Bläddra i källkod

remove sec7.1. you're right, it's redundant now

svn:r735
Roger Dingledine 22 år sedan
förälder
incheckning
1c493d4893
1 ändrade filer med 16 tillägg och 65 borttagningar
  1. 16 65
      doc/tor-design.tex

+ 16 - 65
doc/tor-design.tex

@@ -212,7 +212,7 @@ We review previous work in Section~\ref{sec:related-work}, describe
 our goals and assumptions in Section~\ref{sec:assumptions},
 our goals and assumptions in Section~\ref{sec:assumptions},
 and then address the above list of improvements in
 and then address the above list of improvements in
 Sections~\ref{sec:design}-\ref{sec:rendezvous}. We summarize
 Sections~\ref{sec:design}-\ref{sec:rendezvous}. We summarize
-in Section~\ref{sec:analysis} how our design stands up to
+in Section~\ref{sec:attacks} how our design stands up to
 known attacks, and conclude with a list of open problems in
 known attacks, and conclude with a list of open problems in
 Section~\ref{sec:maintaining-anonymity} and future work for the Onion
 Section~\ref{sec:maintaining-anonymity} and future work for the Onion
 Routing project in Section~\ref{sec:conclusion}.
 Routing project in Section~\ref{sec:conclusion}.
@@ -321,7 +321,8 @@ Systems like Freedom and the original Onion Routing build the circuit
 all at once, using a layered ``onion'' of public-key encrypted messages,
 all at once, using a layered ``onion'' of public-key encrypted messages,
 each layer of which provides a set of session keys and the address of the
 each layer of which provides a set of session keys and the address of the
 next server in the circuit. Tor as described herein, Tarzan, MorphMix,
 next server in the circuit. Tor as described herein, Tarzan, MorphMix,
-Cebolla \cite{cebolla}, and AnonNet \cite{anonnet} build the circuit
+Cebolla \cite{cebolla}, and Rennhard's Anonymity Network \cite{anonnet}
+build the circuit
 in stages, extending it one hop at a time.
 in stages, extending it one hop at a time.
 Section~\ref{subsubsec:constructing-a-circuit} describes how this
 Section~\ref{subsubsec:constructing-a-circuit} describes how this
 approach makes perfect forward secrecy feasible.
 approach makes perfect forward secrecy feasible.
@@ -433,7 +434,7 @@ is appealing, but still has many open problems
 \textbf{Not secure against end-to-end attacks:} Tor does not claim
 \textbf{Not secure against end-to-end attacks:} Tor does not claim
 to provide a definitive solution to end-to-end timing or intersection
 to provide a definitive solution to end-to-end timing or intersection
 attacks. Some approaches, such as running an onion router, may help;
 attacks. Some approaches, such as running an onion router, may help;
-see Section~\ref{sec:analysis} for more discussion.
+see Section~\ref{sec:attacks} for more discussion.
 
 
 \textbf{No protocol normalization:} Tor does not provide \emph{protocol
 \textbf{No protocol normalization:} Tor does not provide \emph{protocol
 normalization} like Privoxy or the Anonymizer. For complex and variable
 normalization} like Privoxy or the Anonymizer. For complex and variable
@@ -605,7 +606,7 @@ In Tor, each circuit can be shared by many TCP streams.  To avoid
 delays, users construct circuits preemptively.  To limit linkability
 delays, users construct circuits preemptively.  To limit linkability
 among their streams, users' OPs build a new circuit
 among their streams, users' OPs build a new circuit
 periodically if the previous one has been used,
 periodically if the previous one has been used,
-and expire old used circuits that no longer have any open streams.  
+and expire old used circuits that no longer have any open streams.
 OPs consider making a new circuit once a minute: thus
 OPs consider making a new circuit once a minute: thus
 even heavy users spend a negligible amount of time and CPU in
 even heavy users spend a negligible amount of time and CPU in
 building circuits, but only a limited number of requests can be linked
 building circuits, but only a limited number of requests can be linked
@@ -1100,7 +1101,7 @@ adversary can exploit differences in client knowledge: clients who use
 a node listed on one directory server but not the others are vulnerable.
 a node listed on one directory server but not the others are vulnerable.
 
 
 Thus these directory servers must be synchronized and redundant.
 Thus these directory servers must be synchronized and redundant.
-Valid directories are those signed by a threshold of the directory
+Directories are valid if they are signed by a threshold of the directory
 servers.
 servers.
 
 
 The directory servers in Tor are modeled after those in Mixminion
 The directory servers in Tor are modeled after those in Mixminion
@@ -1280,69 +1281,19 @@ also designed to include authentication/authorization---if Alice doesn't
 include the right cookie with her request for service, Bob need not even
 include the right cookie with her request for service, Bob need not even
 acknowledge his existence.
 acknowledge his existence.
 
 
-\Section{Analysis}
-\label{sec:analysis}
+\Section{Attacks and Defenses}
+\label{sec:attacks}
 
 
-In this section, we discuss how well Tor meets our stated design goals
-and its resistance to attacks.
+% XXX In sec4 we should talk about bandwidth classes, which will
+%     enable us to accept a lot more ORs than if we continue to
+%     require 10mbit connections for all ORs. -RD
 
 
-\SubSection{Meeting Basic Goals}
-% None of these seem to say very much.  Should this subsection be removed?
-\begin{tightlist}
-\item [Basic Anonymity:] Because traffic is encrypted, changing in
-  appearance, and can flow from anywhere to anywhere within the
-  network, a simple observer that cannot see both the initiator
-  activity and the corresponding activity where the responder talks to
-  the network will not be able to link the initiator and responder.
-  Nor is it possible to directly correlate any two communication
-  sessions as coming from a single source without additional
-  information. Resistance to more sophisticated anonymity threats is
-  discussed below.
-\item[Deployability:] Tor requires no specialized hardware. Tor
-  requires no kernel modifications; it runs in user space (currently
-  on Linux, various BSDs, and Windows). All of these imply a low
-  technical barrier to running a Tor node. There is an assumption that
-  Tor nodes have good relatively persistent net connectivity
-  (currently T1 or better);
-% Is that reasonable to say? We haven't really discussed it -P.S.
-% Roger thinks otherwise; he will fix this. -NM
-  however, there is no padding overhead, and operators can limit
-  bandwidth on any link.  Tor is freely available under the modified
-  BSD license, and operators are able to choose their own exit
-  policies, thus reducing legal and social barriers to
-  running a node.
-  
-\item[Usability:] As noted, Tor runs in user space. So does the onion
-  proxy, which is comparatively easy to install and run. SOCKS-aware
-  applications require nothing more than to be pointed at the onion
-  proxy; other applications can be redirected to use SOCKS for their
-  outgoing TCP connections by drop-in libraries such as tsocks.
-  
-\item[Flexibility:] Tor's design and implementation is fairly modular,
-  so that, for example, a scalable P2P replacement for the directory
-  servers would not substantially impact other aspects of the system.
-  Tor runs on top of TCP, so design options that could not easily do
-  so would be difficult to test on the current network. However, most
-  low-latency protocols are designed to run over TCP. We are currently
-  working with the designers of MorphMix to render our two systems
-  interoperable. So for, this seems to be relatively straightforward.
-  Interoperability will allow testing and direct comparison of the two
-  rather different designs.
+% XXX In sec9, we should note that we are currently
+%     working with the designers of MorphMix to render our two systems
+%     interoperable. So far, this seems to be relatively straightforward.
+%     Interoperability will allow testing and direct comparison of the two
+%     rather different designs.
   
   
-\item[Simple design:] Tor opts for practicality when there is no
-  clear resolution of anonymity trade-offs or practical means to
-  achieve resolution. Thus, we do not currently pad or mix; although
-  it would be easy to add either of these. Indeed, our system allows
-  long-range and variable padding if this should ever be shown to have
-  a clear advantage.  Similarly, we do not currently attempt to
-  resolve such issues as Sybil attacks to dominate the network except
-  by such direct means as personal familiarity of director operators
-  with all node operators.
-\end{tightlist}
-
-\SubSection{Attacks and Defenses}
-\label{sec:attacks}
-
 Below we summarize a variety of attacks, and discuss how well our
 Below we summarize a variety of attacks, and discuss how well our
 design withstands them.
 design withstands them.