Delivery-Date: Tue, 02 Sep 2014 08:38:38 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id C4C031E0BA7;
	Tue,  2 Sep 2014 08:38:36 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3C17230F27;
	Tue,  2 Sep 2014 12:38:34 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 8AE3F30204
 for <tor-talk@lists.torproject.org>; Tue,  2 Sep 2014 12:38:30 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Bu9iNL3re4p8 for <tor-talk@lists.torproject.org>;
 Tue,  2 Sep 2014 12:38:30 +0000 (UTC)
Received: from mail-la0-x22d.google.com (mail-la0-x22d.google.com
 [IPv6:2a00:1450:4010:c03::22d])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 3503530200
 for <tor-talk@lists.torproject.org>; Tue,  2 Sep 2014 12:38:30 +0000 (UTC)
Received: by mail-la0-f45.google.com with SMTP id pn19so7671501lab.4
 for <tor-talk@lists.torproject.org>; Tue, 02 Sep 2014 05:38:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:date:message-id:subject:from:to:content-type;
 bh=D6KMlGhMJBWJwEA73JXYFSLVYJ5RM4xZ9fvltMf8/90=;
 b=DkFvHTRh0bbAUKAHJdgNDXJVMjV6jzHFzq4CjLqo3OVb8WUd9V+fBqt7yLe39Ti5VK
 kMuYoi3f18gmsM1eXHU2w0pOm09VcVnScilYVOj2p5sDJxojjMq8XtFT61ep87r29OSG
 lutDiVr51sjGpDi3nmNsKeSuZ43lR4UN8//J6WYqAt6xwlRH4QFlGc9CyYBsZEmL6GHA
 UZJzGAs16PhC0xZqyQQvdjEJDeWDSYximmJP5x5VWRUPHp2Rf6Cz0SLuK+VOR0Ix2C91
 OEKdczmYs0oLHuAz0qDnLc8ZzgdHb1A0D3HU84GswX6XeXUUfYtu4VFKK0g7ZAR8LJvO
 NwCQ==
MIME-Version: 1.0
X-Received: by 10.152.42.136 with SMTP id o8mr14560228lal.76.1409661506818;
 Tue, 02 Sep 2014 05:38:26 -0700 (PDT)
Received: by 10.152.28.71 with HTTP; Tue, 2 Sep 2014 05:38:26 -0700 (PDT)
Date: Tue, 2 Sep 2014 14:38:26 +0200
Message-ID: <CAJYQ-fR-_W8K5ma44UPCmPvv1AWvOSq-DtT6YjF18JM-HgEj3A@mail.gmail.com>
From: Johan Pouwelse <peer2peer@gmail.com>
To: tor-talk@lists.torproject.org
Subject: [tor-talk] UDP-based Tor-like test network for Bittorrent
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi All,
We have implemented parts of the Tor protocol in Python, it uses UDP and
integrated it with a decentralised gossip-based directory service.

Today we're launching a public trial for testing and feedback. We hope
this could be an alternative for avid torrent users and move some of
the file sharing load (50%) away from Tor. This trial in no way
connects to the Tor network.

Feature under test:
router are behind NAT and use UDP puncturing to create 3-hop tunnels

This is very much work in progress and under active development. We
tried to follow the Tor message specifications as best as we could and
use UDP exclusively. Our todo list is still long, for instance, DTLS
is not yet used. Help welcome..

All participants in our trial automatically become guard/relay and
exit node for a single Bittorrent test swarm. Congestion control is
end-to-end, done by LEDBAT within Libtorrent. The trial network does
not use directory authorities. Every client includes a list of
hard-coded IP addresses to bootstrap. Every participant contacts them
and then builds up their own view of online routers using gossip
messages. This makes this network vulnerable to a wide range of
attacks, especially the Sybil attack. Our full decentralisation
clearly weakens security. Our motivation is to empirically validate
one possible design alternative, one fully focused on decentralisation
and scalability.

details: https://github.com/Tribler/tribler/wiki/Anonymous-Downloading-and-Streaming-specifications
code: https://github.com/Tribler/tribler/blob/v6.3.0/Tribler/community/tunnel/community.py#L271
press: http://torrentfreak.com/tribler-makes-bittorrent-client-anonymous-built-tor-network-140902/
about us: http://tribler.org/about.html

Greetings, Johan Pouwelse, Delft University of Technology
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

