We need a consensus parameter that controls the deployment of proposal 224 that is next generation onion service.
Lots of code will go in tor without being used at first so this parameter will tell all the tor out there to start using the new generation onion service.
This is especially important before we merge HSDir support (legacy/trac#17238 (moved)) in order for relay to NOT store 224 descriptors while the rest is under development.
I'm thinking OnionService224=0 (or we can omit 224 here and assume "OnionService" is next gen obviously :).
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Also, if we do something like this, it should have a matching tri-state in the configuration: A "1" means "allow", "0" means "forbid", and "auto" means "look at the consensus".
What would be so bad if relays stored prop224 descriptors before the rest of this stuff is deployed?
Hrm, I would say to avoid for Tor to become an "Internet File System"? :) Ok yes, it's already "possible" with current system but adding an extra one might not be necessary. I'm not strongly against actually but this consensus params is needed anyway as we talked about it before to also be the switch for the removal of v0 and v1 from tor code.
It's also a nice safe switch considering the humongeous-ness of this to turn it off in the early days if we happen to do something really bad? A bit like the same we did with shared random, a way for dirauth to turn it off.
I'm open here, if we are confident that we can introduce code for prop224 without this switch, no problem with me.
The consensus parameter idea sounds like a plausible mechanism for controlling deployment.
What would the consensus parameter do exactly?
Here are some possible answers:
When disabled, it would block HSDirs from accepting prop224 descriptors.
It would block relays from responding to prop224 cells.
It would block clients from using prop224 onion addresses.
I've implemented this in branch ticket17238_029_02 thus now part of the larger ticket legacy/trac#17238 (moved). NextGenOnionServices is the chosen option.
As discussed in Seattle, the idea here would be to have a consensus parameters only for client and service but not the relay side. If the relay supports a feature, it should use it. This will be comparable to the same technique we used for ntor handshake using UseNTorHandshake=1 at once. We'll be able to start switching client and services on as we see enough of the network supporting correctly prop224.
Alright, I've cleaned up the current EnableOnionServiceV3 consensus param. See bug19899_030_01.
If we merge this, lets close this ticket because when we'll implement the service and client functionalities, by design we'll add a consensus param for them so no need for a ticket to remind us that we have to add some piece of code to a feature.