[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] make it clearer that streams on a circuit can exit at diffe...



Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-design.tex 
Log Message:
make it clearer that streams on a circuit can exit at different ORs


Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -d -r1.60 -r1.61
--- tor-design.tex	2 Nov 2003 11:43:39 -0000	1.60
+++ tor-design.tex	2 Nov 2003 22:11:49 -0000	1.61
@@ -140,6 +140,14 @@
 Tor multiplexes multiple TCP streams along each virtual
 circuit, to improve efficiency and anonymity.
 
+\item \textbf{Leaky-pipe circuit topology:} Through in-band signalling
+within the circuit, Tor initiators can direct traffic to nodes partway
+down the circuit. This allows for long-range padding to frustrate traffic
+shape and volume attacks at the initiator \cite{defensive-dropping}.
+Because circuits are used by more than one application, it also allows
+traffic to exit the circuit from the middle---thus frustrating traffic
+shape and volume attacks based on observing the end of the circuit.
+
 \item \textbf{No mixing, padding, or traffic shaping:} The original
 Onion Routing design called for batching and reordering the cells arriving
 from each circuit. It also included padding between onion routers and,
@@ -156,16 +164,6 @@
 convenient design for traffic shaping or low-latency mixing that
 will improve anonymity against a realistic adversary, we leave these
 strategies out.
-
-\item \textbf{Leaky-pipe circuit topology:} Through in-band
-  signalling within the
-  circuit, Tor initiators can direct traffic to nodes partway down the
-  circuit. This allows for long-range padding to frustrate traffic
-  shape and volume attacks at the initiator \cite{defensive-dropping}.
-  Because circuits are used by more than one application, it also
-  allows traffic to exit the circuit from the middle---thus
-  frustrating traffic shape and volume attacks based on observing the
-  end of the circuit.
 
 \item \textbf{Congestion control:} Earlier anonymity designs do not
 address traffic bottlenecks. Unfortunately, typical approaches to load