<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cfm-circumvention-cap-theorem-00" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title>Towards a CAP Theorem for Censorship Circumvention</title>
    <seriesInfo name="Internet-Draft" value="draft-cfm-circumvention-cap-theorem-00"/>
    <author fullname="Cory Myers">
      <organization>ARTICLE 19</organization>
      <address>
        <email>cfm@acm.org</email>
      </address>
    </author>
    <date year="2023" month="November" day="26"/>
    <abstract>
      <?line 52?>

<t>This Internet-Draft is a submission to the IAB Workshop on Barriers to Internet
Access of Services <xref target="biasws"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cfm-circumvention-cap-theorem/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cfm/draft-cfm-circumvention-cap-thorem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="research-proposal">
      <name>Research proposal</name>
      <t>Between June 2022 and April 2023 <xref target="tor-status"/>, the Tor network was the target
of a sustained distributed denial-of-service (DDoS) attack, apparently targeting
the relays and directory servers that coordinate introductions to Tor hidden
services <xref target="tor-relays-2022-07"/> <xref target="tor-relays-2022-10"/>.  This attack impeded the
performance and threatened the security of the Tor network for all users.  It
especially obstructed Web sites and services that had gone out of their way to
be accessible to Tor users via Tor hidden services, which usually improve the
performance of the Tor network by bypassing the "exit nodes" that interface with
the clearnet Internet.</t>
      <t>Although the origins and motivations of this attack remain unknown, it is a
useful case study in the D/DoS vulnerability of overlay networks such as Tor,
which users may seek out to protect their anonymity, circumvent censorship, or
both.  The CAP theorem <xref target="cap-theorem"/> is instructive: like a database, a
censorship-circumvention system is useful to the extent that it is:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>consistent:</strong> returns accurate and current data;</t>
        </li>
        <li>
          <t><strong>available:</strong> returns data at all; and</t>
        </li>
        <li>
          <t><strong>partition-tolerant</strong>: routes around failures, which by definition include
active censorship.  In this case, they also include active <em>attacks</em>
on circumvention infrastructure that lessen its overall availability,
whether or not intended as an act of censorship.</t>
        </li>
      </ol>
      <t>For the workshop, I propose to explore further whether formalisms such as the
CAP theorem are useful models and/or measures for the utility and resilience of
a censorship-circumvention system such as Tor.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="biasws" target="https://datatracker.ietf.org/group/biasws/about/">
        <front>
          <title>Workshop on Barriers to Internet Access of Services</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date year="2023" month="September" day="20"/>
        </front>
      </reference>
      <reference anchor="cap-theorem" target="https://en.wikipedia.org/wiki/CAP_theorem">
        <front>
          <title>CAP theorem</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="tor-relays-2022-07" target="https://lists.torproject.org/pipermail/tor-relays/2022-July/020686.html">
        <front>
          <title>We're trying out guard-n-primary-guards-to-use=2</title>
          <author initials="R." surname="Dingledine" fullname="Roger Dingledine">
            <organization/>
          </author>
          <date year="2022" month="July" day="06"/>
        </front>
      </reference>
      <reference anchor="tor-relays-2022-10" target="https://lists.torproject.org/pipermail/tor-relays/2022-October/020858.html">
        <front>
          <title>DoS attacks -- status update</title>
          <author initials="G." surname="Koppen" fullname="Georg Koppen">
            <organization/>
          </author>
          <date year="2022" month="October" day="28"/>
        </front>
      </reference>
      <reference anchor="tor-status" target="https://status.torproject.org/issues/2022-06-09-network-ddos/">
        <front>
          <title>Network DDoS</title>
          <author>
            <organization>Tor Project</organization>
          </author>
          <date year="2022" month="June" day="09"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61W224bNxB951cM0oe2glaSFdR1FBSobLeB01uQGMhjQe1S
Wta75IIXKWrgf+8ZcnWzheSlhmHvjTPnnDkzZFEUIujQqBnd2410lSdJN/N3
dF8r61RLS+voRhlvna91RzfalbFdKxO0NaKUQa2s285Im6UVorKlkS1iVU4u
Q1Eu26I8XlCUsitCjlxMJsLHRau9x5uw7RRHqVSn8McEYWK7UG4mKuSYifWM
XgpEibgmWjkbuxld380/4C6v/Wjdg69tx691qONiRsg//jISBiKEjHyFwAUt
Y9NkCjfgRX9slfOISNatpNH/Sl47o/n7+7ub33+hi1f8TrVSNynbz7JsR/hU
CGNdi4/XgCtYm/0d0UJLv/F8BehZ+hc78GQNXUvnNNJSsHRngnJGBZqXpfKe
7JI+KLfWuHmRA0i3UmFGdQidn43HUEsGJ8sH5UZahSWjGSe5xjnvWC5sDOO0
eM87/ZxSPGR2Za2DKkN0iq4tLJK+T2Wh6WT6spi8KqYTPDwq7ik79lP/4jxq
ZUYb/aA7VWmZEPPdGMv+7pdxla0rnGrk1iPbdFpMfnwiofoWAIPbarMiUKRV
BNbCFJ3TrXTbIt37ItgievXT9DySRvvgR8jVOfsPSCc0HZA5LvL4AGKcQLyN
zXY8mU4ury5HdWibM7JmN723K+XoFtgakDTqVENmU0wuz7C8mJyyvLUfSIaA
AnsqCvKodvQUOw71vzD6qwwWfcekrn64+jKpN6jNin6zHXr2KaGLSTG96gll
lKdE/lRhA9PTLRidB55XPUWOcRFVj3Vyyd4zOVJRVdZ/3df3mGfvcrxnNeBw
QogCwsqF5zYKQtzX2u+7objlcUKap+RheHGnwqh0N7+mr3WyeN7J9Plz7s3H
x1GfvtVV1SghvqH3yiuJFiSI0FkvGyGuQVgpQ2+jUQk5SVPRHD5vUkMi3kH1
x8dhwsa8e6VoI316lhUXgMJs8D2MWVEFwzi9iIGvldGyKeyy8BksfccF+773
4JBk10mHkdps+2hwuODY2VMJWaUd1OZxykGSHrUMVFrr0ArQH3M/OFvFkkuU
1GK0NTSAr/xBpecj4PHxzOOLCYQkSoXLOEm3mC3gA2QCzk/z2IANwwu1UwBh
8mtgLKPTYcsVeiocb4ayaQgDxHmkuAtC+U6V0AgCWPYMSCDQR7Ugj6mZBdhT
SLxrWdHKonQ8pHIS7VATKGjFApiSQfSiUTslUjpaa3mkyz7okDa1hj+ijwkF
qDq7Vs+onqGz2OK3k0iGkckvX6hPOpCxFbaXDFazbZcS6zfYVFNlywaG5J1h
Z2mYdt6g4+KqTlGs0yttMvXWYtuTua4JwaEmjvdNQ9E8GLsxQ9K5rwTYYhfG
buJRjBArUDIp7u2Yp986NkY5udBNXySQdSj+jpWHlSEHLA6qQ7EThxVsJVtQ
PSTloS2E4o2tr4A01mxbBB3S4ahA5f7sMwQxsbChTt5SdLSrwYRHmx9MCSJQ
ILmBd31q9AMKy8NGLsALfSMOgU9PJuS3PiAkQvRK9NNFfQoMKJeFtcLR4mJE
g0EJcdGzeDkbDCArdmpWv4SPubm4DLjkLk0AXgsx5WVyjfkvYbPjVfwBCsQu
f80rhXjJ36LJMbj53BRsA/VNGAxmhGNFsjj+I8cS4XBG2BsS7qrUUpu0DnKU
TazSvieTKEfKcieZ7I0yqQO6W0Dwdrdst2bQ732DdCYzdKocDlpOZtX5sJKU
atBL6BYdfDIKd29PPBloyIE2tUJGR9waNnve8LSQ7GFOzTY7givEr/iUa7Lp
p/2Q7voBnZpWfeoaOAGnSZcC7xKkZsSG3B5Mym167CRM013dW/Rhk9pojHSt
kp7lTUOIc8eQW4Dri+e4UbnPhaSvmeuoRUbiPyi0o+IEDAAA

-->

</rfc>
