Roger Dingledine

Roger Dingledine commited on 2008-03-12 02:49:50
Zeige 1 geänderte Dateien mit 13 Einfügungen und 11 Löschungen.

... ...
@@ -409,11 +409,11 @@ Likely Mentors: <i>Nick</i>
409 409
 The Tor 0.2.0.x series makes <a
410 410
 href="<svnsandbox>doc/design-paper/blocking.html">significant
411 411
 improvements</a> in resisting national and organizational censorship.
412
-But Tor still needs bettere mechanisms for some parts of its
412
+But Tor still needs better mechanisms for some parts of its
413 413
 anti-censorship design.  For example, current Tors can only listen on a
414 414
 single address/port combination at a time.  There's
415 415
 <a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a
416
-proposal to address this limitation</a>, and allow clients to connect
416
+proposal to address this limitation</a> and allow clients to connect
417 417
 to any given Tor on multiple addresses and ports, but it needs more
418 418
 work.  Another anti-censorship project (far more difficult) is to try
419 419
 to make Tor more scanning-resistant.  Right now, an adversary can identify
... ...
@@ -443,11 +443,11 @@ Likely Mentors: <i>Nick</i>
443 443
 <br />
444 444
 Tor should make better use of the more recent features of Niels
445 445
 Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a>
446
-library.  Tor already, uses Libevent for its low-level asynchronous IO
446
+library.  Tor already uses Libevent for its low-level asynchronous IO
447 447
 calls, and could also use Libevent's increasingly good implementations
448
-of network buffers, and of HTTP.  This wouldn't be simply a matter of
448
+of network buffers and of HTTP.  This wouldn't be simply a matter of
449 449
 replacing Tor's internal calls with calls to Libevent: instead, we'll
450
-need to refactor Tor's to use Libevent calls that do not follow the
450
+need to refactor Tor to use Libevent calls that do not follow the
451 451
 same models as Tor's existing backends. Also, we'll need to add
452 452
 missing functionality to Libevent as needed &mdash; most difficult likely
453 453
 will be adding OpenSSL support on top of Libevent's buffer abstraction.
... ...
@@ -465,11 +465,13 @@ Skill Level: <i>Medium to High</i>
465 465
 <br />
466 466
 Likely Mentors: <i>Nick, Roger, Mike</i>
467 467
 <br />
468
-Right now, Tor servers measure and report their own bandwidth, and Tor
469
-clients choose which servers to use in part based on that bandwidth.
470
-This approach is vulnerable to attacks where servers lie about their
471
-abandwidth; to address this, Tor currently caps the maximum bandwidth
472
-it's willing to believe any server provides.  This is a limited fix, and
468
+Right now, Tor relays measure and report their own bandwidth, and Tor
469
+clients choose which relays to use in part based on that bandwidth.
470
+This approach is vulnerable to
471
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
472
+relays lie about their bandwidth</a>;
473
+to address this, Tor currently caps the maximum bandwidth
474
+it's willing to believe any relay provides.  This is a limited fix, and
473 475
 a waste of bandwidth capacity to boot.  Instead,
474 476
 Tor should possibly measure bandwidth in a more distributed way, perhaps
475 477
 as described in the
... ...
@@ -478,7 +480,7 @@ by Snader and Borisov.  A student could use current testing code to
478 480
 double-check this paper's findings and verify the extent to which they
479 481
 dovetail with Tor as deployed in the wild, and determine good ways to
480 482
 incorporate them into their suggestions Tor network without adding too
481
-much communications overhead between servers and directory
483
+much communications overhead between relays and directory
482 484
 authorities.
483 485
 </li>
484 486
 
485 487