[or-cvs] r8920: touchups. hope i didn't clobber too much of nick's plans. (tor/trunk/doc/design-paper)

arma at seul.org arma at seul.org
Wed Nov 8 07:34:44 UTC 2006


Author: arma
Date: 2006-11-08 02:34:42 -0500 (Wed, 08 Nov 2006)
New Revision: 8920

Modified:
   tor/trunk/doc/design-paper/blocking.tex
Log:
touchups. hope i didn't clobber too much of nick's plans.


Modified: tor/trunk/doc/design-paper/blocking.tex
===================================================================
--- tor/trunk/doc/design-paper/blocking.tex	2006-11-07 16:52:01 UTC (rev 8919)
+++ tor/trunk/doc/design-paper/blocking.tex	2006-11-08 07:34:42 UTC (rev 8920)
@@ -60,8 +60,8 @@
 attacker who monitors the user (call her Alice) and tries to discover her
 activities, yet lets her reach any piece of the network. In more modern
 threat models such as Tor's, the adversary is allowed to perform active
-attacks such as modifying communications in hopes of tricking Alice
-into revealing her destination, or intercepting some of her connections
+attacks such as modifying communications to trick Alice
+into revealing her destination, or intercepting some connections
 to run a man-in-the-middle attack. But these systems still assume that
 Alice can eventually reach the anonymizing network.
 
@@ -108,8 +108,7 @@
 unanticipated oppressive situations. In fact, by designing with
 a variety of adversaries in mind, we can take advantage of the fact that
 adversaries will be in different stages of the arms race at each location,
-and thereby retain partial utility in servers even when they are blocked
-by some of the adversaries.
+so a server blocked in one locale can still be useful in others.
 
 We assume there are three main network attacks in use by censors
 currently~\cite{clayton:pet2006}:
@@ -124,8 +123,8 @@
 \end{tightlist}
 
 We assume the network firewall has limited CPU and memory per
-connection~\cite{clayton:pet2006}. Against an adversary who spends
-hours looking through the contents of each packet, we would need
+connection~\cite{clayton:pet2006}. Against an adversary who carefully
+examines the contents of every packet, we would need
 some stronger mechanism such as steganography, which introduces its
 own problems~\cite{active-wardens,tcpstego,bar}.
 
@@ -303,7 +302,7 @@
 components: a relay component and a discovery component. The relay part
 encompasses the process of establishing a connection, sending traffic
 back and forth, and so on---everything that's done once the user knows
-where he's going to connect. Discovery is the step before that: the
+where she's going to connect. Discovery is the step before that: the
 process of finding one or more usable relays.
 
 For example, we can divide the pieces of Tor in the previous section
@@ -316,7 +315,8 @@
 
 Existing commercial anonymity solutions (like Anonymizer.com) are based
 on a set of single-hop proxies. In these systems, each user connects to
-a single proxy, which then relays the user's traffic. These public proxy
+a single proxy, which then relays traffic between the user and her
+destination. These public proxy
 systems are typically characterized by two features: they control and
 operate the proxies centrally, and many different users get assigned
 to each proxy.
@@ -393,8 +393,9 @@
 cases he's just out of luck. Just as hard, how does a new volunteer in
 Ohio find a person in China who needs it?
 
-%discovery is also hard because the hosts keep vanishing if they're
-%on dynamic ip. But not so bad, since they can use dyndns addresses.
+% another key feature of a proxy run by your uncle is that you
+% self-censor, so you're unlikely to bring abuse complaints onto
+% your uncle. self-censoring clearly has a downside too, though.
 
 This challenge leads to a hybrid design---centrally-distributed
 personal proxies---which we will investigate in more detail in
@@ -467,7 +468,7 @@
 that improves blocking-resistance---see Section~\ref{subsec:publicity}
 for more discussion.)
 
-The broader explanation is that  the maintainance of most government-level
+The broader explanation is that the maintainance of most government-level
 filters is aimed at stopping widespread information flow and appearing to be
 in control, not by the impossible goal of blocking all possible ways to bypass
 censorship. Censors realize that there will always
@@ -690,6 +691,9 @@
 variety of protocols, and we'll want to automatically handle web browsing
 differently from, say, instant messaging.
 
+% Tor cells are 512 bytes each. So TLS records will be roughly
+% multiples of this size? How bad is this?
+
 \subsection{Identity keys as part of addressing information}
 
 We have described a way for the blocked user to bootstrap into the
@@ -751,7 +755,7 @@
 
 There are some variations on bootstrapping in this design. In the simple
 case, the operator of the bridge informs each chosen user about his
-bridge's address information and/or keys. Another approach involves
+bridge's address information and/or keys. A different approach involves
 blocked users introducing new blocked users to the bridges they know.
 That is, somebody in the blocked area can pass along a bridge's address to
 somebody else they trust. This scheme brings in appealing but complex game
@@ -777,14 +781,13 @@
 (or coordinate with other bridge volunteers), such that some fraction
 of the bridges are likely to be available at any given time.
 
-The blocked user's Tor client could periodically fetch an updated set of
+The blocked user's Tor client would periodically fetch an updated set of
 recommended bridges from any of the working bridges. Now the client can
 learn new additions to the bridge pool, and can expire abandoned bridges
 or bridges that the adversary has blocked, without the user ever needing
-to care. To simplify maintenance of the community's bridge pool, rather
-than mirroring all of the information at each bridge, each community
-could instead run its own bridge directory authority (accessed via the
-available bridges),
+to care. To simplify maintenance of the community's bridge pool, each
+community could run its own bridge directory authority---accessed via
+the available bridges, or mirrored at each bridge.
 
 \subsection{Social networks with directory-side support}
 
@@ -1002,7 +1005,12 @@
 The above geoip-based approach to detecting blocked bridges gives us a
 solution though.
 
+\subsection{Advantages of deploying all solutions at once}
 
+For once we're not in the position of the defender: we don't have to
+defend against every possible filtering scheme, we just have to defend
+against at least one.
+
 \section{Security considerations}
 \label{sec:security}
 
@@ -1059,6 +1067,11 @@
 about. For most users, we don't think running a bridge relay will be
 that damaging.
 
+Need to examine how entry guards fit in. If the blocked user doesn't use
+the bridge's entry guards, then the bridge doesn't gain as much cover
+benefit. If he does, first how does that actually work, and second is
+it turtles all the way down (need to use the guard's guards, ...)?
+
 \subsection{Trusting local hardware: Internet cafes and LiveCDs}
 \label{subsec:cafes-and-livecds}
 
@@ -1201,8 +1214,11 @@
 
 \subsection{What if the clients can't install software?}
 
-Bridge users without Tor clients
+[this section should probably move to the related work section,
+or just disappear entirely.]
 
+Bridge users without Tor software
+
 Bridge relays could always open their socks proxy. This is bad though,
 first
 because bridges learn the bridge users' destinations, and second because
@@ -1217,6 +1233,10 @@
 to exit directly to websites. But it clearly drops some of the nice
 anonymity and security features Tor provides.
 
+A hybrid approach where the user gets his anonymity from Tor but his
+software-less use from a web proxy running on a trusted machine on the
+free side.
+
 \subsection{Publicity attracts attention}
 \label{subsec:publicity}
 
@@ -1258,6 +1278,13 @@
 
 \section{Conclusion}
 
+a technical solution won't solve the whole problem. after all, china's
+firewall is *socially* very successful, even if technologies exist to
+get around it.
+
+but having a strong technical solution is still useful as a piece of the
+puzzle.
+
 \bibliographystyle{plain} \bibliography{tor-design}
 
 \appendix



More information about the tor-commits mailing list