... | ... |
@@ -9,10 +9,10 @@ |
9 | 9 |
<a href="<page docs/documentation>">Documentation » </a> |
10 | 10 |
<a href="<page docs/hidden-services>">Hidden Services</a> |
11 | 11 |
</div> |
12 |
- <div id="maincol"> |
|
12 |
+ <div id="maincol"> |
|
13 | 13 |
<h2>Tor: Hidden Service Protocol</h2> |
14 | 14 |
<hr> |
15 |
- |
|
15 |
+ |
|
16 | 16 |
<p> |
17 | 17 |
Tor makes it possible for users to hide their locations while offering |
18 | 18 |
various kinds of services, such as web publishing or an instant |
... | ... |
@@ -23,7 +23,7 @@ |
23 | 23 |
href="<page docs/tor-hidden-service>">configuring hidden services</a> |
24 | 24 |
page. |
25 | 25 |
</p> |
26 |
- |
|
26 |
+ |
|
27 | 27 |
<p> |
28 | 28 |
A hidden service needs to advertise its existence in the Tor network before |
29 | 29 |
clients will be able to contact it. Therefore, the service randomly picks |
... | ... |
@@ -36,11 +36,11 @@ |
36 | 36 |
service's identity (public key), we don't want them to learn about the |
37 | 37 |
hidden server's location (IP address). |
38 | 38 |
</p> |
39 |
- |
|
39 |
+ |
|
40 | 40 |
<img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png"> |
41 | 41 |
# maybe add a speech bubble containing "PK" to Bob, because that's what |
42 | 42 |
# Bob tells to his introduction points |
43 |
- |
|
43 |
+ |
|
44 | 44 |
<p> |
45 | 45 |
Step two: the hidden service assembles a <em>hidden service |
46 | 46 |
descriptor</em>, containing its public key and a summary of each |
... | ... |
@@ -50,7 +50,7 @@ |
50 | 50 |
name derived from the service's public key. After |
51 | 51 |
this step, the hidden service is set up. |
52 | 52 |
</p> |
53 |
- |
|
53 |
+ |
|
54 | 54 |
<p> |
55 | 55 |
Although it might seem impractical to use an automatically-generated |
56 | 56 |
service name, it serves an important goal: Everyone – including |
... | ... |
@@ -62,12 +62,12 @@ |
62 | 62 |
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a> |
63 | 63 |
design for hidden service names? |
64 | 64 |
</p> |
65 |
- |
|
65 |
+ |
|
66 | 66 |
<img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png"> |
67 | 67 |
# maybe replace "database" with "DHT"; further: how incorrect |
68 | 68 |
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in |
69 | 69 |
# use? |
70 |
- |
|
70 |
+ |
|
71 | 71 |
<p> |
72 | 72 |
Step three: A client that wants to contact a hidden service needs |
73 | 73 |
to learn about its onion address first. After that, the client can |
... | ... |
@@ -80,11 +80,11 @@ |
80 | 80 |
randomly picked relay and asks it to act as <em>rendezvous point</em> |
81 | 81 |
by telling it a one-time secret. |
82 | 82 |
</p> |
83 |
- |
|
83 |
+ |
|
84 | 84 |
<img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png"> |
85 | 85 |
# maybe add "cookie" to speech bubble, separated from the surrounded |
86 | 86 |
# "IP1-3" and "PK" |
87 |
- |
|
87 |
+ |
|
88 | 88 |
<p> |
89 | 89 |
Step four: When the descriptor is present and the rendezvous |
90 | 90 |
point is ready, the client assembles an <em>introduce</em> message |
... | ... |
@@ -95,16 +95,16 @@ |
95 | 95 |
via a Tor circuit: nobody can relate sending the introduce message |
96 | 96 |
to the client's IP address, so the client remains anonymous. |
97 | 97 |
</p> |
98 |
- |
|
98 |
+ |
|
99 | 99 |
<img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png"> |
100 |
- |
|
100 |
+ |
|
101 | 101 |
<p> |
102 | 102 |
Step five: The hidden service decrypts the client's introduce message |
103 | 103 |
and finds the address of the rendezvous point and the one-time secret |
104 | 104 |
in it. The service creates a circuit to the rendezvous point and |
105 | 105 |
sends the one-time secret to it in a rendezvous message. |
106 | 106 |
</p> |
107 |
- |
|
107 |
+ |
|
108 | 108 |
<p> |
109 | 109 |
At this point it is of special importance that the hidden service sticks to |
110 | 110 |
the same set of <a |
... | ... |
@@ -117,10 +117,10 @@ |
117 | 117 |
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden |
118 | 118 |
Servers</a>. |
119 | 119 |
</p> |
120 |
- |
|
120 |
+ |
|
121 | 121 |
<img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png"> |
122 | 122 |
# it should say "Bob connects to Alice's ..." |
123 |
- |
|
123 |
+ |
|
124 | 124 |
<p> |
125 | 125 |
In the last step, the rendezvous point notifies the client about successful |
126 | 126 |
connection establishment. After that, both client and hidden service can |
... | ... |
@@ -128,23 +128,23 @@ |
128 | 128 |
other. The rendezvous point simply relays (end-to-end encrypted) messages |
129 | 129 |
from client to service and vice versa. |
130 | 130 |
</p> |
131 |
- |
|
131 |
+ |
|
132 | 132 |
<p> |
133 | 133 |
One of the reasons for not using the introduction circuit |
134 | 134 |
for actual communication is that no single relay should |
135 | 135 |
appear to be responsible for a given hidden service. This is why the |
136 | 136 |
rendezvous point never learns about the hidden service's identity. |
137 | 137 |
</p> |
138 |
- |
|
138 |
+ |
|
139 | 139 |
<p> |
140 | 140 |
In general, the complete connection between client and hidden service |
141 | 141 |
consists of 6 relays: 3 of them were picked by the client with the third |
142 | 142 |
being the rendezvous point and the other 3 were picked by the hidden |
143 | 143 |
service. |
144 | 144 |
</p> |
145 |
- |
|
145 |
+ |
|
146 | 146 |
<img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png"> |
147 |
- |
|
147 |
+ |
|
148 | 148 |
<p> |
149 | 149 |
There are more detailed descriptions about the hidden service protocol than |
150 | 150 |
this one. See the |
... | ... |
@@ -162,4 +162,4 @@ |
162 | 162 |
<!-- END SIDECOL --> |
163 | 163 |
</div> |
164 | 164 |
<!-- END CONTENT --> |
165 |
-#include <foot.wmi> |
|
165 |
+#include <foot.wmi> |