Bläddra i källkod

put in a paragraph blurting out the name of each related work item.

svn:r3451
Roger Dingledine 20 år sedan
förälder
incheckning
f0c916e4ad
1 ändrade filer med 26 tillägg och 12 borttagningar
  1. 26 12
      doc/design-paper/challenges.tex

+ 26 - 12
doc/design-paper/challenges.tex

@@ -74,9 +74,8 @@ this paper describes the policy and technical issues that Tor faces are
 we continue deployment. We aim to lay a research agenda for others to
 we continue deployment. We aim to lay a research agenda for others to
 help in addressing these issues. Section~\ref{sec:what-is-tor} gives an
 help in addressing these issues. Section~\ref{sec:what-is-tor} gives an
 overview of the Tor
 overview of the Tor
-design and ours goals. We go on in Section~\ref{sec:related} to describe
+design and ours goals. Sections~\ref{sec:crossroads-policy}
-Tor's context in the anonymity space. Sections~\ref{sec:crossroads-policy}
+and~\ref{sec:crossroads-technical} go on to describe the practical challenges,
-and~\ref{sec:crossroads-technical} describe the practical challenges,
 both policy and technical respectively, that stand in the way of moving
 both policy and technical respectively, that stand in the way of moving
 from a practical useful network to a practical useful anonymous network.
 from a practical useful network to a practical useful anonymous network.
 
 
@@ -137,8 +136,8 @@ in its security and flexibility.  Mix networks such as
 Mixmaster~\cite{mixmaster} or its successor Mixminion~\cite{minion-design}
 Mixmaster~\cite{mixmaster} or its successor Mixminion~\cite{minion-design}
 gain the highest degrees of anonymity at the expense of introducing highly
 gain the highest degrees of anonymity at the expense of introducing highly
 variable delays, thus making them unsuitable for applications such as web
 variable delays, thus making them unsuitable for applications such as web
-browsing that require quick response times.  Commercial single-hop proxies
+browsing that require quick response times.  Commercial single-hop
-such as {\url{anonymizer.com}} present a single point of failure, where
+proxies~\cite{anonymizer} present a single point of failure, where
 a single compromise can expose all users' traffic, and a single-point
 a single compromise can expose all users' traffic, and a single-point
 eavesdropper can perform traffic analysis on the entire network.
 eavesdropper can perform traffic analysis on the entire network.
 Also, their proprietary implementations place any infrastucture that
 Also, their proprietary implementations place any infrastucture that
@@ -171,20 +170,35 @@ weasel's graph of \# nodes and of bandwidth, ideally from week 0.
 Tor doesn't try to provide steg (but see Sec \ref{china}), or
 Tor doesn't try to provide steg (but see Sec \ref{china}), or
 the other non-goals listed in tor-design.
 the other non-goals listed in tor-design.
 
 
-\section{Tor's position in the anonymity field}
+Tor is not the only anonymity system that aims to be practical and useful.
-\label{sec:related}
+Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
+open proxies around the Internet~\cite{open-proxies}, can provide good
+performance and some security against a weaker attacker. Dresden's Java
+Anon Proxy~\cite{jap} provides similar functionality to Tor but only
+handles web browsing rather than arbitrary TCP. Also, JAP's network
+topology uses cascades (fixed routes through the network); since without
+end-to-end padding it is just as vulnerable as Tor to end-to-end timing
+attacks, its dispersal properties are therefore worse than Tor's.
+%Some peer-to-peer file-sharing overlay networks such as
+%Freenet~\cite{freenet} and Mute~\cite{mute}
+Zero-Knowledge Systems' commercial Freedom
+network~\cite{freedom21-security} was even more flexible than Tor in
+that it could transport arbitrary IP packets, and it also supported
+pseudonymous access rather than just anonymous access; but it had
+a different approach to sustainability (collecting money from users
+and paying ISPs to run servers), and has shut down due to financial
+load.  Finally, more scalable designs like Tarzan~\cite{tarzan} and
+MorphMix~\cite{morphmix} have been proposed in the literature, but
+have not yet been fielded. We direct the interested reader to Section
+2 of~\cite{tor-design} for a more indepth review of related work.
 
 
-There are many other classes of systems: single-hop proxies, open proxies,
-jap, mixminion, flash mixes, freenet, i2p, mute/ants/etc, tarzan,
-morphmix, freedom. Give brief descriptions and brief characterizations
-of how we differ. This is not the breakthrough stuff and we only have
-a page or two for it.
 
 
 have a serious discussion of morphmix's assumptions, since they would
 have a serious discussion of morphmix's assumptions, since they would
 seem to be the direct competition. in fact tor is a flexible architecture
 seem to be the direct competition. in fact tor is a flexible architecture
 that would encompass morphmix, and they're nearly identical except for
 that would encompass morphmix, and they're nearly identical except for
 path selection and node discovery. and the trust system morphmix has
 path selection and node discovery. and the trust system morphmix has
 seems overkill (and/or insecure) based on the threat model we've picked.
 seems overkill (and/or insecure) based on the threat model we've picked.
+% this para should probably move to the scalability / directory system. -RD
 
 
 \section{Threat model}
 \section{Threat model}