<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cfm-circumvention-cap-theorem-01" category="info" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title>Towards a CAP Theorem for Censorship Circumvention</title>
    <seriesInfo name="Internet-Draft" value="draft-cfm-circumvention-cap-theorem-01"/>
    <author fullname="Cory Myers">
      <organization>ARTICLE 19</organization>
      <address>
        <email>cfm@acm.org</email>
      </address>
    </author>
    <date year="2023" month="November" day="26"/>
    <abstract>
      <?line 52?>

<t>This Internet-Draft is a submission to the IAB Workshop on Barriers to Internet
Access of Services <xref target="biasws"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cfm-circumvention-cap-theorem/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/cfm/draft-cfm-circumvention-cap-theorem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="research-proposal">
      <name>Research proposal</name>
      <t>Between June 2022 and April 2023 <xref target="tor-status"/>, the Tor network was the target
of a sustained distributed denial-of-service (DDoS) attack, apparently targeting
the relays and directory servers that coordinate introductions to Tor hidden
services <xref target="tor-relays-2022-07"/> <xref target="tor-relays-2022-10"/>.  This attack impeded the
performance and threatened the security of the Tor network for all users.  It
especially obstructed Web sites and services that had gone out of their way to
be accessible to Tor users via Tor hidden services, which usually improve the
performance of the Tor network by bypassing the "exit nodes" that interface with
the clearnet Internet.</t>
      <t>Although the origins and motivations of this attack remain unknown, it is a
useful case study in the D/DoS vulnerability of overlay networks such as Tor,
which users may seek out to protect their anonymity, circumvent censorship, or
both.  The CAP theorem <xref target="cap-theorem"/> is instructive: like a database, a
censorship-circumvention system is useful to the extent that it is:</t>
      <ol spacing="normal" type="1"><li>
          <t><strong>consistent:</strong> returns accurate and current data;</t>
        </li>
        <li>
          <t><strong>available:</strong> returns data at all; and</t>
        </li>
        <li>
          <t><strong>partition-tolerant</strong>: routes around failures, which by definition include
active censorship.  In this case, they also include active <em>attacks</em>
on circumvention infrastructure that lessen its overall availability,
whether or not intended as an act of censorship.</t>
        </li>
      </ol>
      <t>For the workshop, I propose to explore further whether formalisms such as the
CAP theorem are useful models and/or measures for the utility and resilience of
a censorship-circumvention system such as Tor.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="biasws" target="https://datatracker.ietf.org/group/biasws/about/">
        <front>
          <title>Workshop on Barriers to Internet Access of Services</title>
          <author>
            <organization>Internet Architecture Board</organization>
          </author>
          <date year="2023" month="September" day="20"/>
        </front>
      </reference>
      <reference anchor="cap-theorem" target="https://en.wikipedia.org/wiki/CAP_theorem">
        <front>
          <title>CAP theorem</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="tor-relays-2022-07" target="https://lists.torproject.org/pipermail/tor-relays/2022-July/020686.html">
        <front>
          <title>We're trying out guard-n-primary-guards-to-use=2</title>
          <author initials="R." surname="Dingledine" fullname="Roger Dingledine">
            <organization/>
          </author>
          <date year="2022" month="July" day="06"/>
        </front>
      </reference>
      <reference anchor="tor-relays-2022-10" target="https://lists.torproject.org/pipermail/tor-relays/2022-October/020858.html">
        <front>
          <title>DoS attacks -- status update</title>
          <author initials="G." surname="Koppen" fullname="Georg Koppen">
            <organization/>
          </author>
          <date year="2022" month="October" day="28"/>
        </front>
      </reference>
      <reference anchor="tor-status" target="https://status.torproject.org/issues/2022-06-09-network-ddos/">
        <front>
          <title>Network DDoS</title>
          <author>
            <organization>Tor Project</organization>
          </author>
          <date year="2022" month="June" day="09"/>
        </front>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA61W224bNxB951cM0oe2glaSFdR1FBSobLeB01uQGMhjQe1S
Wta75IIXKWrgf+8ZcnWzhaYPNQx7b5w558yZIYuiEEGHRs3o3m6kqzxJupm/
o/taWadaWlpHN8p463ytO7rRroztWpmgrRGlDGpl3XZG2iytEJUtjWwRq3Jy
GYpy2Rbl8YKilF0RcuRiciF8XLTae7wJ205xlEp1Cn9MECa2C+VmokKOmVjP
6KVAlIhropWzsZvR9d38A+7y2o/WPfjadvxahzouZoT84/+ARAgZQ22Riwpa
xqbJHG5AjH7bKucRkqxbSaP/lrx4RvP393c3v/5EF6/4nWqlblK6H2XZjvCp
EMa6Fh+vgVewOPs7ooWWfuP5Ctiz9i926MkaupbOaaSlYOnOBOWMCjQvS+U9
2SV9UG6tcfMiB5BupcKM6hA6PxuPIZcMTpYPyo20CktGM056jXPesVzYGMZp
8Z53+jmleMjsyloHVYboFF1beCR9n+pC08n0ZTF5VUwneHik6Sk7NlT/4jxq
ZUYb/aA7VWmZEPPdGMv+3NUIa6wrnGrk1iPbdFpMvn8iofoaAIPbarMiUKRV
BNbCFJ3TrXTbIt37ItgievXD9DySRvvgR8jVOfsXSCc0HZA5LvL4AGKcQLyN
zXY8mU4ury5HdWibM7JmN723K+XoFtgakDTqVENmU0wuz7C8mJyyvLUfSIaA
AnsqCvKodvQUOw71vzD6owwWjcekrr67+ndSb1CbFf1iOzTtU0IXk2J61RPK
KE+J/K7CBqanWzA6Dzyveooc8yKqHuvkkr1ncqSiqqz/sq/vMdDe5XjPasDh
hBAFhJULz20UhLivtd93Q3HL84Q0j8nD9OJOhVHpbn5NX+pk8byT6fPn3JuP
j6M+faurqlFCfEXvlVcSLUgQobNeNkJcg7BSht5GoxJykqaiOXzepIZEvIPq
j4/DhI1590rRRvr0LCsuAIXZ4HsYs6IKhnF6EQNfK6NlU9hl4TNY+oYL9m3v
wSHJrpMOM7XZ9tHgcMGxs6cSsko7qM3jlIMkPWoZqLTWoRWgPwZ/cLaKJZco
qcVoa2gAX/mDSs9HwOPjmccXEwhJlAqXcZJuMVvAB8gEnJ/msQEbhhdqpwDC
5NfAWEanw5Yr9FQ43g1l0xAGiPNIcReE8p0qoREEsOwZkECgj2pBHlMzC7Cn
kHjXsqKVRel4SOUk2qEmUNCKBTAlg+hFo3ZKpHS01vJIl33QIW1qDX9EHxMK
UHV2rZ5RPUNnscVvJ5EMI5NfvlCfdCBjK2wvGaxm2y4l1m+wq6bKlg0MyTvD
ztIw7bxBx8VVnaJYp1faZOqtxbYnc10TgkNNHO+bhqJ5MHZjhqRzXwmwxS6M
3cSjGCFWoGRS3NsxT791bIxycqGbvkgg61D8HSsPK0MOWBxUh2InDivYSrag
ekjKQ1sIxRtbXwFprNm2CDqkw1mByv3hZwhiYmFDnbyl6GhXgwmPNj+YEkSg
QHID7/rU6AcUloeNXIAX+kYcAp8eTchvfUBIhOiV6KeL+hQYUC4La4WjxcWI
BoMS4qJn8XI2GEBW7NSsfgkfc3NxGXDJXZoAvBZiysvkGvNfwmbHq/gDFIhd
/ppXCvGSv0WTY3DzwSnYBuqbMBjMCMeKZHH8R44lwuGMsDck3FWppTZpHeQo
m1ilfU8mUY6U5U4y2RtlUgd0t4Dg7W7Zbs2g3/sG6Uxm6FQ5HLSczKrzYSUp
1aCX0C06+GQU7t6eeDLQkANtaoWMjrg1bPa84Wkh2cOcmm12BFeIn/Ep12TT
T/sh3fUDOjWt+tQ1cAJOky4F3iVIzYgNuT2YlNv02EmYpru6t+jDJrXRGOla
JT3Lm4YQ544htwDXF89xo3KfC0lfMtdRi4zEP8pE8QYFDAAA

-->

</rfc>
