clean up our references some more

svn:r3483
This commit is contained in:
Roger Dingledine 2005-01-31 09:09:15 +00:00
parent 2fa4b77735
commit f80734d590
2 changed files with 66 additions and 15 deletions

View File

@ -159,7 +159,7 @@ SOCKS (see section \ref{subsec:tcp-vs-ip}).
Tor differs from other deployed systems for traffic analysis resistance
in its security and flexibility. Mix networks such as
Mixmaster~\cite{mixmaster} or its successor Mixminion~\cite{minion-design}
Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
gain the highest degrees of anonymity at the expense of introducing highly
variable delays, thus making them unsuitable for applications such as web
browsing that require quick response times. Commercial single-hop
@ -206,7 +206,7 @@ Tor is not the only anonymity system that aims to be practical and useful.
Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
open proxies around the Internet~\cite{open-proxies}, can provide good
performance and some security against a weaker attacker. Dresden's Java
Anon Proxy~\cite{jap} provides similar functionality to Tor but only
Anon Proxy~\cite{web-mix} provides similar functionality to Tor but only
handles web browsing rather than arbitrary TCP. Also, JAP's network
topology uses cascades (fixed routes through the network); since without
end-to-end padding it is just as vulnerable as Tor to end-to-end timing
@ -219,8 +219,8 @@ that it could transport arbitrary IP packets, and it also supported
pseudonymous access rather than just anonymous access; but it had
a different approach to sustainability (collecting money from users
and paying ISPs to run servers), and has shut down due to financial
load. Finally, more scalable designs like Tarzan~\cite{tarzan} and
MorphMix~\cite{morphmix} have been proposed in the literature, but
load. Finally, more scalable designs like Tarzan~\cite{tarzan:ccs02} and
MorphMix~\cite{morphmix:fc04} have been proposed in the literature, but
have not yet been fielded. We direct the interested reader to Section
2 of~\cite{tor-design} for a more indepth review of related work.
@ -531,7 +531,7 @@ approach that can provide security despite
packet loss and out-of-order delivery. Freedom allegedly had one, but it was
never publicly specified, and we believe it's likely vulnerable to tagging
attacks \cite{tor-design}. Also, TLS over UDP is not implemented or even
specified, though some early work has begun on that \cite{ben-tls-udp}.
specified, though some early work has begun on that \cite{dtls}.
\item \emph{We'll still need to tune network parameters}. Since the above
encryption system will likely need sequence numbers and maybe more to do
replay detection, handle duplicate frames, etc, we will be reimplementing
@ -593,11 +593,11 @@ granularity. If servers forward these chunks in roughly synchronous
fashion, it will increase the similarity of data stream timing
signatures. By experimenting with the granularity of data chunks and
of synchronization we can attempt once again to optimize for both
usability and anonymity. Unlike in \cite{sync-batch}, it may be
usability and anonymity. Unlike in \cite{sync-batching}, it may be
impractical to synchronize on network batches by dropping chunks from
a batch that arrive late at a given node---unless Tor moves away from
stream processing to a more loss-tolerant processing of traffic (cf.\
section~\ref{subsec:stream-vs-packet}). In other words, there would
Section~\ref{subsec:stream-vs-packet}). In other words, there would
probably be no direct attempt to synchronize on batches of data
entering the Tor network at the same time. Rather, it is the link
level batching that will add noise to the traffic patterns exiting the
@ -918,6 +918,7 @@ style doesn't work because we don't want just *one* path. Point to
Geoff's stuff.
\subsection{Location diversity and ISP-class adversaries}
\label{subsec:routing-zones}
Anonymity networks have long relied on diversity of node location for
protection against attacks---typically an adversary who can observe a
@ -930,7 +931,7 @@ distributed trust to spread each transaction over multiple jurisdictions.
But how do we decide whether two nodes are in related locations?
Feamster and Dingledine defined a \emph{location diversity} metric
in \cite{routing-zones}, and began investigating a variant of location
in \cite{feamster:wpes2004}, and began investigating a variant of location
diversity based on the fact that the Internet is divided into thousands of
independently operated networks called {\em autonomous systems} (ASes).
The key insight from this paper is that while we typically think of a
@ -954,8 +955,8 @@ Many open questions remain. First, it will be an immense engineering
challenge to get an entire BGP routing table to each Tor client, or at
least summarize it sufficiently. Without a local copy, clients won't be
able to safely predict what ASes will be traversed on the various paths
through the Tor network to the final destination. Tarzan~\cite{tarzan}
and MorphMix~\cite{morphmix} suggest that we compare IP prefixes to
through the Tor network to the final destination. Tarzan~\cite{tarzan:ccs02}
and MorphMix~\cite{morphmix:fc04} suggest that we compare IP prefixes to
determine location diversity; but the above paper showed that in practice
many of the Mixmaster nodes that share a single AS have entirely different
IP prefixes. When the network has scaled to thousands of nodes, does IP
@ -1011,7 +1012,7 @@ addresses (or having them donated), abandoning old addresses as they are
anonymizing networks again have an advantage here, in that we already
have tens of thousands of separate IP addresses whose users might
volunteer to provide this service since they've already installed and use
the software for their own privacy~\cite{koepsell-wpes2004}. Because
the software for their own privacy~\cite{koepsell:wpes2004}. Because
the Tor protocol separates routing from network discovery (see Section
\ref{do-we-discuss-this?}), volunteers could configure their Tor clients
to generate server descriptors and send them to a special directory

View File

@ -141,18 +141,18 @@
title = {Timing Analysis in Low-Latency Mix-Based Systems},
author = {Brian N. Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
booktitle = {Financial Cryptography},
year = {2004},
year = {2004},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS (forthcoming)},
publisher = {Springer-Verlag, LNCS (forthcoming)},
}
@inproceedings{morphmix:fc04,
title = {Practical Anonymity for the Masses with MorphMix},
author = {Marc Rennhard and Bernhard Plattner},
booktitle = {Financial Cryptography},
year = {2004},
year = {2004},
editor = {Ari Juels},
publisher = {Springer-Verlag, LNCS (forthcoming)},
publisher = {Springer-Verlag, LNCS (forthcoming)},
}
@inproceedings{eternity,
@ -1116,6 +1116,56 @@
note = {\url{http://students.cs.tamu.edu/xinwenfu/paper/PET04.pdf}},
}
@InProceedings{danezis-pet2004,
author = "George Danezis",
title = "The Traffic Analysis of Continuous-Time Mixes",
booktitle= {Privacy Enhancing Technologies (PET 2004)},
editor = {David Martin and Andrei Serjantov},
month = {May},
year = {2004},
series = {LNCS},
note = {\url{http://www.cl.cam.ac.uk/users/gd216/cmm2.pdf}},
}
@inproceedings{feamster:wpes2004,
title = {Location Diversity in Anonymity Networks},
author = {Nick Feamster and Roger Dingledine},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
year = {2004},
month = {October},
address = {Washington, DC, USA},
note = {\url{http://freehaven.net/doc/routing-zones/routing-zones.ps}},
}
@inproceedings{koepsell:wpes2004,
title = {How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing},
author = {Stefan K\"opsell and Ulf Hilling},
booktitle = {{Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004)}},
year = {2004},
month = {October},
address = {Washington, DC, USA},
note = {\url{http://freehaven.net/anonbib/papers/p103-koepsell.pdf}},
}
@inproceedings{sync-batching,
title = {Synchronous Batching: From Cascades to Free Routes},
author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)},
year = {2004},
month = {May},
series = {LNCS},
note = {\url{http://freehaven.net/doc/sync-batching/sync-batching.pdf}},
}
@Misc{dtls,
author = {E. Rescorla and N. Modadugu},
title = {{Datagram Transport Layer Security}},
howpublished = {IETF Draft},
month = {December},
year = {2003},
note = {\url{http://www.ietf.org/internet-drafts/draft-rescorla-dtls-02.txt}},
}
%%% Local Variables:
%%% mode: latex
%%% TeX-master: "tor-design"