[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] yet more minor changes and responses



Update of /home/minion/cvsroot/doc
In directory moria.mit.edu:/home/arma/work/minion/doc

Modified Files:
	minion-design.bib minion-design.tex 
Log Message:
yet more minor changes and responses


Index: minion-design.bib
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.bib,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -d -r1.19 -r1.20
--- minion-design.bib	3 Mar 2003 16:37:03 -0000	1.19
+++ minion-design.bib	4 Mar 2003 03:58:00 -0000	1.20
@@ -5,11 +5,9 @@
     year = {2000},
     month = Aug,
     publisher = {USENIX},
-    isbn = { 1-88044-618-9 },
-    location = {Denver, Colorado},
     pages = "85--96",
-    url = "citeseer.nj.nec.com/473267.html",
-    url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf"; }
+    note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf}},
+}
 
 @InProceedings{pfitzmann90how,
     author = "Birgit Pfitzmann and Andreas Pfitzmann",
@@ -395,7 +393,7 @@
   booktitle =   {Principles of Distributed Computing - {PODC} '01},
   year = "2001",
   publisher =   {ACM Press},
-  note = {\newline \url{citeseer.nj.nec.com/492015.html}},
+  note = {\newline \url{http://citeseer.nj.nec.com/492015.html}},
 }
 
 @InProceedings{kesdogan,

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -d -r1.105 -r1.106
--- minion-design.tex	3 Mar 2003 16:37:03 -0000	1.105
+++ minion-design.tex	4 Mar 2003 03:58:01 -0000	1.106
@@ -1028,7 +1028,7 @@
 \label{subsec:exitpolicies}
 
 One important entry in a node's capability block is its \emph{exit
-policy}, that describes to which address and by which method a mix node is
+policy}, that describes to which addresses and by which methods a mix node is
 prepared to deliver messages. Exit abuse is a serious barrier to
 wide-scale remailer deployment 
 --- rare indeed is the network administrator tolerant of machines that
@@ -1059,7 +1059,8 @@
 by forging an opt-out request from a legitimate user. We use a compromise,
 where all users are assumed to want to receive mail, but each Mixminion
 message arrives with instructions on how to opt out. 
-% XXX Is this true? (in spec or actual implemetation): 
+% XXX Is this true? (in spec or actual implemetation): -GD
+% Not currently, I think. But we need it to be, right?
 Specifically, the
 message includes a secret that must be used to authorize the opt-out. Thus
 adversaries who cannot read the victim's mail cannot forge an opt-out
@@ -1382,6 +1383,8 @@
 for considerable time) first to flush the original honest messages from
 the mix, and again to flush the target message from the mix. 
 % XXXX Is this true? Do we implement or even specify a heartbeat? -GD
+% Not currently. It seems it might help detect attacks though? But then,
+% how can we tell attacks from network outages? Maybe should take out? -RD
 This delay
 can be noticed by the other mixes, because they communicate over TLS
 with a heartbeat to detect delays.
@@ -1500,7 +1503,7 @@
 \begin{itemize}
 \item \emph{Compromise a mix.} Messages traverse multiple mixes, so
 compromising a single mix, even a crossover point, does not gain much.
-\item \emph{Compromise a mix's private key.} Again, `owning' a single mix
+\item \emph{Compromise a mix's private key.} Again, controlling a single mix
 is of limited use. Further, periodic mix key rotation limits the window
 of time in which to attack the next mix in the target message's path.
 \item \emph{Replaying messages.}  Mixes remember header cryptographic