mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2025-02-23 14:40:51 +01:00
mess with the formatting in sec9
svn:r703
This commit is contained in:
parent
c826c5a95c
commit
6a909560be
1 changed files with 12 additions and 14 deletions
|
@ -1704,9 +1704,8 @@ presence of unreliable nodes.
|
|||
Below we summarize a variety of attacks and how well our design withstands
|
||||
them.
|
||||
|
||||
\begin{enumerate}
|
||||
\item \textbf{Passive attacks}
|
||||
\begin{itemize}
|
||||
\subsubsection*{Passive attacks}
|
||||
\begin{tightlist}
|
||||
\item \emph{Observing user behavior.}
|
||||
\item \emph{End-to-end Timing correlation.}
|
||||
\item \emph{End-to-end Size correlation.}
|
||||
|
@ -1733,10 +1732,10 @@ DOS three of the 4 who would allow a certain exit.
|
|||
anonymization of data stream.
|
||||
|
||||
|
||||
\end{itemize}
|
||||
\end{tightlist}
|
||||
|
||||
\item \textbf{Active attacks}
|
||||
\begin{itemize}
|
||||
\subsubsection*{Active attacks}
|
||||
\begin{tightlist}
|
||||
\item \emph{Key compromise.} Talk about all three keys. 3 bullets
|
||||
\item \emph{Iterated subpoena.} Legal roving adversary. Works bad against
|
||||
this because of ephemeral keys. Criticize pets paper in section 2 for
|
||||
|
@ -1756,7 +1755,6 @@ Subcase of running a hostile node:
|
|||
the exit node can change the content you're getting to try to
|
||||
trick you. similarly, when it rejects you due to exit policy,
|
||||
it could give you a bad IP that sends you somewhere else.
|
||||
\end{itemize}
|
||||
\item \emph{replaying traffic} Can't in Tor. NonSSL anonymizer.
|
||||
|
||||
\item Do bad things with the Tor network, so we are hated and
|
||||
|
@ -1771,23 +1769,23 @@ Exit policy's are a start.
|
|||
we rely on DNS being globally consistent. if people in africa resolve
|
||||
IPs differently, then asking to extend a circuit to a certain IP can
|
||||
give away your origin.
|
||||
\end{tightlist}
|
||||
|
||||
\item \textbf{Directory attacks}
|
||||
\begin{itemize}
|
||||
\subsubsection*{Directory attacks}
|
||||
\begin{tightlist}
|
||||
\item knock out a dirserver
|
||||
\item knock out half the dirservers
|
||||
\item trick user into using different software (with different dirserver
|
||||
keys)
|
||||
\item OR connects to the dirservers but nowhere else
|
||||
\item foo
|
||||
\end{itemize}
|
||||
\end{tightlist}
|
||||
|
||||
\item \textbf{Attacks against rendezvous points}
|
||||
\begin{itemize}
|
||||
\subsubsection*{Attacks against rendezvous points}
|
||||
\begin{tightlist}
|
||||
\item foo
|
||||
\end{itemize}
|
||||
\end{tightlist}
|
||||
|
||||
\end{enumerate}
|
||||
|
||||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue