|
This page contains all of the posts and discussion on MemeStreams referencing the following web page: Onion Routing 2.0: tor. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.
|
Onion Routing 2.0: tor by bmitchell at 3:05 pm EDT, Sep 7, 2004 |
The simple version: Tor provides a distributed network of servers("onion routers"). Users bounce their TCP streams (web traffic, FTP, SSH, etc.) around the routers. This makes it hard for recipients, observers, and even the onion routers themselves to track the source of the stream. The complex version: Onion Routing is a connection-oriented anonymizing communication service. Users choose a source-routed path through a set of nodes, and negotiate a "virtual circuit" through the network, in which each node knows its predecessor and successor, but no others. Traffic flowing down the circuit is unwrapped by a symmetric key at each node, which reveals the downstream node. http://freehaven.net/tor/ [main page] http://freehaven.net/tor/slides-codecon04/ [codecon slides] |
|
RE: Onion Routing 2.0: tor by Acidus at 5:03 pm EDT, Sep 7, 2004 |
] The complex version: Onion Routing is a connection-oriented ] anonymizing communication service. Users choose a ] source-routed path through a set of nodes, and negotiate a ] "virtual circuit" through the network, in which each node ] knows its predecessor and successor, but no others. Traffic ] flowing down the circuit is unwrapped by a symmetric key at ] each node, which reveals the downstream node. What about traffic analysis? While I don't know much about this, I had a talk about this very same thing with Decius not too long ago. Don't you need some type of anonymous cloud takes and "holds" your request for some random length of time? That way if enough people are inject requests into the cloud, there is no way to match an incoming transmition cloud with one leaving the cloud. |
|
| |
RE: Onion Routing 2.0: tor by bmitchell at 12:55 am EDT, Sep 8, 2004 |
Acidus wrote: ] ] The complex version: Onion Routing is a connection-oriented ] ] anonymizing communication service. Users choose a ] ] source-routed path through a set of nodes, and negotiate a ] ] "virtual circuit" through the network, in which each node ] ] knows its predecessor and successor, but no others. Traffic ] ] flowing down the circuit is unwrapped by a symmetric key at ] ] each node, which reveals the downstream node. ] ] What about traffic analysis? While I don't know much about ] this, I had a talk about this very same thing with Decius not ] too long ago. Don't you need some type of anonymous cloud ] takes and "holds" your request for some random length of time? ] That way if enough people are inject requests into the cloud, ] there is no way to match an incoming transmition cloud with ] one leaving the cloud. It's a performance tradeoff, and it is thought that even the typical padding and reordering is not sufficient. The design document has this to say: No mixing, padding, or traffic shaping (yet): Onion Routing originally called for batching and reordering cells as they arrived, assumed padding between ORs, and in later designs added padding between onion proxies (users) and ORs [27,41]. Tradeoffs between padding protection and cost were discussed, and traffic shaping algorithms were theorized [49] to provide good security without expensive padding, but no concrete padding scheme was suggested. Recent research [1] and deployment experience [4] suggest that this level of resource use is not practical or economical; and even full link padding is still vulnerable [33]. Thus, until we have a proven and convenient design for traffic shaping or low-latency mixing that improves anonymity against a realistic adversary, we leave these strategies out. They suggest (but dont say outright) that reordering & batching may occur at some point. It would certainly give me more warm fuzzies if it did. http://freehaven.net/tor/cvs/doc/design-paper/tor-design.html makes for an interesting read... |
|
| |
RE: Onion Routing 2.0: tor by jlang at 3:44 pm EST, Jan 7, 2005 |
Acidus wrote: ] ] The complex version: Onion Routing is a connection-oriented ] ] anonymizing communication service. Users choose a ] ] source-routed path through a set of nodes, and negotiate a ] ] "virtual circuit" through the network, in which each node ] ] knows its predecessor and successor, but no others. Traffic ] ] flowing down the circuit is unwrapped by a symmetric key at ] ] each node, which reveals the downstream node. ] ] What about traffic analysis? While I don't know much about ] this, I had a talk about this very same thing with Decius not ] too long ago. Don't you need some type of anonymous cloud ] takes and "holds" your request for some random length of time? ] That way if enough people are inject requests into the cloud, ] there is no way to match an incoming transmition cloud with ] one leaving the cloud. It's a performance tradeoff, and it is thought that even the typical padding and reordering is not sufficient. The design document has this to say: No mixing, padding, or traffic shaping (yet): Onion Routing originally called for batching and reordering cells as they arrived, assumed padding between ORs, and in later designs added padding between onion proxies (users) and ORs [27,41]. Tradeoffs between padding protection and cost were discussed, and traffic shaping algorithms were theorized [49] to provide good security without expensive padding, but no concrete padding scheme was suggested. Recent research [1] and deployment experience [4] suggest that this level of resource use is not practical or economical; and even full link padding is still vulnerable [33]. Thus, until we have a proven and convenient design for traffic shaping or low-latency mixing that improves anonymity against a realistic adversary, we leave these strategies out. They suggest (but dont say outright) that reordering & batching may occur at some point. It would certainly give me more warm fuzzies if it did. http://freehaven.net/tor/cvs/doc/design-paper/tor-design.html makes for an interesting read... |
|
|
|