aboutsummaryrefslogtreecommitdiff
path: root/doc/design-paper
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2005-02-03 20:07:38 +0000
committerRoger Dingledine <arma@torproject.org>2005-02-03 20:07:38 +0000
commit82522ac5c845c98f46055d602fe632ea5ff26ca8 (patch)
tree8ff184c50a1e163d521fa40333fa7b90d8a6df17 /doc/design-paper
parente4b21c97f7ee21c5fb6c8bf6bac3133b2a7c22b9 (diff)
downloadtor-82522ac5c845c98f46055d602fe632ea5ff26ca8.tar
tor-82522ac5c845c98f46055d602fe632ea5ff26ca8.tar.gz
add a hidden-services section
svn:r3518
Diffstat (limited to 'doc/design-paper')
-rw-r--r--doc/design-paper/challenges.tex75
1 files changed, 45 insertions, 30 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex
index 63d4a6d83..4dea199f5 100644
--- a/doc/design-paper/challenges.tex
+++ b/doc/design-paper/challenges.tex
@@ -392,6 +392,10 @@ model the number of concurrent users does not seem to have much impact
on the anonymity provided, we suggest that JAP's anonymity meter is not
correctly communicating security levels to its users.
+% because more users don't help anonymity much, we need to rely more
+% on other incentive schemes, both policy-based (see sec x) and
+% technically enforced (see sec y)
+
On the other hand, while the number of active concurrent users may not
matter as much as we'd like, it still helps to have some other users
who use the network. We investigate this issue in the next section.
@@ -558,6 +562,9 @@ filesharing protocols that have separate control and data channels.
people back off, so we get more ops since there's less filesharing, so the
filesharers come back, etc.]
+in practice, plausible deniability is hypothetical and doesn't seem very
+convincing. if ISPs find the activity antisocial, they don't care *why*
+your computer is doing that behavior.
\subsection{Tor and blacklists}
@@ -980,12 +987,6 @@ Danezis-Murdoch attack at all.
We have to pick the path length so adversary can't distinguish client from
server (how many hops is good?).
-in practice, plausible deniability is hypothetical and doesn't seem very
-convincing. if ISPs find the activity antisocial, they don't care *why*
-your computer is doing that behavior.
-
-[arma will write this section]
-
\subsection{Helper nodes}
\label{subsec:helper-nodes}
@@ -1043,30 +1044,44 @@ force their users to switch helper nodes more frequently.
\subsection{Location-hidden services}
-[arma will write this section]
-
-Survivable services are new in practice, yes? Hidden services seem
-less hidden than we'd like, since they stay in one place and get used
-a lot. They're the epitome of the need for helper nodes. This means
-that using Tor as a building block for Free Haven is going to be really
-hard. Also, they're brittle in terms of intersection and observation
-attacks. Would be nice to have hot-swap services, but hard to design.
-
-people are using hidden services as a poor man's vpn and firewall-buster.
-rather than playing with dyndns and trying to pierce holes in their
-firewall (say, so they can ssh in from the outside), they run a hidden
-service on the inside and then rendezvous with that hidden service
-externally.
-
-in practice, sites like bloggers without borders (www.b19s.org) are
-running tor servers but more important are advertising a hidden-service
-address on their front page. doing this can provide increased robustness
-if they used the dual-IP approach we describe in tor-design, but in
-practice they do it to a) increase visibility of the tor project and their
-support for privacy, and b) to offer a way for their users, using vanilla
-software, to get end-to-end encryption and end-to-end authentication to
-their website.
-
+While most of the discussions about have been about forward anonymity
+with Tor, it also provides support for \emph{rendezvous points}, which
+let users provide TCP services to other Tor users without revealing
+their location. Since this feature is relatively recent, we describe here
+a couple of our early observations from its deployment.
+
+First, our implementation of hidden services seems less hidden than we'd
+like, since they are configured on a single client and get used over
+and over---particularly because an external adversary can induce them to
+produce traffic. They seem the ideal use case for our above discussion
+of helper nodes. This insecurity means that they may not be suitable as
+a building block for Free Haven~\cite{freehaven-berk} or other anonymous
+publishing systems that aim to provide long-term security.
+%Also, they're brittle in terms of intersection and observation attacks.
+
+\emph{Hot-swap} hidden services, where more than one location can
+provide the service and loss of any one location does not imply a
+change in service, would help foil intersection and observation attacks
+where an adversary monitors availability of a hidden service and also
+monitors whether certain users or servers are online. However, the design
+challenges in providing these services without otherwise compromising
+the hidden service's anonymity remain an open problem.
+
+In practice, hidden services are used for more than just providing private
+access to a web server or IRC server. People are using hidden services
+as a poor man's VPN and firewall-buster. Many people want to be able
+to connect to the computers in their private network via secure shell,
+and rather than playing with dyndns and trying to pierce holes in their
+firewall, they run a hidden service on the inside and then rendezvous
+with that hidden service externally.
+
+Also, sites like Bloggers Without Borders (www.b19s.org) are advertising
+a hidden-service address on their front page. Doing this can provide
+increased robustness if they use the dual-IP approach we describe in
+tor-design, but in practice they do it firstly to increase visibility
+of the tor project and their support for privacy, and secondly to offer
+a way for their users, using unmodified software, to get end-to-end
+encryption and end-to-end authentication to their website.
\subsection{Trust and discovery}