Quellcode durchsuchen

final commit. it is submitted.

svn:r777
Roger Dingledine vor 21 Jahren
Ursprung
Commit
24cff42ff7
1 geänderte Dateien mit 4 neuen und 36 gelöschten Zeilen
  1. 4 36
      doc/tor-design.tex

+ 4 - 36
doc/tor-design.tex

@@ -302,10 +302,9 @@ implementation's padding policy improves anonymity.
 {\bf PipeNet} \cite{back01, pipenet}, another low-latency design proposed at
 {\bf PipeNet} \cite{back01, pipenet}, another low-latency design proposed at
 about the same time as Onion Routing, provided
 about the same time as Onion Routing, provided
 stronger anonymity at the cost of allowing a single user to shut
 stronger anonymity at the cost of allowing a single user to shut
-down the network simply by not sending.  Low-latency anonymous
-communication has also been designed for different environments with
-different assumptions, such as
-ISDN \cite{isdn-mixes}.
+down the network simply by not sending. Systems like {\bf ISDN mixes}
+\cite{isdn-mixes} were designed for other environments with
+different assumptions.
 
 
 In P2P designs like {\bf Tarzan} \cite{tarzan:ccs02} and {\bf MorphMix}
 In P2P designs like {\bf Tarzan} \cite{tarzan:ccs02} and {\bf MorphMix}
 \cite{morphmix:fc04}, all participants both generate traffic and relay
 \cite{morphmix:fc04}, all participants both generate traffic and relay
@@ -1245,7 +1244,7 @@ application integration is described more fully below.
 \item Bob chooses some introduction points, and advertises them on
 \item Bob chooses some introduction points, and advertises them on
       the DHT.  He can add more later.
       the DHT.  He can add more later.
 \item Bob builds a circuit to each of his introduction points,
 \item Bob builds a circuit to each of his introduction points,
-      and waits.  No more data is transmitted before the first request.
+      and waits for requests.
 \item Alice learns about Bob's service out of band (perhaps Bob told her,
 \item Alice learns about Bob's service out of band (perhaps Bob told her,
       or she found it on a website). She retrieves the details of Bob's
       or she found it on a website). She retrieves the details of Bob's
       service from the DHT.
       service from the DHT.
@@ -1273,37 +1272,6 @@ application integration is described more fully below.
       communicate as normal.
       communicate as normal.
 \end{tightlist}
 \end{tightlist}
 
 
-\workingnote{
-\noindent$\bullet$ Bob chooses some introduction points, and advertises them on
-      the DHT.  He can add more later.\\
-$\bullet$ Bob establishes a Tor circuit to each of his introduction points,
-      and waits.  No data is transmitted until a request is received.\\
-$\bullet$ Alice learns about Bob's service out of band (perhaps Bob told her,
-      or she found it on a website). She retrieves the details of Bob's
-      service from the DHT.\\
-$\bullet$ Alice chooses an OR to serve as the rendezvous point (RP) for this
-      transaction. She establishes a circuit to RP, and gives it a
-      rendezvous cookie, which it will use to recognize Bob.\\
-$\bullet$ Alice opens an anonymous stream to one of Bob's introduction
-      points, and gives it a message (encrypted to Bob's public key) which tells him
-      about herself, her chosen RP and the rendezvous cookie, and the
-      first half of an ephemeral
-      key handshake. The introduction point sends the message to Bob.\\
-$\bullet$ If Bob wants to talk to Alice, he builds a new circuit to Alice's
-      RP and provides the rendezvous cookie and the second half of the DH
-      handshake (along with a hash of the session
-      key they now share---by the same argument as in
-      Section~\ref{subsubsec:constructing-a-circuit}, Alice knows she
-      shares the key only with the intended Bob).\\
-$\bullet$ The RP connects Alice's circuit to Bob's. Note that RP can't
-      recognize Alice, Bob, or the data they transmit.\\
-$\bullet$ Alice now sends a \emph{relay begin} cell along the circuit. It
-      arrives at Bob's onion proxy. Bob's onion proxy connects to Bob's
-      webserver.\\
-$\bullet$ An anonymous stream has been established, and Alice and Bob
-      communicate as normal.
-}
-
 When establishing an introduction point, Bob provides the onion router
 When establishing an introduction point, Bob provides the onion router
 with a public ``introduction'' key. The hash of this public key
 with a public ``introduction'' key. The hash of this public key
 identifies a unique service, and (since Bob is required to sign his
 identifies a unique service, and (since Bob is required to sign his