[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: How does tor encrypt my data?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: How does tor encrypt my data?
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Mon, 28 Jan 2008 11:40:23 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 28 Jan 2008 14:40:43 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=FiGXhcKfqteWfyw0+7vLbKMmJnojGPkl+9dqGMeouKA=; b=pN49sYF4pgXy5GkAKCW8OpRWtPOyb3jGNV4WQAQPYZtfieXnoD7NZj0jW5hjPPmNp2zfAz4hJpw8RBxpKjqr44Y1Ll6YewO97O/NabrrGN/awinI9NbF1Pz63Dt5IRF4ice5xk7Wp8CAoTm7vt8S231l8MBXylBZafoZpEsh31M=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=ZjN/12v4Os4AF8FVmFXo2brCCKqC2+8lTE+lHDaifHpQkRCVuuGDEQmiI1WVwIWrEG3kzSEqu2ToNC9iJitzS6gMjTC2egkFiU7+LN1r5iwDf+Ijqik9hjW/6NVI/8fHM3BjCX6OqSf00Rbfk+NdeqpMMs0rLXX1ei+bayBwYVU=
- In-reply-to: <401504372.24945@xxxxxxxx>
- References: <401504372.24945@xxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Icedove 1.5.0.14pre (X11/20071018)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
孙超 wrote:
(snip)
> We know that there is an entrance node and an exit node in a path,
> cleartext is sent out from the exit node to the destination that we are
> aimed at. If so, my original cleartext could be revealed to the exit
> node? If my data is encrypted on my PC by the tor I runned, how does the
> exit node decrypt the ciphered text? How does it get the decrypt key?
>
You should read the Tor FAQ; these questions are answered there:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#head-75d5f6d474527a80fc370d208252b4dfd2ea2efd
I will answer the most important one in short here, though: Unless
you're using something that provides end-to-end encryption (HTTPS,
encrypting email with PGP/GPG, using SSH for logging into things, etc.),
exit nodes can - and have been known to - spy on cleartext. They can
also alter things being passed through; this is how Torment and similar
tools attempt to "demask" those who haven't properly secured their browser.
> Another question is what kind of cryptology algorithm tor uses, RSA? or
> others?
A bit about the public-key side of Tor:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#head-808ed17a2519e7851b33bcc620b67b97cac76511
I do know that AES is used on the symmetric-key side (although I don't
know what key length is used).
- --
F. Fox: A+, Network+, Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=W3nX
-----END PGP SIGNATURE-----