[or-cvs] first draft of a conclusion / future works

Roger Dingledine arma at seul.org
Tue Oct 21 04:27:57 UTC 2003

Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-design.bib tor-design.tex 
Log Message:
first draft of a conclusion / future works

Index: tor-design.bib
RCS file: /home/or/cvsroot/doc/tor-design.bib,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -d -r1.3 -r1.4
--- tor-design.bib	21 Oct 2003 01:11:29 -0000	1.3
+++ tor-design.bib	21 Oct 2003 04:27:54 -0000	1.4
@@ -703,6 +703,14 @@
   address = {Chateau Lake Louise, Banff, Canada},
+ at inproceedings{SS03,
+  title = {Passive Attack Analysis for Connection-Based Anonymity Systems}, 
+  author = {Andrei Serjantov and Peter Sewell}, 
+  booktitle = {Proceedings of ESORICS 2003}, 
+  year = {2003}, 
+  month = {October}, 
    author =      {P. Raghavan and C. Thompson},
    title =       {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},

Index: tor-design.tex
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -d -r1.10 -r1.11
--- tor-design.tex	21 Oct 2003 01:11:29 -0000	1.10
+++ tor-design.tex	21 Oct 2003 04:27:54 -0000	1.11
@@ -578,18 +578,73 @@
 Below we summarize a variety of attacks and how well our design withstands
+\item \textbf{Passive attacks}
+\item \emph{Simple observation.}
+\item \emph{Timing correlation.}
+\item \emph{Size correlation.}
+\item \emph{Option distinguishability.}
+\item \textbf{Active attacks}
+\item \emph{Key compromise.}
+\item \emph{Iterated subpoena.}
+\item \emph{Run recipient.}
+\item \emph{Run a hostile node.}
+\item \emph{Compromise entire path.}
+\item \emph{Selectively DoS servers.}
+\item \emph{Introduce timing into messages.}
+\item \emph{Tagging attacks.}
+\item \textbf{Directory attacks}
+\item foo
 \Section{Future Directions and Open Problems}
-Tor brings together many innovations from many different projects into
+Tor brings together many innovations into
 a unified deployable system. But there are still several attacks that
 work quite well, as well as a number of sustainability and run-time
 issues remaining to be ironed out. In particular:
-\item foo
+\item \emph{Scalability:} Since Tor's emphasis currently is on simplicity
+of design and deployment, the current design won't easily handle more
+than a few hundred servers, because of its clique topology. Restricted
+route topologies \cite{danezis:pet2003} promise comparable anonymity
+with much better scaling properties, but we must solve problems like
+how to randomly form the network without introducing net attacks.
+\item \emph{Cover traffic:} Currently we avoid cover traffic because
+it introduces clear performance and bandwidth costs, but and its
+security properties are not well understood. With more research
+\cite{SS03,defensive-dropping}, the price/value ratio may change, both for
+link-level cover traffic and also long-range cover traffic. In particular,
+we expect restricted route topologies to reduce the cost of cover traffic
+because there are fewer links to cover.
+\item \emph{Better directory distribution:} Even with the threshold
+directory agreement algorithm described in \ref{sec:dirservers},
+the directory servers are still trust bottlenecks. We must find more
+decentralized yet practical ways to distribute up-to-date snapshots of
+network status without introducing new attacks.
+\item \emph{Implementing location-hidden servers:} While Section
+\ref{sec:rendezvous} provides a design for rendezvous points and
+location-hidden servers, this feature has not yet been implemented.
+We will likely encounter additional issues, both in terms of usability
+and anonymity, that must be resolved.
+\item \emph{Wider-scale deployment:} The original goal of Tor was to
+gain experience in deploying an anonymizing overlay network, and learn
+from having actual users. We are now at the point where we can start
+deploying a wider network. We will see what happens!
+% ok, so that's hokey. fix it. -RD

More information about the tor-commits mailing list