@Patrice:
Yes both relays started with brand new identities and the one that is now clinically dead (nickname ZG0) has been wiped out and restarted with a new fingerprint AND a new IP address as I have a dynamic one and I rebooted my router to get a new one).
Did not help, so obviously this has everything to do with the network and how dirauths/bwauths test the connection and vote, and absolutely nothing to do with the identity of the relay
See my previous messages to confirm that this has absolutely nothing to do with the capabilities of the Pi, which are a gross overkill for the use of (nickname) GG2 that the dirauths and bwauths allow.
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Patrice Sent: Thursday, December 22, 2016 2:57 AM To: tor-relays@lists.torproject.org Subject: [tor-relays] @Rana - with reference to: Unwarranted discrimination of relays with dynamic
Hi,
I`ve read your post and questions, also about your 2 Raspberry PIs with the same setting but different locations. I thought about it and my question is: Did these to PIs got a new fresh identity on day zero? If not, it`s worth a try, probably. Kill the old identities and let them by.
My fundamental idea is (and that`s why I am writing this): Does my behaviour with the relay (restarting, upgrading, not be onlinening) effect the measurement and therefore the throughput of my relay?
Cheers, Patrice _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
So my question to the community is as follows: does the Tor community want these small, cheap relays scattered in large quantity around the world, or not?
I realize there could be pros and contras. Among the contras there could be (for example) many small relays overloading the dirauths. I would like to hear more about the contras.
Among the pros there could be increased security and anonymity, as it would take adversaries a bigger effort to infiltrate the network by establishing rogue relays. Also could be invaluable as bridges to help people under repressive regimes overcome censorship. Tor is gradually getting killed there.
My general impression is that the current DirAuth and bwauths policies are stuck at some old paradigm where small bandwidth relays are dismissed without good reason, and tons of bandwidth gains and especially diversity and anonymity benefits are foregone
Additional info about my experiment: I have just fired up an additional relay on Pi Zero. That's a fucking $9 Tor relay, including flash card and case. Looks like an oversized USB stick and plugs directly into a USB port of a computer. No need even for power supply. CPU utilization - negligible, total memory utilization (including Tor) 20%. No need to waste $35 on a Pi 3 which is grossly underutilized by the DirAuths.
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Rana Sent: Thursday, December 22, 2016 10:58 AM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP
@Patrice:
Yes both relays started with brand new identities and the one that is now clinically dead (nickname ZG0) has been wiped out and restarted with a new fingerprint AND a new IP address as I have a dynamic one and I rebooted my router to get a new one).
Did not help, so obviously this has everything to do with the network and how dirauths/bwauths test the connection and vote, and absolutely nothing to do with the identity of the relay
See my previous messages to confirm that this has absolutely nothing to do with the capabilities of the Pi, which are a gross overkill for the use of (nickname) GG2 that the dirauths and bwauths allow.
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Patrice Sent: Thursday, December 22, 2016 2:57 AM To: tor-relays@lists.torproject.org Subject: [tor-relays] @Rana - with reference to: Unwarranted discrimination of relays with dynamic
Hi,
I`ve read your post and questions, also about your 2 Raspberry PIs with the same setting but different locations. I thought about it and my question is: Did these to PIs got a new fresh identity on day zero? If not, it`s worth a try, probably. Kill the old identities and let them by.
My fundamental idea is (and that`s why I am writing this): Does my behaviour with the relay (restarting, upgrading, not be onlinening) effect the measurement and therefore the throughput of my relay?
Cheers, Patrice _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Thu, 22 Dec 2016 11:25:11 +0000, Rana wrote: ...
I realize there could be pros and contras. Among the contras there could be (for example) many small relays overloading the dirauths. I would like to hear more about the contras.
A Pi running at its line speed isn't exactly a small relay.
...
Additional info about my experiment: I have just fired up an additional relay on Pi Zero. That's a fucking $9 Tor relay, including flash card and case. Looks like an oversized USB stick and plugs directly into a USB port of a computer. No need even for power supply.
Why wouldn't you run the relay directly on the connection/powering computer? Also, is the external USB network interface included in the pricing calculation?
- Andreas
@Andreas ...
I realize there could be pros and contras. Among the contras there could be (for example) many small relays overloading the dirauths. I would like to hear more about the contras.
A Pi running at its line speed isn't exactly a small relay.
Of course it isn't. A 20 mbps Pi relay has been reported here, still under-utilized.
...
Additional info about my experiment: I have just fired up an additional relay on Pi Zero. That's a fucking $9 Tor relay, including flash card and case. Looks like an oversized USB stick and plugs directly into a USB port of a computer. No need even for power supply.
Why wouldn't you run the relay directly on the connection/powering computer?
As I said, it is an experiment to see if this is working at all and what's the performance. Also, it was easy - I could use my PC to ssh into the Pi via the USB port, and am running a relay through the same port, so no tinkering with hardware. Eventually the Tor relay stick could be plugged directly into a USB port of a home router, I believe that there are some that have such ports.
Also, is the external USB network interface included in the pricing calculation?
What external USB network interface? Pi Zero has a micro USB connector. All that is needed is a standard USB cable, not even OTG one, I fished an old one from my junkbox. If you want you can add a whopping $1 to the cost :)
If you mean microUSB-to-Ethernet adaptor, that's $1.96 on eBay:
http://www.ebay.com/itm/1pc-Micro-USB-2-0-to-Ethernet-10-100-RJ45-Network-LA...
pussy
2016年12月22日 17:59,"Rana" ranaventures@gmail.com写道:
@Andreas ...
I realize there could be pros and contras. Among the contras there
could be (for example) many small relays overloading the dirauths. I would like to hear more about the contras.
A Pi running at its line speed isn't exactly a small relay.
Of course it isn't. A 20 mbps Pi relay has been reported here, still under-utilized.
...
Additional info about my experiment: I have just fired up an additional
relay on Pi Zero. That's a fucking $9 Tor relay, including flash card and case. Looks like an oversized USB stick and plugs directly into a USB port of a computer. No need even for power supply.
Why wouldn't you run the relay directly on the connection/powering
computer?
As I said, it is an experiment to see if this is working at all and what's the performance. Also, it was easy - I could use my PC to ssh into the Pi via the USB port, and am running a relay through the same port, so no tinkering with hardware. Eventually the Tor relay stick could be plugged directly into a USB port of a home router, I believe that there are some that have such ports.
Also, is the external USB network interface included in the pricing
calculation?
What external USB network interface? Pi Zero has a micro USB connector. All that is needed is a standard USB cable, not even OTG one, I fished an old one from my junkbox. If you want you can add a whopping $1 to the cost :)
If you mean microUSB-to-Ethernet adaptor, that's $1.96 on eBay:
http://www.ebay.com/itm/1pc-Micro-USB-2-0-to-Ethernet-10- 100-RJ45-Network-LAN-Adapter-Card-uk-/262593720059?hash= item3d23ce2efb:g:jHwAAOSwU-pXvqrT
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Thu, Dec 22, 2016 at 4:59 AM, Rana ranaventures@gmail.com wrote:
A 20 mbps Pi relay has been reported here, still under-utilized.
All these reports of this or that made in piles of random email ... serves no one past the typical few day participant convos.
So please people... submit all your hardware speed reports to the wiki in some organized tabular and broken out for descriptive commentary doco fashion so others can refer to it as a useful resource.
If there is such a wiki I will be happy to submit my reports, I am not aware of one. Also, based on this thread the people who may take action and decisions seem to be convinced that home relays are of no or very little use to Tor. For this reason, whether they are right or not, I am not sure we should bother beyond the unstructured discussion in this thread.
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of grarpamp Sent: Thursday, December 22, 2016 8:37 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP
On Thu, Dec 22, 2016 at 4:59 AM, Rana ranaventures@gmail.com wrote:
A 20 mbps Pi relay has been reported here, still under-utilized.
All these reports of this or that made in piles of random email ... serves no one past the typical few day participant convos.
So please people... submit all your hardware speed reports to the wiki in some organized tabular and broken out for descriptive commentary doco fashion so others can refer to it as a useful resource. _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Thu, Dec 22, 2016 at 2:07 PM, Rana ranaventures@gmail.com wrote:
If there is such a wiki I will be happy to submit my reports, I am not aware of one.
Please see and contribute to the following... https://trac.torproject.org/projects/tor/wiki/doc/HardwarePerformanceCompend...
Also, based on this thread the people who may take action and decisions seem to be convinced that home relays are of no or very little use to Tor. For this reason, whether they are right or not, I am not sure we should bother beyond the unstructured discussion in this thread.
If the source code and network technically permits any given node, it is valid for discussion.
I've often suggested that all node selection and testing / ranking / node trust pki metrics / geoip / etc all be left as subscription style services and/or configurable parametrics for clients to choose from or configure themselves. With some default "Tor Project" set shipped as fine for most users, in which Tor Project acts as one such supplier of such params.
That leave only malacting nodes and 'net useful' nodes up to dirauths themselves. With 'useful' being no excuse to not make efforts to scale networks to the next level.
ie: Networks like Phantom just distribute a DHT list of nodes, so conceivably if and how you use them is up to you.
@grarpamp
Please see and contribute to the following... https://trac.torproject.org/projects/tor/wiki/doc/HardwarePerformanceCompend...
The Pi info there is indeed totally out of date. I opened an account on the wiki. However, after 10 (!) tries to pass the totally unnecessary captcha which blocked my access AFTER I logged in, I have given up on trying to upload my data there.
If the source code and network technically permits any given node, it is valid for discussion.
Not only the network and code permit Pi-based relays from residential premises with ANY kind of Internet connection bandwidth, the texts on Tor page encourage people to run relays without telling them that their relays may be unwanted or useless if their connection is not fast enough. I have no firm data on this but my gut feeling is that the use of small residential relays can be optimized and made useful; and if it can't as some knowledgeable people on this forum seem to opine, then this info should be openly available for all and not just for the initiated or for people like me who spend the time to dig into the discussion on this forum for 3 weeks in order to find this out.
I've often suggested that all node selection and testing / ranking / node trust pki metrics / geoip / etc all be left as subscription style services and/or configurable parametrics for clients to >choose from or configure themselves. With some default "Tor Project" set shipped as fine for most users, in which Tor Project acts as one such supplier of such params. That leave only malacting nodes and 'net useful' nodes up to dirauths themselves. With 'useful' being no excuse to not make efforts to scale networks to the next level.
I could not agree more.
Hi there,
I am one of the directory authority operators, so while I don't claim to know what the collective community wants, I am one of the people who are asked to make these decisions.
On 22 Dec 2016, at 10:25, Rana ranaventures@gmail.com wrote:
So my question to the community is as follows: does the Tor community want these small, cheap relays scattered in large quantity around the world, or not?
Executive Summary: On balance, the very small relays do not contribute enough resources compared to the associated costs to be worthwhile. Details below.
I realize there could be pros and contras. Among the contras there could be (for example) many small relays overloading the dirauths. I would like to hear more about the contras.
The dirauths are indeed a bottleneck in the Tor relay ecosystem, as they have to reguarly contact each relay, measure its bandwidth, check for malicious behaviour etc. But the dirauths are doing fine. The load my dirauth receives is negligible compared to what it could handle. There's a much bigger contributing factor here, however: The information about all relays must be made available to all clients, in a somewhat synchronized fashion. Tor has recently improved its design in this regard massively with the introduction of microdescriptors, and since then it's become somewhat more tolerable to have many small relays. In the past, we allowed relays in the network that were a net drain on available bandwidth, because just distributing their key material used up more bandwidth than they provided in total.
Residental lines in particular are typically very bad choices for relays, because they are much more prone to fluctuations in available bandwidth, the hardware caves when too many connections are open in parallel, and if the connection (which most often is asymmetric, with less upload capacity than down) were any near saturated using the internet would become a horribly slow and unpleasant experience.
This last point is also the reason why any time you build any kind of network, you overprovision like crazy. The de-cix (largest internet exchange currently in existence) has a peak traffic that exceeds the average by a factor of roughly 1.75. The connected capacity is larger by a factor of 3.5. This is just so that you don't experience service degradation, and it's very common in computer networking. In the past, Tor was massively overloaded and very slow to use, which was a very real obstacle to getting it used, even in places that heavily censor or surveill internet usage.
I have a relay on a symmetric 1gbit/s connection, yet the average traffic I push with that relay is just 16MB/s per direction. It is a non-exit relay, if it were used to exit I suspect it would maybe double or quadruple that utilization, but probably get noewhere near line capacity. If more people wanted to make use of it they could, but currently they don't - that's OK, there's no obligation for the Tor network to fill my relay with traffic that it shouldn't get. It is not just the small relays that don't get as much traffic as they could handle.
Among the pros there could be increased security and anonymity, as it would take adversaries a bigger effort to infiltrate the network by establishing rogue relays. Also could be invaluable as bridges to help people under repressive regimes overcome censorship. Tor is gradually getting killed there.
To me, the biggest pro is that the number of relay operators, of people who care enough to support the Tor network, is great politically. It's awesome that so many people want to help by providing some of the bandwidth they pay for. It's amazing that Exit operators make their connections endpoints of a public network.
Robustness of the network is a comparatively much smaller factor. Needing to re-distribute information about changed IP adresses is a major hurdle towards bridge adoption. We've actually found that large bridges runnning one of the obfuscation protocols have massively higher chances of being useful than small and unreliable bridges, which is why Isis, the bridge db and bridge authority operator, has asked us not to recommend people run bridges on their small residental connections.
I want to dispute the claim that unreliable relays (those either too slow or changing their IP too often to be used as Guards) contribute much anonymity-wise. The biggest protection you get is from your guard, and if you need to roll the dice more often (to pick a new guard more often), the chance that you pick one that is controlled by an adversary of yours increases.
My general impression is that the current DirAuth and bwauths policies are stuck at some old paradigm where small bandwidth relays are dismissed without good reason, and tons of bandwidth gains and especially diversity and anonymity benefits are foregone
The reasons I have presented above are good enough for me, personally. It seems I am not alone in this assessment. Perhaps I have been able to convince you, or at least explain my personal reasoning in a way that allows you to find some reason in it.
Thanks for being a supporter of privacy, anonymity and human rights.
Cheers Sebastian
@Sebastian,
Thank you for the detailed presentation of your arguments against the use of residential relays. While many (probably most) of the points you made are convincing and, coming from a DirAuth operator, difficult for me to contest, I would like to refer to those of them that seem to be less firm to me (I am not referring to the "political support" argument here, my points are purely technical):
1. If DirAuths are no longer the bottleneck , and the bottleneck shifted to the distribution of information about new relays, maybe it is the next problem that should be looked at and resolved by the Tor developers.
2. "Residential lines in particular ... hardware caves when too many connections are open in parallel" - this appears to be plain incorrect. A Pi based relay was recently reported here by @balbea that has 20%/60% CPU/memory utilization, respectively, 21 mbps (measured) peak/900 kbps (measured) average utilization by Tor, with 1300 simultaneous connections. The speed @balbea could squeeze out of his residential ISP is pretty amazing and, despite my call on this forum for further examples, unbeated and, to the best of my knowledge, all but unprecedented. And that's at 60% utilization of the bottleneck resource - the memory and the obvious under-utilization by Tor. If anybody's residential relay "caves" he should get a $35 Raspberry Pi and - yay - no more caving hardware.
3. "the connection (which most often is asymmetric, with less upload capacity than down) were any near saturated using the internet would become a horribly slow and unpleasant experience" - I see no problem whatsoever to engineer the use of bandwidth to 50% or 40% of the peak down BW available to the relay, so that this problem will never happen. After all, every Tor instance does a bandwidth self-test and knows what's its peak down capacity. So this appears to be a non-issue (or maybe an issue that was "neglected by design").
So again, many of your arguments are convincing but there appears to be room for re-engineering the parts of Tor that deal with small relays, to get a greater benefit from them.
Moreover, there seems to be a disconnect between what I read, including on official Tor site, and the true state of affairs with small relays as presented by you. You are obviously a knowledgeable guy, and a member of the team that actually runs Tor and makes decisions. This makes me take your statement that running a small bridge is actually harmful, very seriously.
Therefore, based what you say, my logical conclusion is as follows: the best thing for Tor would be as many people as possible running exits; but since this is beyond the risk most people are willing to take, the next best thing is running a BIG and stable guard or a BIG and stable bridge. The lowest priority is a bandwidth-wise small (even if stable) residential relay or a small bridge, to the extent that these (the small ones) are not really needed and are actually likely to do damage by overloading the Tor descriptor distribution mechanism or screwing up the way people use bridges, respectively.
Which makes me wonder - why aren't there clear guidelines on Tor site about this? I have read there (I do not remember on which page) the following recommendation (or rather, a call for action with an exclamation mark): "If you cannot be an exit, be a relay. If you cannot be a relay, be a bridge!" This is obviously addressed to people who do not have intimate knowledge of Tor and may be just about to make a decision to run a node. Nobody tells them that they should not run a bridge or a relay if they are on residential premises, let alone that this could actually do more damage than good.
Rana
On 2016-12-22 19:24:25 (+0200), Rana wrote:
- "Residential lines in particular ... hardware caves when too many
connections are open in parallel" - this appears to be plain incorrect. [...] ith 1300 simultaneous connections.
His statement is right. 1300 connections are not a lot. I used to have a symmetric 20 megabytes/second line and the router provided by my ISP would reboot when reaching around 3600 connections. Happily, they provided FTTH so I was able to put a linux box instead of said router and reach 13k conns.
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of David Serrano Sent: Thursday, December 22, 2016 7:36 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP
On 2016-12-22 19:24:25 (+0200), Rana wrote:
- "Residential lines in particular ... hardware caves when too many
connections are open in parallel" - this appears to be plain incorrect. [...] ith 1300 simultaneous connections.
His statement is right. 1300 connections are not a lot. I used to have a
symmetric 20 megabytes/second line and the router provided by my ISP would reboot when reaching around 3600 >connections. Happily, they provided FTTH so I was able to put a linux box instead of said router and reach 13k conns.
You are a part of a minuscule group of people who have a 160 mpbs symmetric connection to the home, and the first one I run into in my life. I therefore doubt that your example is relevant to the discussion - almost everybody else on the planet does not have this kind of bandwidth to the home, and cannot saturate a $35 Raspberry Pi with his Tor traffic because their bottleneck is ISP bandwidth, not hardware. Which was my point.
-- David Serrano PGP: 1BCC1A1F280A01F9
I have followed this for some time with interest, because I've run 2 relays from "home" connections for over 2 years - at on point three, all on unused older laptops. I have an Archer C7 which can handle 31k connections (theoretically) and have never had issues. My IP address changes maybe 3 times a year. I am set at 1 mb up/down - largely unused compared to its capacity, but I really don't care as long as it runs. I have had as many as 3700 connections but usually 150 or so. I still do not care - I have felt that this still provides for someone, somewhere. I will continue, without getting upset over unused "horsepower". With that said however - if the authority feels I am pathetically useless (reminds me of the testosterone ego of high school jocks) then what would happen if all the small relays - like me - say piss on it? At what point does this entire Tor freedom concept become the field of rich, unlimited bandwidth mavens?
And incidentally, those jocks would never had graduated if not for the "nerds" that tutored them - the little guys provide a hell of a lot more than people realize.
Gumby
On 12/22/2016 12:47 PM, Rana wrote:
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of David Serrano Sent: Thursday, December 22, 2016 7:36 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP
On 2016-12-22 19:24:25 (+0200), Rana wrote:
- "Residential lines in particular ... hardware caves when too many
connections are open in parallel" - this appears to be plain incorrect. [...] ith 1300 simultaneous connections.
His statement is right. 1300 connections are not a lot. I used to have a
symmetric 20 megabytes/second line and the router provided by my ISP would reboot when reaching around 3600 >connections. Happily, they provided FTTH so I was able to put a linux box instead of said router and reach 13k conns.
You are a part of a minuscule group of people who have a 160 mpbs symmetric connection to the home, and the first one I run into in my life. I therefore doubt that your example is relevant to the discussion - almost everybody else on the planet does not have this kind of bandwidth to the home, and cannot saturate a $35 Raspberry Pi with his Tor traffic because their bottleneck is ISP bandwidth, not hardware. Which was my point.
-- David Serrano PGP: 1BCC1A1F280A01F9
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Thank you @Gamby for echoing my sentiment.
While there can be a good tech reason for considering small relays useless, the small relay operators MUST be properly and openly advised about how useful or useless their relays are. I even have read about someone's suggestion of gamification of such feedback - which I think is a damn good idea , eg give people badges based on how USEFUL their relays are.
I heard here an idea that it's good that a lot of people run relays because their joining the party increases the size of the crowd that supports privacy. Well, a global crowd of 7000 is a pathetically small one considering the target, and people should run relays not because this makes them feel good about themselves but because they are convinced that their relays are being USED for a good purpose. If the small relays are largely unused (eg if 10% of the relays carry 90% of the Tor traffic - does anyone have an exact statistics on this?) and if, in addition, there is no increased anonymity benefit in having a lot of small relays, then why bother?
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Gumby Sent: Friday, December 23, 2016 6:06 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP
I have followed this for some time with interest, because I've run 2 relays from "home" connections for over 2 years - at on point three, all on unused older laptops. I have an Archer C7 which can handle 31k connections (theoretically) and have never had issues. My IP address changes maybe 3 times a year. I am set at 1 mb up/down - largely unused compared to its capacity, but I really don't care as long as it runs. I have had as many as 3700 connections but usually 150 or so. I still do not care - I have felt that this still provides for someone, somewhere. I will continue, without getting upset over unused "horsepower". With that said however - if the authority feels I am pathetically useless (reminds me of the testosterone ego of high school jocks) then what would happen if all the small relays - like me - say piss on it? At what point does this entire Tor freedom concept become the field of rich, unlimited bandwidth mavens?
And incidentally, those jocks would never had graduated if not for the "nerds" that tutored them - the little guys provide a hell of a lot more than people realize.
Gumby
On Fri, Dec 23, 2016 at 12:06 PM, Rana ranaventures@gmail.com wrote:
If the small relays are largely unused (eg if 10% of the relays carry 90% of the Tor traffic - does anyone have an exact statistics on this?) and if, in addition, there is no increased anonymity benefit in having a lot of small relays, then why bother?
There's the obvious that if you have a lot of unused relays, and essentially only your traffic happens to traverse three of them, then you're much more easily subject to active observation by the relays themselves, and passive observation by GPA's.
Therein one might expect dirauths to restrict node count to network saturation levels only, instead of the 7000 we have today.
But even if using three fully saturated relays, you can still be deanoned by as little as one guard and one exit / destination. That works essentially the same for hidden services too.
There are often threads on tor-talk about filling anonymous overlay networks with dynamic fill traffic / traffic buckets / packet switching, udp, etc to prevent ease of that happening, in particular since client nodes would be participating too, but it goes nowhere.
tor-relays@lists.torproject.org