descriptors would overwrite each other every few minutes.

Not necessarily an overwrite but more validity window of descriptor location.

> I don't think one can do something like Round-Robin DNS with HS.

You can run DNS on top of Tor for your users.

> intelligently/randomly 302 redirects each file request to a known-to-it server.

You should present randomized links to the file beforehand instead
of 302'ing the actual request. This will save one RTT as well.

> cope for nodes coming and going.

This shouldn't be happening unless you're taking them offline,
for which you would know to adjust.

> Has anyone done something like this?

The above methods been used before. There are some recent threads in
the archives that may not be any better, but maybe some proposals in
torspec.git you could review.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

