Add goals to rendezvous pts; other cleanups

svn:r701
This commit is contained in:
Nick Mathewson 2003-11-01 03:44:13 +00:00
parent ca95bd8a23
commit b6d8d458f3

View File

@ -780,7 +780,7 @@ delays, users construct circuits preemptively. To limit linkability
among the streams, users rotate connections by building a new circuit among the streams, users rotate connections by building a new circuit
periodically (currently every minute) if the previous one has been periodically (currently every minute) if the previous one has been
used, and expire old used circuits that are no longer in use. Thus used, and expire old used circuits that are no longer in use. Thus
even very active users spend a negligible amount of time and CPU in even heavy users spend a negligible amount of time and CPU in
building circuits, but only a limited number of requests can be linked building circuits, but only a limited number of requests can be linked
to each other by a given exit node. Also, because circuits are built to each other by a given exit node. Also, because circuits are built
in the background, failed routers do not affects user experience. in the background, failed routers do not affects user experience.
@ -1368,9 +1368,32 @@ the IP of that service. One motivation for location privacy is to provide
protection against DDoS attacks: attackers are forced to attack the protection against DDoS attacks: attackers are forced to attack the
onion routing network as a whole rather than just Bob's IP. onion routing network as a whole rather than just Bob's IP.
We provide this censorship resistance for Bob by allowing him to \subsection{Goals for rendezvous points}
advertise several onion routers (his \emph{Introduction Points}) as his \label{subsec:rendezvous-goals}
public location. Alice, the client, chooses a node for her \emph{Meeting In addition to our other goals, have tried to provide the following
properties in our design for location-hidden servers:
\begin{tightlist}
\item[Flood-proof:] An attacker should not be able to flood Bob with traffic
simply by sending may requests to Bob's public location. Thus, Bob needs a
way to filter incoming requests.
\item[Robust:] Bob should be able to maintain a long-term pseudonymous
identity even in the presence of OR failure. Thus, Bob's identity must not
be tied to a single OR.
\item[Smear-resistant:] An attacker should not be able to use rendezvous
points to smear an OR. That is, if a social attacker tries to host a
location-hidden service that is illegal or disreputable, it should not
appear---even to a casual observer---that the OR is hosting that service.
\item[Application-transparent:] Although we are willing to require users to
run special software to access location-hidden servers, we are not willing
to require them to modify their applications.
\end{tightlist}
\subsection{Rendezvous design}
We provide location-hiding for Bob by allowing him to advertise several onion
routers (his \emph{Introduction Points}) as his public location. (He may do
this on any robust efficient distributed key-value lookup system with
authenticated updates, such as CFS \cite{cfs:sosp01}.)
Alice, the client, chooses a node for her \emph{Meeting
Point}. She connects to one of Bob's introduction points, informs him Point}. She connects to one of Bob's introduction points, informs him
about her rendezvous point, and then waits for him to connect to the about her rendezvous point, and then waits for him to connect to the
rendezvous rendezvous
@ -1441,9 +1464,7 @@ rendezvous system.
For each service Bob offers, he configures his local onion proxy to know For each service Bob offers, he configures his local onion proxy to know
the local IP and port of the server, a strategy for authorizating Alices, the local IP and port of the server, a strategy for authorizating Alices,
and a public key. We assume the existence of a robust decentralized and a public key. (Each onion router could run a node in this lookup
efficient lookup system which allows authenticated updates, eg
\cite{cfs:sosp01}. (Each onion router could run a node in this lookup
system; also note that as a stopgap measure, we can just run a simple system; also note that as a stopgap measure, we can just run a simple
lookup system on the directory servers.) Bob publishes into the DHT lookup system on the directory servers.) Bob publishes into the DHT
(indexed by the hash of the public key) the public key, an expiration (indexed by the hash of the public key) the public key, an expiration
@ -1557,7 +1578,9 @@ a reformation intersection attack. Ahhh! I gotta stop thinking
about this and work on the paper some before the family wakes up. about this and work on the paper some before the family wakes up.
On Sat, Oct 25, 2003 at 06:57:12AM -0400, Paul Syverson wrote: On Sat, Oct 25, 2003 at 06:57:12AM -0400, Paul Syverson wrote:
> Which... if there were even a moderate number of bad nodes in the > Which... if there were even a moderate number of bad nodes in the
> network would make it advantageous to break the connection to conduct > a reformation intersection attack. Ahhh! I gotta stop thinking > about this and work on the paper some before the family wakes up. > network would make it advantageous to break the connection to conduct
> a reformation intersection attack. Ahhh! I gotta stop thinking
> about this and work on the paper some before the family wakes up.
This is the sort of issue that should go in the 'maintaining anonymity This is the sort of issue that should go in the 'maintaining anonymity
with tor' section towards the end. :) with tor' section towards the end. :)
Email from between roger and me to beginning of section above. Fix and move. Email from between roger and me to beginning of section above. Fix and move.
@ -1792,6 +1815,8 @@ deploying a wider network. We will see what happens!
% Style guide: % Style guide:
% U.S. spelling % U.S. spelling
% avoid contractions (it's, can't, etc.) % avoid contractions (it's, can't, etc.)
% prefer ``for example'' or ``such as'' to e.g.
% prefer ``that is'' to i.e.
% 'mix', 'mixes' (as noun) % 'mix', 'mixes' (as noun)
% 'mix-net' % 'mix-net'
% 'mix', 'mixing' (as verb) % 'mix', 'mixing' (as verb)
@ -1801,7 +1826,7 @@ deploying a wider network. We will see what happens!
% 'Cypherpunk', 'Cypherpunks', 'Cypherpunk remailer' % 'Cypherpunk', 'Cypherpunks', 'Cypherpunk remailer'
% 'Onion Routing design', 'onion router' [note capitalization] % 'Onion Routing design', 'onion router' [note capitalization]
% 'SOCKS' % 'SOCKS'
% % Try not to use \cite as a noun.
% %
% 'Substitute ``Damn'' every time you're inclined to write ``very;'' your % 'Substitute ``Damn'' every time you're inclined to write ``very;'' your
% editor will delete it and the writing will be just as it should be.' % editor will delete it and the writing will be just as it should be.'