mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-20 10:12:15 +01:00
first draft of a conclusion / future works
svn:r638
This commit is contained in:
parent
53baa69705
commit
668ec0b435
@ -703,6 +703,14 @@ full_papers/rao/rao.pdf}},
|
|||||||
address = {Chateau Lake Louise, Banff, Canada},
|
address = {Chateau Lake Louise, Banff, Canada},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@inproceedings{SS03,
|
||||||
|
title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
|
||||||
|
author = {Andrei Serjantov and Peter Sewell},
|
||||||
|
booktitle = {Proceedings of ESORICS 2003},
|
||||||
|
year = {2003},
|
||||||
|
month = {October},
|
||||||
|
}
|
||||||
|
|
||||||
@Article{raghavan87randomized,
|
@Article{raghavan87randomized,
|
||||||
author = {P. Raghavan and C. Thompson},
|
author = {P. Raghavan and C. Thompson},
|
||||||
title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
|
title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
|
||||||
|
@ -578,18 +578,73 @@ the server doesn't even acknowledge its existence.
|
|||||||
Below we summarize a variety of attacks and how well our design withstands
|
Below we summarize a variety of attacks and how well our design withstands
|
||||||
them.
|
them.
|
||||||
|
|
||||||
|
\begin{enumerate}
|
||||||
|
\item \textbf{Passive attacks}
|
||||||
|
\begin{itemize}
|
||||||
|
\item \emph{Simple observation.}
|
||||||
|
\item \emph{Timing correlation.}
|
||||||
|
\item \emph{Size correlation.}
|
||||||
|
\item \emph{Option distinguishability.}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\item \textbf{Active attacks}
|
||||||
|
\begin{itemize}
|
||||||
|
\item \emph{Key compromise.}
|
||||||
|
\item \emph{Iterated subpoena.}
|
||||||
|
\item \emph{Run recipient.}
|
||||||
|
\item \emph{Run a hostile node.}
|
||||||
|
\item \emph{Compromise entire path.}
|
||||||
|
\item \emph{Selectively DoS servers.}
|
||||||
|
\item \emph{Introduce timing into messages.}
|
||||||
|
\item \emph{Tagging attacks.}
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\item \textbf{Directory attacks}
|
||||||
|
\begin{itemize}
|
||||||
|
\item foo
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
\end{enumerate}
|
||||||
|
|
||||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
|
||||||
\Section{Future Directions and Open Problems}
|
\Section{Future Directions and Open Problems}
|
||||||
\label{sec:conclusion}
|
\label{sec:conclusion}
|
||||||
|
|
||||||
Tor brings together many innovations from many different projects into
|
Tor brings together many innovations into
|
||||||
a unified deployable system. But there are still several attacks that
|
a unified deployable system. But there are still several attacks that
|
||||||
work quite well, as well as a number of sustainability and run-time
|
work quite well, as well as a number of sustainability and run-time
|
||||||
issues remaining to be ironed out. In particular:
|
issues remaining to be ironed out. In particular:
|
||||||
|
|
||||||
\begin{itemize}
|
\begin{itemize}
|
||||||
\item foo
|
\item \emph{Scalability:} Since Tor's emphasis currently is on simplicity
|
||||||
|
of design and deployment, the current design won't easily handle more
|
||||||
|
than a few hundred servers, because of its clique topology. Restricted
|
||||||
|
route topologies \cite{danezis:pet2003} promise comparable anonymity
|
||||||
|
with much better scaling properties, but we must solve problems like
|
||||||
|
how to randomly form the network without introducing net attacks.
|
||||||
|
\item \emph{Cover traffic:} Currently we avoid cover traffic because
|
||||||
|
it introduces clear performance and bandwidth costs, but and its
|
||||||
|
security properties are not well understood. With more research
|
||||||
|
\cite{SS03,defensive-dropping}, the price/value ratio may change, both for
|
||||||
|
link-level cover traffic and also long-range cover traffic. In particular,
|
||||||
|
we expect restricted route topologies to reduce the cost of cover traffic
|
||||||
|
because there are fewer links to cover.
|
||||||
|
\item \emph{Better directory distribution:} Even with the threshold
|
||||||
|
directory agreement algorithm described in \ref{sec:dirservers},
|
||||||
|
the directory servers are still trust bottlenecks. We must find more
|
||||||
|
decentralized yet practical ways to distribute up-to-date snapshots of
|
||||||
|
network status without introducing new attacks.
|
||||||
|
\item \emph{Implementing location-hidden servers:} While Section
|
||||||
|
\ref{sec:rendezvous} provides a design for rendezvous points and
|
||||||
|
location-hidden servers, this feature has not yet been implemented.
|
||||||
|
We will likely encounter additional issues, both in terms of usability
|
||||||
|
and anonymity, that must be resolved.
|
||||||
|
\item \emph{Wider-scale deployment:} The original goal of Tor was to
|
||||||
|
gain experience in deploying an anonymizing overlay network, and learn
|
||||||
|
from having actual users. We are now at the point where we can start
|
||||||
|
deploying a wider network. We will see what happens!
|
||||||
|
% ok, so that's hokey. fix it. -RD
|
||||||
\end{itemize}
|
\end{itemize}
|
||||||
|
|
||||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||||
|
Loading…
Reference in New Issue
Block a user