[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor-design-2012/master] Other systems



commit 64c504ddb2b6df6f6315cc1fe891b433bcf56bca
Author: Steven Murdoch <Steven.Murdoch@xxxxxxxxxxxx>
Date:   Mon Jan 6 18:53:34 2014 +0000

    Other systems
---
 tor-design-2012.bib |   11 ++++++++++-
 tor-design-2012.tex |   47 ++++++++++++++++++++++++++++-------------------
 2 files changed, 38 insertions(+), 20 deletions(-)

diff --git a/tor-design-2012.bib b/tor-design-2012.bib
index 981761e..c52046d 100644
--- a/tor-design-2012.bib
+++ b/tor-design-2012.bib
@@ -143,7 +143,7 @@
   note =         {\url{http://www.privoxy.org/}}
 }
 
-@Misc{i2p,
+@Comment{i2p,
   key =          {i2p},
   title =        {{I2P}},
   note =         {\url{http://www.i2p.net/}}
@@ -1487,6 +1487,15 @@ Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
   bookurl = {http://petsymposium.org/2008/},
 }
 
+@inproceedings{i2p,
+	title = {Peer Profiling and Selection in the {I2P} Anonymous Network},
+	author = {{zzz} and Schimmer, Lars}, 
+	year = {2009},
+	month = {March},
+	address = {TU Dresden, Germany},
+	booktitle = {{PET}-{CON}}
+}
+
 %%% Local Variables:
 %%% mode: latex
 %%% TeX-master: "tor-design"
diff --git a/tor-design-2012.tex b/tor-design-2012.tex
index 1efb544..731d7ef 100644
--- a/tor-design-2012.tex
+++ b/tor-design-2012.tex
@@ -351,17 +351,19 @@ crosses several servers, and each server only knows the adjacent
 servers in the circuit, no single server can link a user to her
 communication partners.
 
-The {\bf Java Anon Proxy} (also known as JAP or Web MIXes) uses
-fixed shared routes known as \emph{cascades}.  As with a
-single-hop proxy, this approach aggregates users into larger
-anonymity sets, but again an attacker only needs to observe both
-ends of the cascade to bridge all the system's traffic.  The
-Java Anon Proxy's design calls for padding between end users and
-the head of the cascade~\cite{web-mix}. However, it is not
-demonstrated whether the current implementation's padding policy
-improves anonymity.
-% They're called JonDos now; I don't know if the above paragraph is at all
-% accurate about their current design. -NM
+{\bf JonDo} (previously known as JAP or Web MIXes) uses fixed
+shared routes known as \emph{cascades}.  As with a single-hop
+proxy, this approach aggregates users into larger anonymity
+sets, but again an attacker only needs to observe both ends of
+the cascade to bridge all the system's traffic.  JonDo's design
+calls for padding between end users and the head of the
+cascade~\cite{web-mix}. However, it is not demonstrated whether
+the current implementation's padding policy improves anonymity.
+% They're called JonDos now; I don't know if the above paragraph
+% is at all accurate about their current design. -NM
+%
+% From what I can tell on their website, this is still correct
+% -SJM
 
 {\bf PipeNet}~\cite{back01, pipenet}, another low-latency design
 proposed around the same time as Onion Routing, gave stronger
@@ -387,20 +389,27 @@ systems are designed primarily for communication among peers,
 although Herbivore users can make external connections by
 requesting a peer to serve as a proxy.
 
-Systems like {\bf Freedom} and the original Onion Routing build
-circuits all at once, using a layered ``onion'' of public-key
-encrypted messages, each layer of which provides session keys
-and the address of the next server in the circuit. Tor as
-described herein, Tarzan, MorphMix, {\bf
-  Cebolla}~\cite{cebolla}, and Rennhard's {\bf Anonymity
-  Network}~\cite{anonnet} build circuits in stages, extending
-them one hop at a time.
+Systems like {\bf Freedom}, {\bf I2P}~\cite{i2p}, and the
+original Onion Routing build circuits all at once, using a
+layered ``onion'' of public-key encrypted messages, each layer
+of which provides session keys and the address of the next
+server in the circuit. Tor as described herein, Tarzan,
+MorphMix, {\bf Cebolla}~\cite{cebolla}, and Rennhard's {\bf
+Anonymity Network}~\cite{anonnet} build circuits in stages,
+extending them one hop at a time.
 Section~\ref{subsubsec:constructing-a-circuit} describes how
 this approach enables perfect forward secrecy.
 
 % We should also mention designs like I2P, Phantom, Salsa.  There are lots of
 % proposals here of varying degrees of quality.  We should sift through them
 % all. -NM
+%
+% We don't want to turn into a survey of the many many design
+% variations out there, but IMO should just list the papers
+% which we would like a Tor researcher to be familiar with
+% before started. I would prioritize historically important
+% systems like what we have listedg, anything particularly
+% distinctive, and deployed systems.
 
 Circuit-based designs must choose which protocol layer to
 anonymize. They may intercept IP packets directly, and relay



_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits