mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2025-02-22 06:21:55 +01:00
belt out some paragraphs for the security section.
later sections still need some paragraphs; oh well. svn:r8931
This commit is contained in:
parent
1b6f880140
commit
1e878be04c
4 changed files with 146 additions and 79 deletions
|
@ -1062,7 +1062,7 @@ if a bridge stops seeing use from a certain area, does that mean the
|
||||||
bridge is blocked or does that mean those users are asleep?
|
bridge is blocked or does that mean those users are asleep?
|
||||||
|
|
||||||
There are many more problems with the general concept of detecting whether
|
There are many more problems with the general concept of detecting whether
|
||||||
bridges are blocked. First, different pieces of the Internet are blocked
|
bridges are blocked. First, different zones of the Internet are blocked
|
||||||
in different ways, and the actual firewall jurisdictions do not match
|
in different ways, and the actual firewall jurisdictions do not match
|
||||||
country borders. Our bridge scheme could help us map out the topology
|
country borders. Our bridge scheme could help us map out the topology
|
||||||
of the censored Internet, but this is a huge task. More generally,
|
of the censored Internet, but this is a huge task. More generally,
|
||||||
|
@ -1073,11 +1073,13 @@ bridge database by signing up already-blocked bridges. In this case,
|
||||||
if we're stingy giving out bridge addresses, users in that country won't
|
if we're stingy giving out bridge addresses, users in that country won't
|
||||||
learn working bridges.
|
learn working bridges.
|
||||||
|
|
||||||
All of these issues are made more complex when we try to integrate either
|
All of these issues are made more complex when we try to integrate this
|
||||||
active or passive testing into our social network reputation system above.
|
testing into our social network reputation system above.
|
||||||
Since in that case we punish or reward users based on whether bridges
|
Since in that case we punish or reward users based on whether bridges
|
||||||
get blocked, the adversary has new attacks to trick or bog down the
|
get blocked, the adversary has new attacks to trick or bog down the
|
||||||
reputation tracking.
|
reputation tracking. Indeed, the bridge authority doesn't even know
|
||||||
|
what zone the blocked user is in, so do we blame him for any possible
|
||||||
|
censored zone, or what?
|
||||||
|
|
||||||
Clearly more analysis is required. The eventual solution will probably
|
Clearly more analysis is required. The eventual solution will probably
|
||||||
involve a combination of passive measurement via GeoIP and active
|
involve a combination of passive measurement via GeoIP and active
|
||||||
|
@ -1091,13 +1093,14 @@ let the general public track the progress of the project.
|
||||||
|
|
||||||
\subsection{Advantages of deploying all solutions at once}
|
\subsection{Advantages of deploying all solutions at once}
|
||||||
|
|
||||||
For once we're not in the position of the defender: we don't have to
|
For once, we're not in the position of the defender: we don't have to
|
||||||
defend against every possible filtering scheme, we just have to defend
|
defend against every possible filtering scheme; we just have to defend
|
||||||
against at least one.
|
against at least one. On the flip side, the attacker is forced to guess
|
||||||
|
how to allocate his resources to defend against each of these discovery
|
||||||
adversary has to guess how to allocate his resources
|
strategies. So by deploying all of our strategies at once, we not only
|
||||||
|
increase our chances of finding one that the adversary has difficulty
|
||||||
(nick, want to write this section?)
|
blocking, but we actually make \emph{all} of the strategies more robust
|
||||||
|
in the face of an adversary with limited resources.
|
||||||
|
|
||||||
%\subsection{Remaining unsorted notes}
|
%\subsection{Remaining unsorted notes}
|
||||||
|
|
||||||
|
@ -1153,28 +1156,59 @@ adversary has to guess how to allocate his resources
|
||||||
|
|
||||||
Many people speculate that installing and using a Tor client in areas with
|
Many people speculate that installing and using a Tor client in areas with
|
||||||
particularly extreme firewalls is a high risk---and the risk increases
|
particularly extreme firewalls is a high risk---and the risk increases
|
||||||
as the firewall gets more restrictive. This is probably true, but there's
|
as the firewall gets more restrictive. This notion certain has merit, but
|
||||||
|
there's
|
||||||
a counter pressure as well: as the firewall gets more restrictive, more
|
a counter pressure as well: as the firewall gets more restrictive, more
|
||||||
ordinary people use Tor for more mainstream activities, such as learning
|
ordinary people behind it end up using Tor for more mainstream activities,
|
||||||
|
such as learning
|
||||||
about Wall Street prices or looking at pictures of women's ankles. So
|
about Wall Street prices or looking at pictures of women's ankles. So
|
||||||
if the restrictive firewall pushes up the number of Tor users, then the
|
as the restrictive firewall pushes up the number of Tor users, the
|
||||||
``typical'' Tor user becomes more mainstream.
|
``typical'' Tor user becomes more mainstream, and therefore mere
|
||||||
|
use or possession of the Tor software is not so surprising.
|
||||||
|
|
||||||
Hard to say which of these pressures will ultimately win out.
|
It's hard to say which of these pressures will ultimately win out,
|
||||||
|
but we should keep both sides of the issue in mind.
|
||||||
|
|
||||||
Nick, want to rewrite/elaborate on this section?
|
%Nick, want to rewrite/elaborate on this section?
|
||||||
|
|
||||||
\subsection{Observers can tell who is publishing and who is reading}
|
\subsection{Observers can tell who is publishing and who is reading}
|
||||||
\label{subsec:upload-padding}
|
\label{subsec:upload-padding}
|
||||||
|
|
||||||
Should bridge users sometimes send bursts of long-range drop cells?
|
Tor encrypts traffic on the local network, and it obscures the eventual
|
||||||
|
destination of the communication, but it doesn't do much to obscure the
|
||||||
|
traffic volume. In particular, a user publishing a home video will have a
|
||||||
|
different network signature than a user reading an online news article.
|
||||||
|
Based on our assumption in Section~\ref{sec:assumptions} that users who
|
||||||
|
publish material are in more danger, should we work to improve Tor's
|
||||||
|
security in this situation?
|
||||||
|
|
||||||
|
In the general case this is an extremely challenging task:
|
||||||
|
effective \emph{end-to-end traffic confirmation attacks}
|
||||||
|
are known where the adversary observes the origin and the
|
||||||
|
destination of traffic and confirms that they are part of the
|
||||||
|
same communication~\cite{danezis:pet2004,e2e-traffic}. Related are
|
||||||
|
\emph{website fingerprinting attacks}, where the adversary downloads
|
||||||
|
a few hundred popular websites, makes a set of "signatures" for each
|
||||||
|
site, and then observes the target Tor client's traffic to look for
|
||||||
|
a match~\cite{pet05-bissias,defensive-dropping}. But can we do better
|
||||||
|
against a limited adversary who just does coarse-grained sweeps looking
|
||||||
|
for unusually prolific publishers?
|
||||||
|
|
||||||
|
One answer is for bridge users to automatically send bursts of padding
|
||||||
|
traffic periodically. (This traffic can be implemented in terms of
|
||||||
|
long-range drop cells, which are already part of the Tor specification.)
|
||||||
|
Of course, convincingly simulating an actual human publishing interesting
|
||||||
|
content is a difficult arms race, but it may be worthwhile to at least
|
||||||
|
start the race. More research remains.
|
||||||
|
|
||||||
\subsection{Anonymity effects from acting as a bridge relay}
|
\subsection{Anonymity effects from acting as a bridge relay}
|
||||||
|
|
||||||
Against some attacks, relaying traffic for others can improve anonymity. The
|
Against some attacks, relaying traffic for others can improve
|
||||||
simplest example is an attacker who owns a small number of Tor servers. He
|
anonymity. The simplest example is an attacker who owns a small number
|
||||||
will see a connection from the bridge, but he won't be able to know
|
of Tor servers. He will see a connection from the bridge, but he won't
|
||||||
whether the connection originated there or was relayed from somebody else.
|
be able to know whether the connection originated there or was relayed
|
||||||
|
from somebody else. More generally, the mere uncertainty of whether the
|
||||||
|
traffic originated from that user may be helpful.
|
||||||
|
|
||||||
There are some cases where it doesn't seem to help: if an attacker can
|
There are some cases where it doesn't seem to help: if an attacker can
|
||||||
watch all of the bridge's incoming and outgoing traffic, then it's easy
|
watch all of the bridge's incoming and outgoing traffic, then it's easy
|
||||||
|
@ -1186,7 +1220,7 @@ an ordinary client.)
|
||||||
There are also some potential downsides to running a bridge. First, while
|
There are also some potential downsides to running a bridge. First, while
|
||||||
we try to make it hard to enumerate all bridges, it's still possible to
|
we try to make it hard to enumerate all bridges, it's still possible to
|
||||||
learn about some of them, and for some people just the fact that they're
|
learn about some of them, and for some people just the fact that they're
|
||||||
running one might signal to an attacker that they place a high value
|
running one might signal to an attacker that they place a higher value
|
||||||
on their anonymity. Second, there are some more esoteric attacks on Tor
|
on their anonymity. Second, there are some more esoteric attacks on Tor
|
||||||
relays that are not as well-understood or well-tested---for example, an
|
relays that are not as well-understood or well-tested---for example, an
|
||||||
attacker may be able to ``observe'' whether the bridge is sending traffic
|
attacker may be able to ``observe'' whether the bridge is sending traffic
|
||||||
|
@ -1194,17 +1228,25 @@ even if he can't actually watch its network, by relaying traffic through
|
||||||
it and noticing changes in traffic timing~\cite{attack-tor-oak05}. On
|
it and noticing changes in traffic timing~\cite{attack-tor-oak05}. On
|
||||||
the other hand, it may be that limiting the bandwidth the bridge is
|
the other hand, it may be that limiting the bandwidth the bridge is
|
||||||
willing to relay will allow this sort of attacker to determine if it's
|
willing to relay will allow this sort of attacker to determine if it's
|
||||||
being used as a bridge but not whether it is adding traffic of its own.
|
being used as a bridge but not easily learn whether it is adding traffic
|
||||||
|
of its own.
|
||||||
|
|
||||||
It is an open research question whether the benefits outweigh the risks. A
|
We also need to examine how entry guards fit in. Entry guards
|
||||||
lot of the decision rests on which attacks the users are most worried
|
(a small set of nodes that are always used for the first
|
||||||
about. For most users, we don't think running a bridge relay will be
|
step in a circuit) help protect against certain attacks
|
||||||
that damaging.
|
where the attacker runs a few Tor servers and waits for
|
||||||
|
the user to choose these servers as the beginning and end of her
|
||||||
|
circuit\footnote{http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ\#EntryGuards}.
|
||||||
|
If the blocked user doesn't use the bridge's entry guards, then the bridge
|
||||||
|
doesn't gain as much cover benefit. On the other hand, what design changes
|
||||||
|
are needed for the blocked user to use the bridge's entry guards without
|
||||||
|
learning what they are (this seems hard), and even if we solve that,
|
||||||
|
do they then need to use the guards' guards and so on down the line?
|
||||||
|
|
||||||
Need to examine how entry guards fit in. If the blocked user doesn't use
|
It is an open research question whether the benefits of running a bridge
|
||||||
the bridge's entry guards, then the bridge doesn't gain as much cover
|
outweigh the risks. A lot of the decision rests on which attacks the
|
||||||
benefit. If he does, first how does that actually work, and second is
|
users are most worried about. For most users, we don't think running a
|
||||||
it turtles all the way down (need to use the guard's guards, ...)?
|
bridge relay will be that damaging, and it could help quite a bit.
|
||||||
|
|
||||||
\subsection{Trusting local hardware: Internet cafes and LiveCDs}
|
\subsection{Trusting local hardware: Internet cafes and LiveCDs}
|
||||||
\label{subsec:cafes-and-livecds}
|
\label{subsec:cafes-and-livecds}
|
||||||
|
@ -1215,19 +1257,22 @@ always reasonable.
|
||||||
For Internet cafe Windows computers that let you attach your own USB key,
|
For Internet cafe Windows computers that let you attach your own USB key,
|
||||||
a USB-based Tor image would be smart. There's Torpark, and hopefully
|
a USB-based Tor image would be smart. There's Torpark, and hopefully
|
||||||
there will be more thoroughly analyzed options down the road. Worries
|
there will be more thoroughly analyzed options down the road. Worries
|
||||||
about hardware or
|
remain about hardware or
|
||||||
software keyloggers and other spyware---and physical surveillance.
|
software keyloggers and other spyware---and physical surveillance.
|
||||||
|
|
||||||
If the system lets you boot from a CD or from a USB key, you can gain
|
If the system lets you boot from a CD or from a USB key, you can gain
|
||||||
a bit more security by bringing a privacy LiveCD with you. Hardware
|
a bit more security by bringing a privacy LiveCD with you. (This
|
||||||
keyloggers and physical surveillance still a worry. LiveCDs also useful
|
approach isn't foolproof of course, since hardware
|
||||||
if it's your own hardware, since it's easier to avoid leaving breadcrumbs
|
keyloggers and physical surveillance are still a worry).
|
||||||
everywhere.
|
|
||||||
|
|
||||||
\subsection{Forward compatibility and retiring bridge authorities}
|
In fact, LiveCDs are also useful if it's your own hardware, since it's
|
||||||
|
easier to avoid leaving private data and logs scattered around the
|
||||||
|
system.
|
||||||
|
|
||||||
Eventually we'll want to change the identity key and/or location
|
%\subsection{Forward compatibility and retiring bridge authorities}
|
||||||
of a bridge authority. How do we do this mostly cleanly?
|
%
|
||||||
|
%Eventually we'll want to change the identity key and/or location
|
||||||
|
%of a bridge authority. How do we do this mostly cleanly?
|
||||||
|
|
||||||
\subsection{The trust chain}
|
\subsection{The trust chain}
|
||||||
\label{subsec:trust-chain}
|
\label{subsec:trust-chain}
|
||||||
|
@ -1250,7 +1295,12 @@ Tor network. And last, the source code and other packages are signed
|
||||||
with the GPG keys of the Tor developers, so users can confirm that they
|
with the GPG keys of the Tor developers, so users can confirm that they
|
||||||
did in fact download a genuine version of Tor.
|
did in fact download a genuine version of Tor.
|
||||||
|
|
||||||
But how can a user in an oppressed country know that he has the correct
|
In the case of blocked users contacting bridges and bridge directory
|
||||||
|
authorities, the same logic applies in parallel: the blocked users fetch
|
||||||
|
information from both the bridge authorities and the directory authorities
|
||||||
|
for the `main' Tor network, and they combine this information locally.
|
||||||
|
|
||||||
|
How can a user in an oppressed country know that he has the correct
|
||||||
key fingerprints for the developers? As with other security systems, it
|
key fingerprints for the developers? As with other security systems, it
|
||||||
ultimately comes down to human interaction. The keys are signed by dozens
|
ultimately comes down to human interaction. The keys are signed by dozens
|
||||||
of people around the world, and we have to hope that our users have met
|
of people around the world, and we have to hope that our users have met
|
||||||
|
@ -1260,13 +1310,11 @@ that they can learn
|
||||||
the correct keys. For users that aren't connected to the global security
|
the correct keys. For users that aren't connected to the global security
|
||||||
community, though, this question remains a critical weakness.
|
community, though, this question remains a critical weakness.
|
||||||
|
|
||||||
% XXX make clearer the trust chain step for bridge directory authorities
|
%\subsection{Security through obscurity: publishing our design}
|
||||||
|
|
||||||
\subsection{Security through obscurity: publishing our design}
|
%Many other schemes like dynaweb use the typical arms race strategy of
|
||||||
|
%not publishing their plans. Our goal here is to produce a design---a
|
||||||
Many other schemes like dynaweb use the typical arms race strategy of
|
%framework---that can be public and still secure. Where's the tradeoff?
|
||||||
not publishing their plans. Our goal here is to produce a design---a
|
|
||||||
framework---that can be public and still secure. Where's the tradeoff?
|
|
||||||
|
|
||||||
\section{Performance improvements}
|
\section{Performance improvements}
|
||||||
\label{sec:performance}
|
\label{sec:performance}
|
||||||
|
@ -1370,30 +1418,30 @@ servers.)
|
||||||
% Also consider everybody-a-server. Many of the scalability questions
|
% Also consider everybody-a-server. Many of the scalability questions
|
||||||
% are easier when you're talking about making everybody a bridge.
|
% are easier when you're talking about making everybody a bridge.
|
||||||
|
|
||||||
\subsection{What if the clients can't install software?}
|
%\subsection{What if the clients can't install software?}
|
||||||
|
|
||||||
[this section should probably move to the related work section,
|
%[this section should probably move to the related work section,
|
||||||
or just disappear entirely.]
|
%or just disappear entirely.]
|
||||||
|
|
||||||
Bridge users without Tor software
|
%Bridge users without Tor software
|
||||||
|
|
||||||
Bridge relays could always open their socks proxy. This is bad though,
|
%Bridge relays could always open their socks proxy. This is bad though,
|
||||||
first
|
%first
|
||||||
because bridges learn the bridge users' destinations, and second because
|
%because bridges learn the bridge users' destinations, and second because
|
||||||
we've learned that open socks proxies tend to attract abusive users who
|
%we've learned that open socks proxies tend to attract abusive users who
|
||||||
have no idea they're using Tor.
|
%have no idea they're using Tor.
|
||||||
|
|
||||||
Bridges could require passwords in the socks handshake (not supported
|
%Bridges could require passwords in the socks handshake (not supported
|
||||||
by most software including Firefox). Or they could run web proxies
|
%by most software including Firefox). Or they could run web proxies
|
||||||
that require authentication and then pass the requests into Tor. This
|
%that require authentication and then pass the requests into Tor. This
|
||||||
approach is probably a good way to help bootstrap the Psiphon network,
|
%approach is probably a good way to help bootstrap the Psiphon network,
|
||||||
if one of its barriers to deployment is a lack of volunteers willing
|
%if one of its barriers to deployment is a lack of volunteers willing
|
||||||
to exit directly to websites. But it clearly drops some of the nice
|
%to exit directly to websites. But it clearly drops some of the nice
|
||||||
anonymity and security features Tor provides.
|
%anonymity and security features Tor provides.
|
||||||
|
|
||||||
A hybrid approach where the user gets his anonymity from Tor but his
|
%A hybrid approach where the user gets his anonymity from Tor but his
|
||||||
software-less use from a web proxy running on a trusted machine on the
|
%software-less use from a web proxy running on a trusted machine on the
|
||||||
free side.
|
%free side.
|
||||||
|
|
||||||
\subsection{Publicity attracts attention}
|
\subsection{Publicity attracts attention}
|
||||||
\label{subsec:publicity}
|
\label{subsec:publicity}
|
||||||
|
@ -1415,7 +1463,16 @@ advantage?
|
||||||
|
|
||||||
\subsection{The Tor website: how to get the software}
|
\subsection{The Tor website: how to get the software}
|
||||||
|
|
||||||
|
One of the first censoring attacks against a system like ours is to
|
||||||
|
block the website and make the software itself hard to find. After
|
||||||
|
all, our system works well once the user is running an authentic
|
||||||
|
copy of Tor and has found a working bridge, but up until that point
|
||||||
|
we need to rely on their individual skills and ingenuity.
|
||||||
|
Right now, most countries that block access to Tor block only the main
|
||||||
|
website and leave mirrors and the network itself untouched.
|
||||||
|
Falling back on word-of-mouth is always a good last resort, but we should
|
||||||
|
also take steps to make sure it's relatively easy for users to get a copy.
|
||||||
|
See Section~\ref{subsec:first-bridge} for more discussion.
|
||||||
|
|
||||||
\section{Future designs}
|
\section{Future designs}
|
||||||
|
|
||||||
|
@ -1426,7 +1483,8 @@ operation, can we have some bridge relays inside the blocked area too,
|
||||||
and more established users can use them as relays so they don't need to
|
and more established users can use them as relays so they don't need to
|
||||||
communicate over the firewall directly at all? A simple example here is
|
communicate over the firewall directly at all? A simple example here is
|
||||||
to make new blocked users into internal bridges also---so they sign up
|
to make new blocked users into internal bridges also---so they sign up
|
||||||
on the BDA as part of doing their query, and we give out their addresses
|
on the bridge authority as part of doing their query, and we give out
|
||||||
|
their addresses
|
||||||
rather than (or along with) the external bridge addresses. This design
|
rather than (or along with) the external bridge addresses. This design
|
||||||
is a lot trickier because it brings in the complexity of whether the
|
is a lot trickier because it brings in the complexity of whether the
|
||||||
internal bridges will remain available, can maintain reachability with
|
internal bridges will remain available, can maintain reachability with
|
||||||
|
@ -1441,14 +1499,14 @@ firewall is *socially* very successful, even if technologies exist to
|
||||||
get around it.
|
get around it.
|
||||||
|
|
||||||
but having a strong technical solution is still useful as a piece of the
|
but having a strong technical solution is still useful as a piece of the
|
||||||
puzzle.
|
puzzle. and tor provides a great set of building blocks to start from.
|
||||||
|
|
||||||
\bibliographystyle{plain} \bibliography{tor-design}
|
\bibliographystyle{plain} \bibliography{tor-design}
|
||||||
|
|
||||||
\appendix
|
%\appendix
|
||||||
|
|
||||||
\section{Counting Tor users by country}
|
%\section{Counting Tor users by country}
|
||||||
\label{app:geoip}
|
%\label{app:geoip}
|
||||||
|
|
||||||
\end{document}
|
\end{document}
|
||||||
|
|
||||||
|
|
|
@ -211,7 +211,7 @@ the literature. In particular, because we
|
||||||
support interactive communications without impractically expensive padding,
|
support interactive communications without impractically expensive padding,
|
||||||
we fall prey to a variety
|
we fall prey to a variety
|
||||||
of intra-network~\cite{back01,attack-tor-oak05,flow-correlation04} and
|
of intra-network~\cite{back01,attack-tor-oak05,flow-correlation04} and
|
||||||
end-to-end~\cite{danezis-pet2004,SS03} anonymity-breaking attacks.
|
end-to-end~\cite{danezis:pet2004,SS03} anonymity-breaking attacks.
|
||||||
|
|
||||||
Tor does not attempt to defend against a global observer. In general, an
|
Tor does not attempt to defend against a global observer. In general, an
|
||||||
attacker who can measure both ends of a connection through the Tor network
|
attacker who can measure both ends of a connection through the Tor network
|
||||||
|
@ -463,7 +463,7 @@ Mixminion, where the threat model is based on mixing messages with each
|
||||||
other, there's an arms race between end-to-end statistical attacks and
|
other, there's an arms race between end-to-end statistical attacks and
|
||||||
counter-strategies~\cite{statistical-disclosure,minion-design,e2e-traffic,trickle02}.
|
counter-strategies~\cite{statistical-disclosure,minion-design,e2e-traffic,trickle02}.
|
||||||
But for low-latency systems like Tor, end-to-end \emph{traffic
|
But for low-latency systems like Tor, end-to-end \emph{traffic
|
||||||
correlation} attacks~\cite{danezis-pet2004,defensive-dropping,SS03}
|
correlation} attacks~\cite{danezis:pet2004,defensive-dropping,SS03}
|
||||||
allow an attacker who can observe both ends of a communication
|
allow an attacker who can observe both ends of a communication
|
||||||
to correlate packet timing and volume, quickly linking
|
to correlate packet timing and volume, quickly linking
|
||||||
the initiator to her destination.
|
the initiator to her destination.
|
||||||
|
@ -1393,7 +1393,7 @@ routing problems.
|
||||||
%overhead associated with directories, discovery, and so on.
|
%overhead associated with directories, discovery, and so on.
|
||||||
|
|
||||||
We can address these points by reducing the network's connectivity.
|
We can address these points by reducing the network's connectivity.
|
||||||
Danezis~\cite{danezis-pets03} considers
|
Danezis~\cite{danezis:pet2003} considers
|
||||||
the anonymity implications of restricting routes on mix networks and
|
the anonymity implications of restricting routes on mix networks and
|
||||||
recommends an approach based on expander graphs (where any subgraph is likely
|
recommends an approach based on expander graphs (where any subgraph is likely
|
||||||
to have many neighbors). It is not immediately clear that this approach will
|
to have many neighbors). It is not immediately clear that this approach will
|
||||||
|
|
|
@ -1005,7 +1005,7 @@
|
||||||
note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
|
note = {\url{http://www.zurich.ibm.com/security/publications/1998.html}},
|
||||||
}
|
}
|
||||||
|
|
||||||
@InProceedings{danezis-pets03,
|
@InProceedings{danezis:pet2003,
|
||||||
author = {George Danezis},
|
author = {George Danezis},
|
||||||
title = {Mix-networks with Restricted Routes},
|
title = {Mix-networks with Restricted Routes},
|
||||||
booktitle = {Privacy Enhancing Technologies (PET 2003)},
|
booktitle = {Privacy Enhancing Technologies (PET 2003)},
|
||||||
|
@ -1147,7 +1147,7 @@
|
||||||
note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
|
note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
|
||||||
}
|
}
|
||||||
|
|
||||||
@InProceedings{danezis-pet2004,
|
@InProceedings{danezis:pet2004,
|
||||||
author = "George Danezis",
|
author = "George Danezis",
|
||||||
title = "The Traffic Analysis of Continuous-Time Mixes",
|
title = "The Traffic Analysis of Continuous-Time Mixes",
|
||||||
booktitle= {Privacy Enhancing Technologies (PET 2004)},
|
booktitle= {Privacy Enhancing Technologies (PET 2004)},
|
||||||
|
@ -1352,10 +1352,19 @@ Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
|
||||||
|
|
||||||
@misc{mackinnon-personal,
|
@misc{mackinnon-personal,
|
||||||
author = {Rebecca MacKinnon},
|
author = {Rebecca MacKinnon},
|
||||||
title = {Personal conversation},
|
title = {Private communication},
|
||||||
year = {2006},
|
year = {2006},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@inproceedings{pet05-bissias,
|
||||||
|
title = {Privacy Vulnerabilities in Encrypted HTTP Streams},
|
||||||
|
author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine},
|
||||||
|
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2005)},
|
||||||
|
year = {2005},
|
||||||
|
month = {May},
|
||||||
|
note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
|
||||||
|
}
|
||||||
|
|
||||||
%%% Local Variables:
|
%%% Local Variables:
|
||||||
%%% mode: latex
|
%%% mode: latex
|
||||||
%%% TeX-master: "tor-design"
|
%%% TeX-master: "tor-design"
|
||||||
|
|
|
@ -1838,7 +1838,7 @@ manipulating or exploiting gaps in their knowledge? Third, if there
|
||||||
are too many servers for every server to constantly communicate with
|
are too many servers for every server to constantly communicate with
|
||||||
every other, which non-clique topology should the network use?
|
every other, which non-clique topology should the network use?
|
||||||
(Restricted-route topologies promise comparable anonymity with better
|
(Restricted-route topologies promise comparable anonymity with better
|
||||||
scalability~\cite{danezis-pets03}, but whatever topology we choose, we
|
scalability~\cite{danezis:pet2003}, but whatever topology we choose, we
|
||||||
need some way to keep attackers from manipulating their position within
|
need some way to keep attackers from manipulating their position within
|
||||||
it~\cite{casc-rep}.) Fourth, if no central authority is tracking
|
it~\cite{casc-rep}.) Fourth, if no central authority is tracking
|
||||||
server reliability, how do we stop unreliable servers from making
|
server reliability, how do we stop unreliable servers from making
|
||||||
|
|
Loading…
Add table
Reference in a new issue