aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2003-11-03 00:52:50 +0000
committerNick Mathewson <nickm@torproject.org>2003-11-03 00:52:50 +0000
commit49b1c0e95cc5bbbe81aa98e8183e27e456f80e8c (patch)
treef487d57f01c58448f6762d9d28d5b4742ae6f83e /doc
parentaed989549572bf75e9e279e58e181dd7d4db541f (diff)
downloadtor-49b1c0e95cc5bbbe81aa98e8183e27e456f80e8c.tar
tor-49b1c0e95cc5bbbe81aa98e8183e27e456f80e8c.tar.gz
Write attacks+defenses vs rendezvous pts
svn:r720
Diffstat (limited to 'doc')
-rw-r--r--doc/tor-design.tex34
1 files changed, 29 insertions, 5 deletions
diff --git a/doc/tor-design.tex b/doc/tor-design.tex
index 759d9817c..35e8c98ae 100644
--- a/doc/tor-design.tex
+++ b/doc/tor-design.tex
@@ -1418,10 +1418,8 @@ and its resistance to attacks.
\SubSection{Attacks and Defenses}
\label{sec:attacks}
-Below we summarize a variety of attacks and how well our design withstands
-them.
-
-[XXX Note that some of these attacks are outside our threat model! -NM]
+Below we summarize a variety of attacks, and discuss how well our
+design withstands them.
\subsubsection*{Passive attacks}
\begin{tightlist}
@@ -1708,7 +1706,33 @@ them.
\subsubsection*{Attacks against rendezvous points}
\begin{tightlist}
-\item foo
+\item \emph{Make many introduction requests.} An attacker could
+ attempt to deny Bob service by flooding his Introduction Point with
+ requests. Because the introduction point can block requests that
+ lack authentication tokens, however, Bob can restrict the volume of
+ requests he receives, or require a certain amount of computation for
+ every request he receives.
+
+\item \emph{Attack an introduction point.} An attacker could try to
+ disrupt a location-hidden service by disabling its introduction
+ point. But because a service's identity is attached to its public
+ key, not its introduction point, the service can simply re-advertise
+ itself at a different introduction point.
+
+\item \emph{Compromise an introduction point.} If an attacker controls
+ an introduction point for a service, it can flood the service with
+ introduction requests, or prevent valid introduction requests from
+ reaching the hidden server. The server will notice a flooding
+ attempt if it receives many introduction requests. To notice
+ blocking of valid requests, however, the hidden server should
+ periodically test the introduction point by sending its introduction
+ requests, and making sure it receives them.
+
+\item \emph{Compromise a rendezvous point.} Controlling a rendezvous
+ point gains an attacker no more than controlling any other OR along
+ a circuit, since all data passing along the rendezvous is protected
+ by the session key shared by the client and server.
+
\end{tightlist}