Kaynağa Gözat

Minor edits suggested by Susan Landau

svn:r10686
Paul Syverson 18 yıl önce
ebeveyn
işleme
94847ceb3e
1 değiştirilmiş dosya ile 9 ekleme ve 7 silme
  1. 9 7
      doc/design-paper/sptor.tex

+ 9 - 7
doc/design-paper/sptor.tex

@@ -71,20 +71,22 @@ logical or physical locations to those sites or to observers.  It
 enables hosts to be publicly accessible yet have similar protection
 enables hosts to be publicly accessible yet have similar protection
 against location through its \emph{location-hidden services}.
 against location through its \emph{location-hidden services}.
 
 
-To connect to a remote server via Tor, the client software learns
+To connect to a remote server via Tor the client software first learns
 a %signed
 a %signed
 list of Tor nodes from several central \emph{directory servers} via a
 list of Tor nodes from several central \emph{directory servers} via a
-voting protocol to avoid dependence on or complete trust in any one of
+voting protocol (to avoid dependence on or complete trust in any one
-them, and incrementally creates a private pathway or \emph{circuit} of
+of these servers). It then incrementally creates a private pathway or
-encrypted connections through authenticated Tor nodes on the network
+\emph{circuit} across the network. This circuit consists of
-whose public keys were obtained form the directory servers,
+encrypted connections through authenticated Tor nodes
-negotiating a separate set of encryption keys for each hop along the
+whose public keys were obtained from the directory servers. The client
+software negotiates a separate set of encryption keys for each hop along the
 circuit. The nodes in the circuit are chosen at random by the client
 circuit. The nodes in the circuit are chosen at random by the client
 subject to a preference for higher performing nodes to allocate
 subject to a preference for higher performing nodes to allocate
 resources effectively and with a client-chosen preferred set of first
 resources effectively and with a client-chosen preferred set of first
 nodes called \emph{entry guards} to complicate profiling attacks by
 nodes called \emph{entry guards} to complicate profiling attacks by
 internal adversaries~\cite{hs-attack}.
 internal adversaries~\cite{hs-attack}.
-The circuit is extended one node at a time, and each node
+The circuit is extended one node at a time, tunneling extensions
+through already established portions of the circuit, and each node
 along the way knows only the immediately previous and following nodes
 along the way knows only the immediately previous and following nodes
 in the circuit, so no individual Tor node knows the complete path that
 in the circuit, so no individual Tor node knows the complete path that
 each fixed-sized data packet (or \emph{cell}) will take.  Thus,
 each fixed-sized data packet (or \emph{cell}) will take.  Thus,