1 |
On 8/21/20 11:54 AM, Caveman Al Toraboran wrote: |
2 |
> thanks. highly appreciate your time. to save space i'll skip parts |
3 |
> where i fully agree with/happily-learned. |
4 |
|
5 |
You're welcome. |
6 |
|
7 |
> (e.g. loop detection; good reminder, i wasn't thinking about it. |
8 |
> plus didn't know of acronyms DSN, MDNs, etc; nice keywords for |
9 |
> further googing). |
10 |
|
11 |
;-) |
12 |
|
13 |
> i was thinking (and still) if such relay-by-relay delivery increases |
14 |
> probability of error by a factor of n (n = number of relays in the |
15 |
> middle). e.g. probability of accidental silent mail loss is if one, |
16 |
> or more, accidentally said "yes got it!" but actually didn't. i.e.: |
17 |
|
18 |
It definitely won't be a factor of n, where n is the number of relays. |
19 |
|
20 |
> i wonder if it would be better if only the entry relay aims at the |
21 |
> confirmation from the terminal server? this way we won't need to |
22 |
> assume that relays in the middle are honouring their guarantees, |
23 |
> hence the probability above would be smaller since k is limited up |
24 |
> to 2 despite n's growth. |
25 |
|
26 |
Nope. |
27 |
|
28 |
Each and every server MUST behave the same way. |
29 |
|
30 |
> care to point part of the rfc that defines "safe" commit to disk? |
31 |
> e.g. how far does the rfc expect us to go? should we execute `sync`'s |
32 |
> equivalent to ensure that data is actually written on disk and is |
33 |
> not in operating system's file system write buffer? |
34 |
|
35 |
TL;DR: Yes on all accounts. |
36 |
|
37 |
See the recent reply about guarantee and relays for more details. |
38 |
|
39 |
> onion signatures? e.g. message is wrapped around several layers of |
40 |
> signatures for every relay in the path? |
41 |
|
42 |
That doesn't help the problem. We sort of have an onion already. |
43 |
|
44 |
It's quite likely possible to validate the signature of the immediate |
45 |
sending server. But how does the receiving server know how to undo any |
46 |
modifications that the immediate sending server made to be able to |
47 |
validate the previous sending server's signature? Rinse, later, repeat |
48 |
out multiple levels. |
49 |
|
50 |
What if some of the servers signs what they send vs what they receive? |
51 |
|
52 |
These are the types of problems that don't currently have a solution. |
53 |
|
54 |
> e.g. whitelisting, tagging, spam filtration, prioritizing, etc, |
55 |
> based on entities that onion-signed the message. |
56 |
|
57 |
How is doing those things based on signature different than doing them |
58 |
based on the system sending to you? |
59 |
|
60 |
The only thing that comes to mind is trusting an upstream signature, but |
61 |
not the immediate sending system. But, you have to unwrap the onion to |
62 |
be able to validate the signature. But to do that you need to know what |
63 |
the server(s) downstream of the signature being validated did to the |
64 |
message. |
65 |
|
66 |
Some of this is a one way trap door without any indication of what each |
67 |
trap door did to the message. |
68 |
|
69 |
|
70 |
|
71 |
-- |
72 |
Grant. . . . |
73 |
unix || die |