summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2003-10-21 04:27:54 +0000
committerRoger Dingledine <arma@torproject.org>2003-10-21 04:27:54 +0000
commit668ec0b435c37bf3bf55232c5a73ea035a6421cb (patch)
tree3417cd7089486c320cbc34a56e27140705252a91 /doc
parent53baa69705ba0c3ac2da5b3b79821d57c3d5fbb5 (diff)
downloadtor-668ec0b435c37bf3bf55232c5a73ea035a6421cb.tar.gz
tor-668ec0b435c37bf3bf55232c5a73ea035a6421cb.zip
first draft of a conclusion / future works
svn:r638
Diffstat (limited to 'doc')
-rw-r--r--doc/tor-design.bib8
-rw-r--r--doc/tor-design.tex59
2 files changed, 65 insertions, 2 deletions
diff --git a/doc/tor-design.bib b/doc/tor-design.bib
index 8021195c4f..12bdabd5c5 100644
--- a/doc/tor-design.bib
+++ b/doc/tor-design.bib
@@ -703,6 +703,14 @@ full_papers/rao/rao.pdf}},
address = {Chateau Lake Louise, Banff, Canada},
}
+@inproceedings{SS03,
+ title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
+ author = {Andrei Serjantov and Peter Sewell},
+ booktitle = {Proceedings of ESORICS 2003},
+ year = {2003},
+ month = {October},
+}
+
@Article{raghavan87randomized,
author = {P. Raghavan and C. Thompson},
title = {Randomized rounding: A technique for provably good algorithms and algorithmic proofs},
diff --git a/doc/tor-design.tex b/doc/tor-design.tex
index 0ff4b72b4d..497af760e4 100644
--- a/doc/tor-design.tex
+++ b/doc/tor-design.tex
@@ -578,18 +578,73 @@ the server doesn't even acknowledge its existence.
Below we summarize a variety of attacks and how well our design withstands
them.
+\begin{enumerate}
+\item \textbf{Passive attacks}
+\begin{itemize}
+\item \emph{Simple observation.}
+\item \emph{Timing correlation.}
+\item \emph{Size correlation.}
+\item \emph{Option distinguishability.}
+\end{itemize}
+
+\item \textbf{Active attacks}
+\begin{itemize}
+\item \emph{Key compromise.}
+\item \emph{Iterated subpoena.}
+\item \emph{Run recipient.}
+\item \emph{Run a hostile node.}
+\item \emph{Compromise entire path.}
+\item \emph{Selectively DoS servers.}
+\item \emph{Introduce timing into messages.}
+\item \emph{Tagging attacks.}
+\end{itemize}
+
+\item \textbf{Directory attacks}
+\begin{itemize}
+\item foo
+\end{itemize}
+
+\end{enumerate}
+
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\Section{Future Directions and Open Problems}
\label{sec:conclusion}
-Tor brings together many innovations from many different projects into
+Tor brings together many innovations into
a unified deployable system. But there are still several attacks that
work quite well, as well as a number of sustainability and run-time
issues remaining to be ironed out. In particular:
\begin{itemize}
-\item foo
+\item \emph{Scalability:} Since Tor's emphasis currently is on simplicity
+of design and deployment, the current design won't easily handle more
+than a few hundred servers, because of its clique topology. Restricted
+route topologies \cite{danezis:pet2003} promise comparable anonymity
+with much better scaling properties, but we must solve problems like
+how to randomly form the network without introducing net attacks.
+\item \emph{Cover traffic:} Currently we avoid cover traffic because
+it introduces clear performance and bandwidth costs, but and its
+security properties are not well understood. With more research
+\cite{SS03,defensive-dropping}, the price/value ratio may change, both for
+link-level cover traffic and also long-range cover traffic. In particular,
+we expect restricted route topologies to reduce the cost of cover traffic
+because there are fewer links to cover.
+\item \emph{Better directory distribution:} Even with the threshold
+directory agreement algorithm described in \ref{sec:dirservers},
+the directory servers are still trust bottlenecks. We must find more
+decentralized yet practical ways to distribute up-to-date snapshots of
+network status without introducing new attacks.
+\item \emph{Implementing location-hidden servers:} While Section
+\ref{sec:rendezvous} provides a design for rendezvous points and
+location-hidden servers, this feature has not yet been implemented.
+We will likely encounter additional issues, both in terms of usability
+and anonymity, that must be resolved.
+\item \emph{Wider-scale deployment:} The original goal of Tor was to
+gain experience in deploying an anonymizing overlay network, and learn
+from having actual users. We are now at the point where we can start
+deploying a wider network. We will see what happens!
+% ok, so that's hokey. fix it. -RD
\end{itemize}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%