update translation and revision number

commited on 2009-04-03 18:47:18
Zeige 1 geänderte Dateien mit 27 Einfügungen und 47 Löschungen.

... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 19193
2
+# Based-On-Revision: 19218
3 3
 # Last-Translator: peihanru AT gmail.com
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: 志愿者" CHARSET="UTF-8"
... ...
@@ -1017,40 +1017,25 @@ href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>
1017 1017
 延缓攻击吗?有些流量填充(traffic padding)或流量整形(traffic shaping)方案比其他方案更好吗?
1018 1018
 </li>
1019 1019
 
1020
-<!-- NEED TRANSLATION -->
1021
-<li>A related question is: Does running a relay/bridge provide additional
1022
-protection against these timing attacks? Can an external adversary that can't
1023
-see inside TLS links still recognize individual streams reliably?
1024
-Does the amount of traffic carried degrade this ability any? What if the
1025
-client-relay deliberately delayed upstream relayed traffic to create a queue
1026
-that could be used to mimic timings of client downstream traffic to make it
1027
-look like it was also relayed? This same queue could also be used for masking
1028
-timings in client upstream traffic with the techniques from <a
1029
-href="http://www.freehaven.net/anonbib/#ShWa-Timing06">adaptive padding</a>,
1030
-but without the need for additional traffic. Would such an interleaving of
1031
-client upstream traffic obscure timings for external adversaries? Would the
1032
-strategies need to be adjusted for asymmetric links? For example, on
1033
-asymmetric links, is it actually possible to differentiate client traffic from
1034
-natural bursts due to their asymmetric capacity? Or is it easier than
1035
-symmetric links for some other reason?
1036
-</li>
1037
-
1038
-<!-- NEED TRANSLATION -->
1039
-<li>Repeat Murdoch and Danezis's <a
1040
-href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta">attack from
1041
-Oakland 05</a> on the current Tor network. See if you can learn why it
1042
-works well on some nodes and not well on others. (My theory is that the
1043
-fast nodes with spare capacity resist the attack better.) If that's true,
1044
-then experiment with the RelayBandwidthRate and RelayBandwidthBurst
1045
-options to run a relay that is used as a client while relaying the
1046
-attacker's traffic: as we crank down the RelayBandwidthRate, does the
1047
-attack get harder? What's the right ratio of RelayBandwidthRate to
1048
-actually capacity? Or is it a ratio at all? While we're at it, does a
1049
-much larger set of candidate relays increase the false positive rate
1050
-or other complexity for the attack? (The Tor network is now almost two
1051
-orders of magnitude larger than it was when they wrote their paper.) Be
1052
-sure to read <a href="http://freehaven.net/anonbib/#clog-the-queue">Don't
1053
-Clog the Queue</a> too.
1020
+<li>
1021
+一个相关的问题是,运行一个中继或者网桥,是否能提供对计时攻击的额外保护?如果某个无法看到 TLS 连接
1022
+内部情况的敌意观察者存在的情况下,我们仍然可以认为数据流是安全可靠的吗?大量的数据传输是否降低了
1023
+可靠性?如果一个客户端-中继故意延迟上行数据并为中继数据创建一个队列来模拟客户端下行传输,这样使自己
1024
+看上去似乎是一个中继,这种做法会有所帮助吗?使用<a href="http://www.freehaven.net/anonbib/#ShWa-Timing06">
1025
+自适应填充</a>中提到的技术方案,这个队列同样可用来混淆上行数据的时间,而不需要额外的数据传输。这种
1026
+客户端的交叉上行方案能否真的混淆外部攻击者的计时观察?这样的策略是否需要针对不对称连接作出调整?比如,
1027
+在不对称连接上,它是否能够真正区分出由于连接不对称造成的客户端的正常的流量爆发?或者,是否有其他理由
1028
+导致这比对称连接更加容易?
1029
+</li>
1030
+
1031
+<li>重复一下来自 Murdoch 和 Danezis 在现在的 Tor 网络上的攻击行为:<a
1032
+href="http://www.cl.cam.ac.uk/~sjm217/projects/anon/#torta">attack from Oakland 05</a>。看看你
1033
+能否搞清楚为什么它在某些节点上可以成功而在某些节点上却招到了失败。(在我看来,较快的节点为攻击提供了更好
1034
+的兼容性。)如果这是真的,那么运行一个中继,并在中继攻击者的传输时将它作为客户端使用,实验 RelayBandwidthRate
1035
+和 RelayBandwidthBurst 这两个参数的调整:如果我们降低 RelayBandwidthRate,会增加攻击的难度吗?RelayBandwidthRate
1036
+的合适的值是多少?或者它就只是一个传输率参数,跟攻击难度其实没有关系?更大的中继候选是否会增加针对攻击的假阳性错误率
1037
+(false positive rate)或者其他复杂性?(Tor 网络的规模现在差不多是他们写那篇论文时的两倍。)请务必读读这篇文章,
1038
+<a href="http://freehaven.net/anonbib/#clog-the-queue">Don't Clog the Queue</a> 。
1054 1039
 </li>
1055 1040
 
1056 1041
 <li>路由区域攻击(routing zones attack):绝大多数的文献将 Alice 与入口节点(及出口节点与 Bob)
... ...
@@ -1081,18 +1066,13 @@ href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">ssh 吞吐量
1081 1066
 我们需要评估、需要调整,如果结果不错的话,也许会来一次彻底的变化。
1082 1067
 </li>
1083 1068
 
1084
-<!-- NEED TRANSLATION -->
1085
-<li>Our censorship-resistance goals include preventing
1086
-an attacker who's looking at Tor traffic on the wire from <a
1087
-href="<svnsandbox>doc/design-paper/blocking.html#sec:network-fingerprint">distinguishing
1088
-it from normal SSL traffic</a>. Obviously we can't achieve perfect
1089
-steganography and still remain usable, but for a first step we'd like to
1090
-block any attacks that can win by observing only a few packets. One of
1091
-the remaining attacks we haven't examined much is that Tor cells are 512
1092
-bytes, so the traffic on the wire may well be a multiple of 512 bytes.
1093
-How much does the batching and overhead in TLS records blur this on the
1094
-wire? Do different buffer flushing strategies in Tor affect this? Could
1095
-a bit of padding help a lot, or is this an attack we must accept?
1069
+<!-- NEED HELP -->
1070
+<li>我们反审查机制的目标包括防止攻击者<a href="<svnsandbox>doc/design-paper/blocking.html#sec:network-fingerprint">
1071
+从普通 SSL 传输中区分 Tor 数据包</a>。很明显,我们不可能既做到完美的隐藏又保持可用性,但是,
1072
+首先,我们希望能够阻止攻击者仅仅观察几个数据包就可以取得成功。在这些攻击中,有一个我们没有进行太多测试的
1073
+问题是,Tor 的数据包是以512字节为单位的,因此,传输的数据包可以是512字节的倍数。在物理线路上,
1074
+TLS 记录中的这种定量传输能够在多大程度上受到影响?如果 Tor 使用不同的缓冲策略会有所影响吗?作一些填充是否
1075
+会有所帮助,或者这是我们必须接受的攻击?
1096 1076
 </li>
1097 1077
 
1098 1078
 
1099 1079