mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
a few more tweaks
svn:r3584
This commit is contained in:
parent
494d475d1e
commit
8abf1c6188
@ -794,11 +794,6 @@ time.
|
||||
%continued use of identification by IP number as long as there is no
|
||||
%workable alternative.
|
||||
|
||||
%Fortunately, our modular design separates
|
||||
%routing from node discovery; so we could implement Morphmix in Tor just
|
||||
%by implementing the Morphmix-specific node discovery and path selection
|
||||
%pieces.
|
||||
|
||||
%[XXX Mention correct DNS-RBL implementation. -NM]
|
||||
|
||||
\section{Design choices}
|
||||
@ -942,14 +937,14 @@ order). Using randomized path lengths may help some, since the attacker
|
||||
will never be certain he has identified all nodes in the path, but as
|
||||
long as the network remains small this attack will still be feasible.
|
||||
|
||||
Helper nodes also help Tor clients, because choosing entry and exit points
|
||||
Helper nodes also aim to help Tor clients, because choosing entry and exit points
|
||||
randomly and changing them frequently allows an attacker who controls
|
||||
even a few nodes to eventually link some of their destinations. The goal
|
||||
is to take the risk once and for all about choosing a bad entry node,
|
||||
rather than taking a new risk for each new circuit. (Choosing fixed
|
||||
exit nodes is less useful, since even an honest exit node still doesn't
|
||||
protect against a hostile website.) But obstacles still remain before
|
||||
we can implement helper nodes.
|
||||
we can implement them.
|
||||
For one, the literature does not describe how to choose helpers from a list
|
||||
of nodes that changes over time. If Alice is forced to choose a new entry
|
||||
helper every $d$ days and $c$ of the $n$ nodes are bad, she can expect
|
||||
@ -1325,7 +1320,7 @@ much traffic they have been able to transfer recently) and include this
|
||||
information in the descriptors they upload to the directory. Clients
|
||||
choose servers weighted by their bandwidth, neglecting really slow
|
||||
servers and capping the influence of really fast ones.
|
||||
|
||||
%
|
||||
This is, of course, eminently cheatable. A malicious node can get a
|
||||
disproportionate amount of traffic simply by claiming to have more bandwidth
|
||||
than it does. But better mechanisms have their problems. If bandwidth data
|
||||
|
Loading…
Reference in New Issue
Block a user