[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] More space hacks. No content removal.



Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv28238

Modified Files:
	tor-design.tex 
Log Message:
More space hacks. No content removal.


Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -d -r1.101 -r1.102
--- tor-design.tex	4 Nov 2003 18:00:40 -0000	1.101
+++ tor-design.tex	4 Nov 2003 18:39:31 -0000	1.102
@@ -474,7 +474,7 @@
 adversary. Instead, we assume an adversary who can observe some fraction
 of network traffic; who can generate, modify, delete, or delay traffic
 on the network; who can operate onion routers of its own; and who can
-compromise some fraction of the onion routers on the network.
+compromise some fraction of the onion routers.
 
 In low-latency anonymity systems that use layered encryption, the
 adversary's typical goal is to observe both the initiator and the
@@ -506,10 +506,9 @@
 activities from reliable servers and trying to get them taken down;
 making the network unreliable flushes users to other less anonymous
 systems, where they may be easier to attack.
-
-We consider each of these attacks in more detail below, and summarize
+We summarize
 in Section~\ref{sec:attacks} how well the Tor design defends against
-each of them.
+each of these attacks.
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
@@ -601,7 +600,6 @@
 (to tear down only part of the circuit, and to acknowledge), \emph{relay
 sendme} (used for congestion control), and \emph{relay drop} (used to
 implement long-range dummies).
-
 We describe each of these cell types and commands in more detail below.
 
 \SubSection{Circuits and streams}
@@ -623,11 +621,12 @@
 building circuits, but only a limited number of requests can be linked
 to each other through a given exit node. Also, because circuits are built
 in the background, OPs can recover from failed circuit creation
-without delaying streams and thereby harming user experience.
+without delaying streams and thereby harming user experience.\\
 
-\subsubsection{Constructing a circuit}
+\noindent {\large Constructing a circuit}\\
+%\subsubsection{Constructing a circuit}
 \label{subsubsec:constructing-a-circuit}
-
+%
 A user's OP constructs a circuit incrementally, negotiating a
 symmetric key with each OR on the circuit, one hop at a time. To begin
 creating a new circuit, the OP (call her Alice) sends a
@@ -687,10 +686,11 @@
 hold both a public key and a signature. Preliminary analysis with the
 NRL protocol analyzer \cite{meadows96} shows the above protocol to be
 secure (including providing perfect forward secrecy) under the
-traditional Dolev-Yao model.
-
-\subsubsection{Relay cells}
+traditional Dolev-Yao model.\\
 
+\noindent {\large Relay cells}\\
+%\subsubsection{Relay cells}
+%
 Once Alice has established the circuit (so she shares keys with each
 OR on the circuit), she can send relay cells.  Recall that every relay
 cell has a streamID in the relay header that indicates to which
@@ -1382,11 +1382,10 @@
 \Section{Attacks and Defenses}
 \label{sec:attacks}
 
-Below we summarize a variety of attacks, and discuss how well our
-design withstands them.
-
-\subsubsection*{Passive attacks}
+%Below we summarize a variety of attacks, and discuss how well our
+%design withstands them.\\
 
+\noindent{\large Passive attacks}\\
 \emph{Observing user traffic patterns.} Observing the connection
 from the user will not reveal her destination or data, but it will
 reveal traffic patterns (both sent and received). Profiling via user
@@ -1452,10 +1451,9 @@
 network edges to the targeted user and the responder website. While
 these are in principle feasible and surprises are always possible,
 these constitute a much more complicated attack, and there is no
-current evidence of their practicality.}
-
-\subsubsection*{Active attacks}
+current evidence of their practicality.}\\
 
+\noindent {\large Active attacks}\\
 \emph{Compromise keys.} An attacker who learns the TLS session key can
 see control cells and encrypted relay cells on every circuit on that
 connection; learning a circuit
@@ -1580,10 +1578,9 @@
 (through threats, bribery, or insider attacks), we provide all
 releases in source code form, encourage source audits, and
 frequently warn our users never to trust any software (even from
-us!) that comes without source.
-
-\subsubsection*{Directory attacks}
+us!) that comes without source.\\
 
+\noindent{\large Directory attacks}\\
 \emph{Destroy directory servers.}  If a few directory
 servers drop out of operation, the others still arrive at a final
 directory.  So long as any directory servers remain in operation,
@@ -1629,10 +1626,9 @@
 accepting TLS connections from ORs but ignoring all cells. Directory
 servers must actively test ORs by building circuits and streams as
 appropriate.  The tradeoffs of a similar approach are discussed in
-\cite{mix-acc}.
+\cite{mix-acc}.\\
   
-\subsubsection*{Attacks against rendezvous points}
-
+\noindent {\large Attacks against rendezvous points}\\
 \emph{Make many introduction requests.}  An attacker could
 try to deny Bob service by flooding his Introduction Point with
 requests.  Because the introduction point can block requests that