Question and Confirmation.

Robert Ransom rransom.8774 at gmail.com
Sun Jan 30 23:05:59 UTC 2011


On Sun, 30 Jan 2011 22:33:21 +0000
Matthew <pumpkin at cotse.net> wrote:

> On 30/01/11 02:32, andrew at torproject.org wrote:
> > On Fri, Jan 28, 2011 at 11:29:25PM +0000, pumpkin at cotse.net wrote 2.3K bytes in 53 lines about:
> > : My understanding is that Tor encrypts both the content of a data
> > : packet and also the header.  It encrypts the packet and header three
> > : times on the client (my computer) and then at each node one layer is
> > : decrypted until the data packet and header are decrypted to
> > : plaintext at the final exit node (except when TLS is used).  Right?
> >
> > Actually, tor wraps the original traffic in encryption and tunnels it
> > through the 3 hops of a circuit.  We do not touch the original data.

> Sorry....I'm not trying to be dumb but I'm unclear how your answer differs 
> from my assumption.
> 
> Tor takes all the data (header and content), encrypts it three times on the 
> client (me), and then at each node one layer is unencrypted OR is it all of 
> it unencrypted at the exit node?

Each relay removes one layer of encryption.

Tor does *not* encrypt and send packet headers.  Tor only relays the
data within a TCP connection.


Robert Ransom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 316 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20110130/f02770c3/attachment.pgp>


More information about the tor-talk mailing list