Delivery-Date: Sun, 23 Nov 2014 22:17:39 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 5836D1E0A41;
	Sun, 23 Nov 2014 22:17:37 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3BB01321A3;
	Mon, 24 Nov 2014 03:17:33 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EA9BC3216D
 for <tor-talk@lists.torproject.org>; Mon, 24 Nov 2014 03:17:28 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id FwnzaUCD2l6f for <tor-talk@lists.torproject.org>;
 Mon, 24 Nov 2014 03:17:28 +0000 (UTC)
Received: from mail-ig0-x229.google.com (mail-ig0-x229.google.com
 [IPv6:2607:f8b0:4001:c05::229])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id C3A3E3204D
 for <tor-talk@lists.torproject.org>; Mon, 24 Nov 2014 03:17:28 +0000 (UTC)
Received: by mail-ig0-f169.google.com with SMTP id hl2so4403620igb.2
 for <tor-talk@lists.torproject.org>; Sun, 23 Nov 2014 19:17:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=P7KbHaViDHUFwIMCRkkgNeua0+0yr7u3Wvc7lgWuCIE=;
 b=N4J5aycsRFtlMfA9u9dzuC2IjEILOwnRauSiREzSOArtsn+JV+RGwg98aH8aLfoCwV
 fM03swhBujZxUMmu530562Pxe96+AgNOLLWGeZZb+hDtg4JC6woCKG1V6eVwcJbMJRfc
 s7ARpfAybdQBO5IBlUAjebqPFe/KhT0bMOXc4uXyhdlPlPP5qZo7wKz7LICbjZ7sFoD8
 WEJ11kpHh2JeTAsJUTr9mhFMU5ktgFPBwsM5KaY3N6CLWNO+TffAip4LCpIDV/ezfRM/
 8yCnryEn9W46SoyO0F4qDfbwwgIHPSd1ReiJJJzmnV5Yey/eGu1bzfRVlB1XxZXFe5Zs
 8PIg==
MIME-Version: 1.0
X-Received: by 10.107.14.208 with SMTP id 199mr2514687ioo.28.1416799046444;
 Sun, 23 Nov 2014 19:17:26 -0800 (PST)
Received: by 10.107.18.65 with HTTP; Sun, 23 Nov 2014 19:17:26 -0800 (PST)
In-Reply-To: <CAGRDzQW570-hH07W8DVPCm=0UNmC4ddT0QNiavvCypMUiuj1DA@mail.gmail.com>
References: <008cbe7468ef38777d2e2addf83b21b2.squirrel@bitmailendavkbec.onion>
 <CAAS2fgSJ7fqJeGYDBX0qc7XtoeNOt6j-KCdjuN63GxYt-Pc94Q@mail.gmail.com>
 <CAGRDzQW570-hH07W8DVPCm=0UNmC4ddT0QNiavvCypMUiuj1DA@mail.gmail.com>
Date: Mon, 24 Nov 2014 03:17:26 +0000
Message-ID: <CAAS2fgQ4xG6++QCWfhthJSqpgpB5Fr_cRkkc6S46BeTHzfqZsQ@mail.gmail.com>
From: Gregory Maxwell <gmaxwell@gmail.com>
To: "This mailing list is for all discussion about theory, design,
 and development of Onion Routing." <tor-talk@lists.torproject.org>
Subject: Re: [tor-talk] Propsal for decentralization of the Tor network
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Mon, Nov 24, 2014 at 3:03 AM, Cari Machet <carimachet@gmail.com> wrote:
> prove decentralization creates vulnerability to a larger degree than
> centralization

You haven't specified the decentralization mechanism.  So I guess I get to pick?

Okay. Instead of believing the directory authority signatures, instead
you have nodes connect out to as many nodes as they can find, and add
any entry returned by a majority of nodes to their local directory.

Oops. The attacker is a local network and only lets them connect out
to their own nodes, which perform a sybil attack and limit the tor
client's view to just the attackers hosts.  Client security is lost
completely.

Q.E.D. ...

There are many ways you can go about trying to be 'decentralized'
most are _profoundly_ insecure in an active adversaries attack model.
Usually the main failure mode is inadequate sybil resistance.

This isn't to say that I don't think useful things are possible,  I
don't know. I have not seen a proposal which even makes an argument
for its own security for this application. Saying "decenteralized" is
easy, tendering a concrete proposal which achieves useful security
properties is much harder.  And "decenteralized" isn't something that
can be deployed or analyzed for its security, specific concrete
proposals are.

Incidentally,

> Ruh-roh, this is now necessary: This email is intended only for the
> addressee(s) and may contain confidential information. If you are not the
> intended recipient, you are hereby notified that any use of this
> information, dissemination, distribution, or copying of this email without
> permission is strictly prohibited.

If you don't want your emails being made public you should consider
not sending them to a public mailing list.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

