mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-10 13:13:44 +01:00
more minor commits
svn:r726
This commit is contained in:
parent
2bd41ec8f5
commit
e4e5bc601e
@ -948,14 +948,17 @@ use IP-based authentication (such as institutional mail or web servers)
|
||||
can be fooled by the fact that anonymous connections appear to originate
|
||||
at the exit OR.
|
||||
|
||||
We stress that Tor does not enable any new class of abuse. Spammers and
|
||||
other attackers already have access to thousands of misconfigured systems
|
||||
worldwide, and the Tor network is far from the easiest way to launch
|
||||
these antisocial or illegal attacks. But because the onion routers can
|
||||
easily be mistaken for the originators of the abuse, and the volunteers
|
||||
who run them may not want to deal with the hassle of repeatedly explaining
|
||||
anonymity networks, we must block or limit attacks and other abuse that
|
||||
travel through the Tor network.
|
||||
We stress that Tor does not enable any new class of abuse. Spammers
|
||||
and other attackers already have access to thousands of misconfigured
|
||||
systems worldwide, and the Tor network is far from the easiest way
|
||||
to launch these antisocial or illegal attacks. Indeed, Tor's limited
|
||||
anonymity may be a benefit here, because large determined adversaries
|
||||
may still be able to track down criminals. In any case, because the
|
||||
%XXX
|
||||
onion routers can easily be mistaken for the originators of the abuse,
|
||||
and the volunteers who run them may not want to deal with the hassle of
|
||||
repeatedly explaining anonymity networks, we must block or limit attacks
|
||||
and other abuse that travel through the Tor network.
|
||||
|
||||
To mitigate abuse issues, in Tor, each onion router's \emph{exit policy}
|
||||
describes to which external addresses and ports the router will permit
|
||||
@ -1123,10 +1126,9 @@ central point.
|
||||
|
||||
Rendezvous points are a building block for \emph{location-hidden
|
||||
services} (also known as ``responder anonymity'') in the Tor
|
||||
network. Location-hidden services allow a server Bob to offer a TCP
|
||||
service, such as a webserver, without revealing the IP of his service.
|
||||
Besides allowing Bob to provided services anonymously, location
|
||||
privacy also seeks to provide some protection against distributed DoS attacks:
|
||||
network. Location-hidden services allow Bob to offer a TCP
|
||||
service, such as a webserver, without revealing its IP.
|
||||
We are also motivated by protection against distributed DoS attacks:
|
||||
attackers are forced to attack the onion routing network as a whole
|
||||
rather than just Bob's IP.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user