Browse code

yuck trailing spaces

Sebastian Hahn authored on 11/02/2015 06:06:15
Showing 1 changed files
... ...
@@ -9,10 +9,10 @@
9 9
     <a href="<page docs/documentation>">Documentation &raquo; </a>
10 10
     <a href="<page docs/hidden-services>">Hidden Services</a>
11 11
   </div>
12
-  <div id="maincol"> 
12
+  <div id="maincol">
13 13
     <h2>Tor: Hidden Service Protocol</h2>
14 14
     <hr>
15
-    
15
+
16 16
     <p>
17 17
     Tor makes it possible for users to hide their locations while offering
18 18
     various kinds of services, such as web publishing or an instant
... ...
@@ -23,7 +23,7 @@
23 23
     href="<page docs/tor-hidden-service>">configuring hidden services</a>
24 24
     page.
25 25
     </p>
26
-    
26
+
27 27
     <p>
28 28
     A hidden service needs to advertise its existence in the Tor network before
29 29
     clients will be able to contact it. Therefore, the service randomly picks
... ...
@@ -36,11 +36,11 @@
36 36
     service's identity (public key), we don't want them to learn about the
37 37
     hidden server's location (IP address).
38 38
     </p>
39
-    
39
+
40 40
     <img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png">
41 41
     # maybe add a speech bubble containing "PK" to Bob, because that's what
42 42
     # Bob tells to his introduction points
43
-    
43
+
44 44
     <p>
45 45
     Step two: the hidden service assembles a <em>hidden service
46 46
     descriptor</em>, containing its public key and a summary of each
... ...
@@ -50,7 +50,7 @@
50 50
     name derived from the service's public key. After
51 51
     this step, the hidden service is set up.
52 52
     </p>
53
-    
53
+
54 54
     <p>
55 55
     Although it might seem impractical to use an automatically-generated
56 56
     service name, it serves an important goal: Everyone &ndash; including
... ...
@@ -62,12 +62,12 @@
62 62
     href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
63 63
     design for hidden service names?
64 64
     </p>
65
-    
65
+
66 66
     <img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png">
67 67
     # maybe replace "database" with "DHT"; further: how incorrect
68 68
     # is it to *not* add DB to the Tor cloud, now that begin dir cells are in
69 69
     # use?
70
-    
70
+
71 71
     <p>
72 72
     Step three: A client that wants to contact a hidden service needs
73 73
     to learn about its onion address first. After that, the client can
... ...
@@ -80,11 +80,11 @@
80 80
     randomly picked relay and asks it to act as <em>rendezvous point</em>
81 81
     by telling it a one-time secret.
82 82
     </p>
83
-    
83
+
84 84
     <img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png">
85 85
     # maybe add "cookie" to speech bubble, separated from the surrounded
86 86
     # "IP1-3" and "PK"
87
-    
87
+
88 88
     <p>
89 89
     Step four: When the descriptor is present and the rendezvous
90 90
     point is ready, the client assembles an <em>introduce</em> message
... ...
@@ -95,16 +95,16 @@
95 95
     via a Tor circuit: nobody can relate sending the introduce message
96 96
     to the client's IP address, so the client remains anonymous.
97 97
     </p>
98
-    
98
+
99 99
     <img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png">
100
-    
100
+
101 101
     <p>
102 102
     Step five: The hidden service decrypts the client's introduce message
103 103
     and finds the address of the rendezvous point and the one-time secret
104 104
     in it. The service creates a circuit to the rendezvous point and
105 105
     sends the one-time secret to it in a rendezvous message.
106 106
     </p>
107
-    
107
+
108 108
     <p>
109 109
     At this point it is of special importance that the hidden service sticks to
110 110
     the same set of <a
... ...
@@ -117,10 +117,10 @@
117 117
     <a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
118 118
     Servers</a>.
119 119
     </p>
120
-    
120
+
121 121
     <img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png">
122 122
     # it should say "Bob connects to Alice's ..."
123
-    
123
+
124 124
     <p>
125 125
     In the last step, the rendezvous point notifies the client about successful
126 126
     connection establishment. After that, both client and hidden service can
... ...
@@ -128,23 +128,23 @@
128 128
     other. The rendezvous point simply relays (end-to-end encrypted) messages
129 129
     from client to service and vice versa.
130 130
     </p>
131
-    
131
+
132 132
     <p>
133 133
     One of the reasons for not using the introduction circuit
134 134
     for actual communication is that no single relay should
135 135
     appear to be responsible for a given hidden service. This is why the
136 136
     rendezvous point never learns about the hidden service's identity.
137 137
     </p>
138
-    
138
+
139 139
     <p>
140 140
     In general, the complete connection between client and hidden service
141 141
     consists of 6 relays: 3 of them were picked by the client with the third
142 142
     being the rendezvous point and the other 3 were picked by the hidden
143 143
     service.
144 144
     </p>
145
-    
145
+
146 146
     <img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png">
147
-    
147
+
148 148
     <p>
149 149
     There are more detailed descriptions about the hidden service protocol than
150 150
     this one. See the
... ...
@@ -162,4 +162,4 @@
162 162
   <!-- END SIDECOL -->
163 163
 </div>
164 164
 <!-- END CONTENT -->
165
-#include <foot.wmi>  
165
+#include <foot.wmi>