[or-cvs] Edits to section 9

Nick Mathewson nickm at seul.org
Tue Nov 4 08:30:13 UTC 2003


Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv28014

Modified Files:
	tor-design.tex 
Log Message:
Edits to section 9

Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -d -r1.95 -r1.96
--- tor-design.tex	4 Nov 2003 08:16:25 -0000	1.95
+++ tor-design.tex	4 Nov 2003 08:30:10 -0000	1.96
@@ -1374,11 +1374,6 @@
 %     enable us to accept a lot more ORs than if we continue to
 %     require 10mbit connections for all ORs. -RD
 
-% XXX In sec9, we should note that we are currently
-%     working with the designers of MorphMix to render our two systems
-%     interoperable. So far, this seems to be relatively straightforward.
-%     Interoperability will allow testing and direct comparison of the two
-%     rather different designs.
   
 Below we summarize a variety of attacks, and discuss how well our
 design withstands them.
@@ -1885,14 +1880,14 @@
 these bottlenecks.
 
 \emph{Cover traffic:} Currently we avoid cover traffic because
-of its clear costs in performance and bandwidth, and because its
+whereas its costs in performance and bandwidth are clear, and because its
 security benefits are not well understood. With more research
-\cite{SS03,defensive-dropping}, the price/value ratio may change,
+\cite{SS03,defensive-dropping}, this price/value ratio may change,
 both for link-level cover traffic and also long-range cover traffic.
 
 \emph{Better directory distribution:} Even with the threshold
 directory agreement algorithm described in Section~\ref{subsec:dirservers},
-the directory servers are still trust bottlenecks. We must find more
+directory distribution is still performance-critical. We must find more
 decentralized yet practical ways to distribute up-to-date snapshots of
 network status without introducing new attacks.  Also, directory
 retrieval presents a scaling problem, since clients currently
@@ -1908,14 +1903,21 @@
 issues that must be resolved, both in terms of usability and anonymity.
 
 \emph{Further specification review:} Although we have a public,
-byte-level specification for the Tor protocols, this protocol has
+byte-level specification for the Tor protocols, this document has
 not received extensive external review.  We hope that as Tor
-becomes more widely deployed, more people will become interested in
-examining our specification.
+becomes more widely deployed, more people will examine its
+specification.
+
+\emph{Multisystem interoperability:} We are currently working with the
+designers of MorphMix to make the common elements of our two systems
+share a common specification and implementation. So far, this seems
+to be relatively straightforward.  Interoperability will allow testing
+and direct comparison of the two designs for trust and scalability.
+% XXXX Bandwidth classes.
 
 \emph{Wider-scale deployment:} The original goal of Tor was to
 gain experience in deploying an anonymizing overlay network, and
-learn from having actual users.  We are now at the point in design
+learn from having actual users.  We are now at a point in design
 and development where we can start deploying a wider network.  Once
 we have many actual users, we will doubtlessly be better
 able to evaluate some of our design decisions, including our
@@ -1923,7 +1925,6 @@
 cell size), our abuse-prevention mechanisms, and
 our overall usability.
 % XXX large and small cells on same network.
-% XXX work with morphmix spec
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 



More information about the tor-commits mailing list