Quick question about TOR and use of SSL

Chris Burge burgechris at gmail.com
Fri May 16 21:18:42 UTC 2008


ok...thanks for the clarification.  I thought that "tunnel" meant less hops
but that was a misunderstanding on my part.  So it all comes down to the bit
encryption per packet.

Thanks!
Chris

On Fri, May 16, 2008 at 4:28 PM, yousifnet <yousifnet at gmail.com> wrote:

> > First, my understanding of SSL is that it creates a direct tunnel from
> > your computer to the web server (or router if the SSL certificate is
> bound to
> > somthing like a load-balancing router).  If this is correct, wouldn't
> this "short
> > circuit" the TOR purpose of obfuscation?
>
> [Normal SSL]
> A) user sends encrypted message to proxy
> B) proxy forwards the message to the server
> C) server responds with another encrypted message to the proxy
> D) proxy forwards the encrypted message to the user
> E) proxy can't read or change anything in between
>
> USER  <<===>>   PROXY <<===>>  SERVER
>
> [Tor with SSL]
> A) Same as above. The proxy can be more than one server(two, three
> servers,etc.)
> B) proxies still can't read anything (semi-redundant but that's another
> story)
>
> USER <<==>> PROXY1<<==>> PROXY2 <<==>> PROXY3 <<==>> SERVER
>



-- 
Interested in selling your home? Ask me!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080516/d8693bcc/attachment.htm>


More information about the tor-talk mailing list