[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Thesis: Improving Tor using a TCP-over-DTLS Tunnel
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Thesis: Improving Tor using a TCP-over-DTLS Tunnel
- From: Ringo Kamens <2600denver@xxxxxxxxx>
- Date: Sun, 12 Oct 2008 00:18:18 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 12 Oct 2008 00:18:52 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=hG0P+BzN85XHTrWCKb+IHAbCToRbr3w96kkLUCHzVCM=; b=sp1ZunHmL3wFHS4kRTS8nPsmsr5AJvY5jUqZdA23gwVkxKNDZEFmPCmsFle9sQ8VLX 4sbDaSUEULfBcIA7Do+f5hDZEZdxiyBews8jWO40oFDxw8sFka5ryoU8bwecmj4/bge5 cW0/U1l/fwRg6fEC6T//os7RKn5XYxbfcptSQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=To4O2syA+TviG2aRtRH4ctQZq0QQOSkcKKMX3I6nFrHWCr8+kPI12VfvNruM2QEe1q f3hVTr20WJMMzfYaI3N/hNU15eBWsXV/U2u8u0lGgmOIisjUr/Yh792z2v7aYgwYb5m/ ynxcJvdzeHcYr8ctglDKiiMWGwsDxzWi9nikg=
- In-reply-to: <20081012014643.GM6453@xxxxxxxxxxxxxx>
- References: <20081012014643.GM6453@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.17 (X11/20080925)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Roger Dingledine wrote:
> Hi folks,
>
> Joel Reardon has finished his thesis at U Waterloo under the guidance
> of Ian Goldberg. He looked at switching Tor's transport from TCP to
> UDP. There are still many unsolved problems before we can do the switch,
> but the thesis walks through a lot of the issues as well as future
> work. It's definitely worth a look.
>
> http://uwspace.uwaterloo.ca/handle/10012/4011
>
> --Roger
>
>
Thanks for posting that. It seems to me that having different streams
would make it easier to discern what types of data are being sent. Also,
in the situation where an adversary was watching both ends of the
connection or trying to deduce which computer was a hidden service, I
would imagine that dividing up the streams would make it easier. I don't
know much about network dynamics though, nor have I read the paper.
Regardless, that's some really good, interesting research and I like
seeing this kind of thought being put into Tor.
For those of you who prefer https:
https://uwspace.uwaterloo.ca/handle/10012/4011
Ringo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFI8XqJ6pWcWSc5BE4RAgCCAJ0eKF8YsyvE6x3tPxK5pg0gq1evJQCaAjVD
2i9KvXQgeKQdT3ttJ5I9wGY=
=KLAe
-----END PGP SIGNATURE-----