switch the paper over to llncs

svn:r3415
This commit is contained in:
Roger Dingledine 2005-01-22 08:35:01 +00:00
parent 32075fc78b
commit 64a0c85a86
2 changed files with 1065 additions and 2 deletions

View File

@ -1,8 +1,24 @@
\documentclass[twocolumn]{article}
\documentclass{llncs}
\usepackage{url}
\usepackage{amsmath}
\usepackage{epsfig}
\newenvironment{tightlist}{\begin{list}{$\bullet$}{
\setlength{\itemsep}{0mm}
\setlength{\parsep}{0mm}
% \setlength{\labelsep}{0mm}
% \setlength{\labelwidth}{0mm}
% \setlength{\topsep}{0mm}
}}{\end{list}}
\begin{document}
\title{Challenges in bringing low-latency stream anonymity to the masses (DRAFT)}
\begin{document}
\author{Roger Dingledine and Nick Mathewson}
\institute{The Free Haven Project\\
\email{\{arma,nickm\}@freehaven.net}}
\section{Introduction}
@ -172,5 +188,36 @@ assuming that, how much anonymity can we get. we're not here to model or
to simulate or to produce equations and formulae. but those have their
roles too.
%%%
TCP vs UDP
argument 1: we need to do IP-level packet normalization, to block things like ip
fingerprinting.
argument 2: we still need to be easy to integrate with applications, so they can do
application-level scrubbing.
argument 3: we need a block-level encryption approach that can provide security despite
packet loss and out-of-order delivery. i believe you that such a thing can be created,
but no thing has yet been specified. so specify it for me if you want me to believe it.
(freedom and cebolla are vulnerable to tagging and malleability attacks i believe.)
argument 4: we still need to play with parameters for throughput, congestion control,
etc -- since we need sequence numbers and maybe more to do replay detection,
and just to handle duplicate frames. so we would be reimplementing some subset of tcp
anyway.
argument 5: tls over udp is not implemented or even specified.
argument 6: exit policies over arbitrary IP packets seems to be an IDS-hard problem. i
don't want to build an IDS into tor.
argument 7: certain protocols are going to leak information at the IP layer anyway. for
example, if we anonymizer your dns requests, but they still go to comcast's dns servers,
that's bad.
argument 8: hidden services, .exit addresses, etc are broken unless we have some way to
reach into the application-level protocol and decide the hostname it's trying to get.
\bibliographystyle{plain} \bibliography{tor-design}
\end{document}

1016
doc/design-paper/llncs.cls Normal file

File diff suppressed because it is too large Load Diff