[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] make it clearer that streams on a circuit can exit at diffe...
- To: or-cvs@freehaven.net
- Subject: [or-cvs] make it clearer that streams on a circuit can exit at diffe...
- From: arma@seul.org (Roger Dingledine)
- Date: Sun, 2 Nov 2003 17:11:53 -0500 (EST)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Sun, 02 Nov 2003 17:12:02 -0500
- Reply-to: or-dev@freehaven.net
- Sender: owner-or-cvs@freehaven.net
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc
Modified Files:
tor-design.tex
Log Message:
make it clearer that streams on a circuit can exit at different ORs
Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -d -r1.60 -r1.61
--- tor-design.tex 2 Nov 2003 11:43:39 -0000 1.60
+++ tor-design.tex 2 Nov 2003 22:11:49 -0000 1.61
@@ -140,6 +140,14 @@
Tor multiplexes multiple TCP streams along each virtual
circuit, to improve efficiency and anonymity.
+\item \textbf{Leaky-pipe circuit topology:} Through in-band signalling
+within the circuit, Tor initiators can direct traffic to nodes partway
+down the circuit. This allows for long-range padding to frustrate traffic
+shape and volume attacks at the initiator \cite{defensive-dropping}.
+Because circuits are used by more than one application, it also allows
+traffic to exit the circuit from the middle---thus frustrating traffic
+shape and volume attacks based on observing the end of the circuit.
+
\item \textbf{No mixing, padding, or traffic shaping:} The original
Onion Routing design called for batching and reordering the cells arriving
from each circuit. It also included padding between onion routers and,
@@ -156,16 +164,6 @@
convenient design for traffic shaping or low-latency mixing that
will improve anonymity against a realistic adversary, we leave these
strategies out.
-
-\item \textbf{Leaky-pipe circuit topology:} Through in-band
- signalling within the
- circuit, Tor initiators can direct traffic to nodes partway down the
- circuit. This allows for long-range padding to frustrate traffic
- shape and volume attacks at the initiator \cite{defensive-dropping}.
- Because circuits are used by more than one application, it also
- allows traffic to exit the circuit from the middle---thus
- frustrating traffic shape and volume attacks based on observing the
- end of the circuit.
\item \textbf{Congestion control:} Earlier anonymity designs do not
address traffic bottlenecks. Unfortunately, typical approaches to load