< arma> mikeperry: perhaps some of those urls should be https?
[tor/rransom.git] / doc / rump-fc04.mgp
blobefbf6c840cea018fc2e53f7af5b4197d569e59f2
1 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
2 %%deffont "standard" xfont "comic sans ms-medium-r"
3 %%deffont "thick" xfont "arial black-medium-r"
4 %%deffont "typewriter" xfont "courier new-bold-r"
5 %%deffont "type2writer" xfont "arial narrow-bold-r"
6 %%deffont "standard"   tfont "standard.ttf",   tmfont "kochi-mincho.ttf"
7 %%deffont "thick"      tfont "thick.ttf",      tmfont "goth.ttf"
8 %%deffont "typewriter" tfont "typewriter.ttf", tmfont "goth.ttf"
9 %deffont "standard" xfont "helvetica-medium-r", tfont "arial.ttf", tmfont "times.ttf"
10 %deffont "thick" xfont "helvetica-bold-r", tfont "arialbd.ttf", tmfont "hoso6.ttf"
11 %deffont "italic" xfont "helvetica-italic-r", tfont "ariali.ttf", tmfont "hoso6.ttf"
12 %deffont "typewriter" xfont "courier-medium-r", tfont "typewriter.ttf", tmfont "hoso6.ttf"
13 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
15 %% Default settings per each line numbers.
17 %default 1 leftfill, size 8, fore "black", back "white", font "thick", hgap 1
18 %default 2 size 8, vgap 10, prefix " ", ccolor "black"
19 %default 3 size 6, bar "gray70", vgap 0
20 %default 4 size 6, fore "black", vgap 0, prefix " ", font "standard"
22 %%default 1 area 90 90, leftfill, size 9, fore "yellow", back "blue", font "thick"
23 %%default 2 size 9, vgap 10, prefix " "
24 %%default 3 size 7, bar "gray70", vgap 10
25 %%default 4 size 7, vgap 30, prefix " ", font "standard"
26 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
28 %% Default settings that are applied to TAB-indented lines.
30 %tab 1 size 5, vgap 40, prefix "     ", icon arc "red" 50
31 %tab 2 size 4, vgap 35, prefix "            ", icon delta3 "blue" 40
32 %tab 3 size 3, vgap 35, prefix "                        ", icon dia "DarkViolet" 40
34 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
35 %page
36 %nodefault
37 %center, size 9, font "thick", back "white", fore "black"
41 Tor: 
42 %size 8
43 Next-generation Onion Routing
46 %size 7
47 Roger Dingledine
48 Nick Mathewson
49 Paul Syverson
51 %%The Free Haven Project
52 %%%font "typewriter", fore "blue"
53 %%http://freehaven.net/
54 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
55 %page
57 Low-latency anonymity system
59 %leftfill
60 Deployed: 19 nodes, hundreds of users (?)
62 Many improvements on earlier design
64 Free software -- available source code
66 Design is not covered by earlier onion routing
67 patent
69 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
70 %page
72 Perfect forward secrecy
75 Telescoping circuit
77         negotiates keys at each hop
79 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
80 %%page
82 %%Separation from "protocol cleaning"
84 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
85 %page
87 No mixing, padding, traffic shaping (yet)
90 Please show us they're worth the usability tradeoff
92 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
93 %%page
95 %%Many TCP streams can share one circuit
97 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
98 %page
100 Congestion control
103 Simple rate limiting
105 Plus have to keep internal nodes from overflowing
107 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
108 %page
110 Directory servers
113 Approve new servers
115 Tell clients who's up right now
117         plus their keys, location, etc
119 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
120 %page
122 Variable exit policies
125 Each server allows different outgoing connections
127 E.g. no servers allow outgoing mail currently
129 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
130 %page
132 End-to-end integrity checking
135 In previous onion routing, an insider could change
136 the text being transmitted:
138 "dir" => "rm *"
140 Even an external adversary could do this!
142 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
143 %page
145 Rendezvous points
148 allow hidden services
150 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
151 %page
153 Differences / limitations
156 We're TCP-only, not all IP (but we're user-space and very portable)
158 Not peer-to-peer
160 No protocol normalization
162 %%Not unobservable
164 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
165 %page
167 We have working code
170 Plus a design document,
171 and a byte-level specification
173 %size 9
174 http://freehaven.net/tor/