[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r24193: {website} revise TransportIPnotTCP answer (in website/trunk: docs/en getinvolved/en)
Author: arma
Date: 2011-02-07 08:34:57 +0000 (Mon, 07 Feb 2011)
New Revision: 24193
Modified:
website/trunk/docs/en/faq.wml
website/trunk/getinvolved/en/volunteer.wml
Log:
revise TransportIPnotTCP answer
Modified: website/trunk/docs/en/faq.wml
===================================================================
--- website/trunk/docs/en/faq.wml 2011-02-07 08:23:39 UTC (rev 24192)
+++ website/trunk/docs/en/faq.wml 2011-02-07 08:34:57 UTC (rev 24193)
@@ -1532,7 +1532,7 @@
<a href="<page getinvolved/volunteer>#Research">research section of the
volunteer page</a>: "Tor doesn't work very well when relays
have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a
- href="<wikifaq>#YoushouldtransportallIPpacketsnotjustTCPpackets.">switching
+ href="<page docs/faq>#TransportIPnotTCP">switching
to UDP transport</a> is the simplest answer here — which alas is
not a very simple answer at all.
</p>
@@ -1581,31 +1581,29 @@
all IP packets, not just TCP packets.</a></h3>
<p>
-This would be handy, because it would make Tor
-more generally useful. It would also solve the whole
-need to socksify applications, and it would resolve the <a
-href="<wikifaq>#HowdoIcheckifmyapplicationthatusesSOCKSisleakingDNSrequests">DNS
-leak problem</a> too. Lastly, it would solve the fact that exit relays
-need to allocate a lot of file descriptors to hold open all the exit
-connections.
+This would be handy, because it would make Tor better able to handle
+new protocols like VoIP, it could solve the whole need to socksify
+applications, and it would solve the fact that exit relays need to
+allocate a lot of file descriptors to hold open all the exit connections.
</p>
<p>
-On the other hand, there are six reasons we haven't done this:
+We're heading in this direction: see <a
+href="https://trac.torproject.org/projects/tor/ticket/1855">this trac
+ticket</a> for directions we should investigate. Some of the hard
+problems are:
</p>
-<li>IP packets reveal OS characteristics. We would still
-need to do IP-level packet normalization, to stop things like
-TCP fingerprinting attacks. This is unlikely to be a trivial
-task, given the diversity and complexity of TCP stacks. In
-fact, it's worse than this: check out the new class of <a
+<li>IP packets reveal OS characteristics. We would still need to do
+IP-level packet normalization, to stop things like TCP fingerprinting
+attacks. Given the diversity and complexity of TCP stacks, along with <a
href="<wikifaq>#DoesTorresistremotephysicaldevicefingerprinting">device
-fingerprinting attacks</a> which we would have to tackle as well.
+fingerprinting attacks</a>, it looks like our best bet is shipping our
+own user-space TCP stack.
</li>
-<li>Application-level streams still need scrubbing. We still need Tor
-to be easy to integrate with user-level application-specific proxies
-such as Privoxy. So it's not just a matter of capturing packets and
-anonymizing them at the IP layer.
+<li>Application-level streams still need scrubbing. We will still need
+user-side applications like Torbutton. So it won't become just a matter
+of capturing packets and anonymizing them at the IP layer.
</li>
<li>Certain protocols will still leak information. For example, we must
rewrite DNS requests so they are delivered to an unlinkable DNS server
@@ -1614,10 +1612,10 @@
</li>
<li><a
href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS</a>
-(datagram TLS) will be in the 0.9.8 openssl release. We need to design
-a new end-to-end Tor protocol for avoiding tagging attacks and other
-potential anonymity and integrity issues now that we allow drops, resends,
-et cetera.
+(datagram TLS) basically has no users, and IPsec sure is big. Once we've
+picked a transport mechanism, we need to design a new end-to-end Tor
+protocol for avoiding tagging attacks and other potential anonymity and
+integrity issues now that we allow drops, resends, et cetera.
</li>
<li>Exit policies for arbitrary IP packets mean building a secure
IDS. Our node operators tell us that exit policies are one of the main
@@ -1633,12 +1631,10 @@
and clients need to predict all the packets they will want to send in
a session before picking their exit node!
</li>
-<li>The Tor-internal name spaces would need to be redesigned. We
-support hidden service ".onion" addresses (and other special addresses,
-like ".exit" which lets the user request a particular exit node), by
-intercepting the addresses when they are passed to the Tor client. Doing
-so at the IP level would require a more complex interface between Tor
-and the local DNS resolver.
+<li>The Tor-internal name spaces would need to be redesigned. We support
+hidden service ".onion" addresses by intercepting the addresses when
+they are passed to the Tor client. Doing so at the IP level will require
+a more complex interface between Tor and the local DNS resolver.
</li>
</ol>
Modified: website/trunk/getinvolved/en/volunteer.wml
===================================================================
--- website/trunk/getinvolved/en/volunteer.wml 2011-02-07 08:23:39 UTC (rev 24192)
+++ website/trunk/getinvolved/en/volunteer.wml 2011-02-07 08:34:57 UTC (rev 24193)
@@ -665,7 +665,7 @@
encryption. This is nice and simple, but it means all cells
on a link are delayed when a single packet gets dropped, and
it means we can only reasonably support TCP streams. We have a <a
- href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldtransportallIPpacketsnotjustTCPpackets.">list
+ href="<page docs/faq>#TransportIPnotTCP">list
of reasons why we haven't shifted to UDP transport</a>, but it would
be great to see that list get shorter. We also have a proposed <a
href="<gitblob>doc/spec/proposals/100-tor-spec-udp.txt">specification