[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] switch tor-design to usenix format



Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-design.tex 
Added Files:
	usenix.sty 
Log Message:
switch tor-design to usenix format


--- NEW FILE: usenix.sty ---
% usenix-2e.sty - to be used with latex2e (the new one) for USENIX.
% To use this style file, do this:
%
%    \documentclass[twocolumn]{article}
%    \usepackage{usenix-2e}
% and put {\rm ....} around the author names.
%
% $Id: usenix.sty,v 1.1 2004/03/30 02:28:36 arma Exp $
%
% The following definitions are modifications of standard article.sty
% definitions, arranged to do a better job of matching the USENIX
% guidelines.
% It will automatically select two-column mode and the Times-Roman
% font.

%
% USENIX papers are two-column.
% Times-Roman font is nice if you can get it (requires NFSS,
% which is in latex2e.

\if@twocolumn\else\input twocolumn.sty\fi
\usepackage{times}

%
% USENIX wants margins of: 7/8" side, 1" bottom, and 3/4" top.
% 0.25" gutter between columns.
% Gives active areas of 6.75" x 9.25"
%
\setlength{\textheight}{9.0in}
\setlength{\columnsep}{0.25in}
%%\setlength{\textwidth}{6.75in}
\setlength{\textwidth}{7.00in}
%\setlength{\footheight}{0.0in}
\setlength{\topmargin}{-0.25in}
\setlength{\headheight}{0.0in}
\setlength{\headsep}{0.0in}
\setlength{\evensidemargin}{-0.125in}
\setlength{\oddsidemargin}{-0.125in}

%
% Usenix wants no page numbers for submitted papers, so that they can
% number them themselves.
%
\pagestyle{empty}

%
% Usenix titles are in 14-point bold type, with no date, and with no
% change in the empty page headers.  The whol author section is 12 point
% italic--- you must use {\rm } around the actual author names to get
% them in roman.
%
\def\maketitle{\par
 \begingroup
   \renewcommand\thefootnote{\fnsymbol{footnote}}%
   \def\@makefnmark{\hbox to\z@{$\m@th^{\@thefnmark}$\hss}}%
    \long\def\@makefntext##1{\parindent 1em\noindent
            \hbox to1.8em{\hss$\m@th^{\@thefnmark}$}##1}%
   \if@twocolumn
     \twocolumn[\@maketitle]%
     \else \newpage
     \global\@topnum\z@
     \@maketitle \fi\@thanks
 \endgroup
 \setcounter{footnote}{0}%
 \let\maketitle\relax
 \let\@maketitle\relax
 \gdef\@thanks{}\gdef\@author{}\gdef\@title{}\let\thanks\relax}

\def\@maketitle{\newpage
 \vbox to 2.5in{
 \vspace*{\fill}
 \vskip 2em
 \begin{center}%
  {\Large\bf \@title \par}%
  \vskip 0.375in minus 0.300in
  {\large\it
   \lineskip .5em
   \begin{tabular}[t]{c}\@author
   \end{tabular}\par}%
 \end{center}%
 \par
 \vspace*{\fill}
% \vskip 1.5em
 }
}

%
% The abstract is preceded by a 12-pt bold centered heading
\def\abstract{\begin{center}%
{\large\bf \abstractname\vspace{-.5em}\vspace{\z@}}%
\end{center}}
\def\endabstract{}

%
% Main section titles are 12-pt bold.  Others can be same or smaller.
%
\def\section{\@startsection {section}{1}{\z@}{-3.5ex plus-1ex minus
    -.2ex}{2.3ex plus.2ex}{\reset@font\large\bf}}

Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -d -r1.154 -r1.155
--- tor-design.tex	2 Feb 2004 06:37:34 -0000	1.154
+++ tor-design.tex	30 Mar 2004 02:28:36 -0000	1.155
@@ -1,7 +1,10 @@
 
-\documentclass[times,10pt,twocolumn]{article}
-\usepackage{latex8}
-\usepackage{times}
+\documentclass[twocolumn]{article}
+\usepackage{usenix}
+
+%\documentclass[times,10pt,twocolumn]{article}
+%\usepackage{latex8}
+%\usepackage{times}
 \usepackage{url}
 \usepackage{graphics}
 \usepackage{amsmath}
@@ -81,7 +84,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\Section{Overview}
+\section{Overview}
 \label{sec:intro}
 
 Onion Routing is a distributed overlay network designed to anonymize
@@ -245,7 +248,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\Section{Related work}
+\section{Related work}
 \label{sec:related-work}
 
 Modern anonymity systems date to Chaum's {\bf Mix-Net}
@@ -398,7 +401,7 @@
 % didn't include rewebbers. No clear place to put them, so I'll leave
 % them out for now. -RD
 
-\Section{Design goals and assumptions}
+\section{Design goals and assumptions}
 \label{sec:assumptions}
 
 \noindent{\large\bf Goals}\\
@@ -483,7 +486,7 @@
 \textbf{Not steganographic:} Tor does not try to conceal who is connected
 to the network.
 
-\SubSection{Threat Model}
+\subsection{Threat Model}
 \label{subsec:threat-model}
 
 A global passive adversary is the most commonly assumed threat when
@@ -529,7 +532,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\Section{The Tor Design}
+\section{The Tor Design}
 \label{sec:design}
 
 The Tor network is an overlay network; each onion router (OR)
@@ -575,7 +578,7 @@
 Section~\ref{subsec:congestion} talks about congestion control and
 fairness issues.
 
-\SubSection{Cells}
+\subsection{Cells}
 \label{subsec:cells}
 
 Onion routers communicate with one another, and with users' OPs, via
@@ -628,7 +631,7 @@
 \end{picture}
 \end{figure}
 
-\SubSection{Circuits and streams}
+\subsection{Circuits and streams}
 \label{subsec:circuits}
 
 Onion Routing originally built one circuit for each
@@ -786,7 +789,7 @@
 ``break a node and see which circuits go down''
 attack~\cite{freedom21-security} is weakened.
 
-\SubSection{Opening and closing streams}
+\subsection{Opening and closing streams}
 \label{subsec:tcp}
 
 When Alice's application wants a TCP connection to a given
@@ -840,7 +843,7 @@
 % such as broken HTTP clients that close their side of the
 %stream after writing but are still willing to read.
 
-\SubSection{Integrity checking on streams}
+\subsection{Integrity checking on streams}
 \label{subsec:integrity-checking}
 
 Because the old Onion Routing design used a stream cipher without integrity
@@ -897,7 +900,7 @@
 acceptably low, given that Alice or Bob tear down the circuit if they
 receive a bad hash.
 
-\SubSection{Rate limiting and fairness}
+\subsection{Rate limiting and fairness}
 \label{subsec:rate-limit}
 
 Volunteers are more willing to run services that can limit
@@ -934,7 +937,7 @@
 ends of the stream can already learn this information through timing
 attacks.
 
-\SubSection{Congestion control}
+\subsection{Congestion control}
 \label{subsec:congestion}
 
 Even with bandwidth rate limiting, we still need to worry about
@@ -995,7 +998,7 @@
 These arbitrarily chosen parameters seem to give tolerable throughput
 and delay; see Section~\ref{sec:in-the-wild}.
 
-\SubSection{Rendezvous Points and hidden services}
+\subsection{Rendezvous Points and hidden services}
 \label{subsec:rendezvous}
 
 Rendezvous points are a building block for \emph{location-hidden
@@ -1043,10 +1046,10 @@
 description of the rendezvous protocol, integration issues, attacks,
 and related rendezvous work.
 
-\Section{Other design decisions}
+\section{Other design decisions}
 \label{sec:other-design}
 
-\SubSection{Resource management and denial-of-service}
+\subsection{Resource management and denial-of-service}
 \label{subsec:dos}
 
 Providing Tor as a public service creates many opportunities for
@@ -1094,7 +1097,7 @@
 edges, however, and the performance and anonymity implications from this
 extra complexity still require investigation.
 
-\SubSection{Exit policies and abuse}
+\subsection{Exit policies and abuse}
 \label{subsec:exitpolicies}
 
 % originally, we planned to put the "users only know the hostname,
@@ -1189,7 +1192,7 @@
 foreseeable future.  The abuse problems faced by Princeton's CoDeeN
 project~\cite{darkside} give us a glimpse of likely issues.
 
-\SubSection{Directory Servers}
+\subsection{Directory Servers}
 \label{subsec:dirservers}
 
 First-generation Onion Routing designs~\cite{freedom2-arch,or-jsac98} used
@@ -1295,7 +1298,7 @@
 central point.
 
 
-\Section{Attacks and Defenses}
+\section{Attacks and Defenses}
 \label{sec:attacks}
 
 Below we summarize a variety of attacks, and discuss how well our
@@ -1521,7 +1524,7 @@
 appropriate.  The tradeoffs of a similar approach are discussed
 in~\cite{mix-acc}.\\
 
-\Section{Early experiences: Tor in the Wild}
+\section{Early experiences: Tor in the Wild}
 \label{sec:in-the-wild}
 
 As of mid-January 2004, the Tor network consists of 18 nodes
@@ -1610,7 +1613,7 @@
 more distributed. With luck, the experience we gain running the current
 topology will help us choose among alternatives when the time comes.
 
-\Section{Open Questions in Low-latency Anonymity}
+\section{Open Questions in Low-latency Anonymity}
 \label{sec:maintaining-anonymity}
 
 In addition to the non-goals in
@@ -1718,7 +1721,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\Section{Future Directions}
+\section{Future Directions}
 \label{sec:conclusion}
 
 Tor brings together many innovations into a unified deployable system. The
@@ -1823,7 +1826,7 @@
 \newpage
 \appendix
 
-\Section{Rendezvous points and hidden services}
+\section{Rendezvous points and hidden services}
 \label{sec:rendezvous-specifics}
 
 In this appendix we provide specifics about the rendezvous points
@@ -1910,7 +1913,7 @@
 limit exposure even when
 some selected users collude in the DoS\@.
 
-\SubSection{Integration with user applications}
+\subsection{Integration with user applications}
 
 Bob configures his onion proxy to know the local IP address and port of his
 service, a strategy for authorizing clients, and a public key. Bob