Roger Dingledine commited on 2005-07-13 00:09:41
Zeige 1 geänderte Dateien mit 11 Einfügungen und 11 Löschungen.
| ... | ... |
@@ -76,12 +76,12 @@ crimes like stalking, and so on. </p> |
| 76 | 76 |
<a id="DDoS"></a> |
| 77 | 77 |
<h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3> |
| 78 | 78 |
|
| 79 |
-<p>Distributed denial of service attacks typically rely on having a group |
|
| 79 |
+<p>Distributed denial of service (DDoS) attacks typically rely on having a group |
|
| 80 | 80 |
of thousands of computers all sending floods of traffic to a victim. Since |
| 81 | 81 |
the goal is to overpower the bandwidth of the victim, they typically send |
| 82 | 82 |
UDP packets since those don't require handshakes or coordination. </p> |
| 83 | 83 |
|
| 84 |
-<p>But because Tor only transports correctly-formed TCP streams, not |
|
| 84 |
+<p>But because Tor only transports correctly formed TCP streams, not |
|
| 85 | 85 |
all IP packets, you cannot send UDP packets over Tor. (You can't do |
| 86 | 86 |
specialized forms of this attack like SYN flooding either.) So ordinary |
| 87 | 87 |
DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth |
| ... | ... |
@@ -134,7 +134,7 @@ since October 2003, and it's only generated a handful of complaints. Of |
| 134 | 134 |
course, like all privacy-oriented networks on the net, we attract our |
| 135 | 135 |
share of jerks. Tor's exit policies help separate the role of "willing |
| 136 | 136 |
to donate resources to the network" from the role of "willing to deal |
| 137 |
-with exit abuse complaints", so we hope our network is more sustainable |
|
| 137 |
+with exit abuse complaints," so we hope our network is more sustainable |
|
| 138 | 138 |
than past attempts at anonymity networks. </p> |
| 139 | 139 |
|
| 140 | 140 |
<p>Since Tor has <a |
| ... | ... |
@@ -150,20 +150,20 @@ default exit policy), it's probably safe to say that you will eventually |
| 150 | 150 |
hear from somebody. Abuse |
| 151 | 151 |
complaints may come in a variety of forms. For example: </p> |
| 152 | 152 |
<ul> |
| 153 |
-<li>Somebody connects to hotmail, and sends a ransom note to a |
|
| 153 |
+<li>Somebody connects to Hotmail, and sends a ransom note to a |
|
| 154 | 154 |
company. The |
| 155 | 155 |
FBI sends you a polite email, you explain that you run a Tor server, |
| 156 |
-and they say 'oh well' and leave you alone. [Port 80]</li> |
|
| 157 |
-<li>Somebody tries to get you shut down by using Tor to connect to google |
|
| 158 |
-groups and post spam to usenet, and then sending an angry mail to |
|
| 156 |
+and they say "oh well" and leave you alone. [Port 80]</li> |
|
| 157 |
+<li>Somebody tries to get you shut down by using Tor to connect to Google |
|
| 158 |
+groups and post spam to Usenet, and then sends an angry mail to |
|
| 159 | 159 |
your ISP about how you're destroying the world. [Port 80]</li> |
| 160 |
-<li>Somebody connects to an irc network and makes a nuisance of |
|
| 160 |
+<li>Somebody connects to an IRC network and makes a nuisance of |
|
| 161 | 161 |
himself. Your ISP gets polite mail about how your computer has been |
| 162 |
-compromised; and/or your computer gets ddosed. [Port 6667]</li> |
|
| 162 |
+compromised; and/or your computer gets DDoSed. [Port 6667]</li> |
|
| 163 | 163 |
<li>Somebody uses Tor to download a Vin Diesel movie, and |
| 164 | 164 |
your ISP gets a DMCA takedown notice. See EFF's <a |
| 165 | 165 |
href="http://tor.eff.org/eff/tor-dmca-response.html">Tor DMCA Response |
| 166 |
-Template</a>, which explains to your ISP why they can probably ignore |
|
| 166 |
+Template</a>, which explains to your ISP why it can probably ignore |
|
| 167 | 167 |
the notice without any liability. [Arbitrary ports]</li> |
| 168 | 168 |
</ul> |
| 169 | 169 |
|
| ... | ... |
@@ -250,7 +250,7 @@ to unblock exit nodes that have been blocked inadvertently. </p> |
| 250 | 250 |
<p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for |
| 251 | 251 |
spamming</a>, some over-zealous blacklisters seem to think that all |
| 252 | 252 |
open networks like Tor are evil --- they attempt to strong-arm network |
| 253 |
-administrators on policy, service and routing issues, and then extract |
|
| 253 |
+administrators on policy, service, and routing issues, and then extract |
|
| 254 | 254 |
ransoms from victims. </p> |
| 255 | 255 |
|
| 256 | 256 |
<p>If your server administrators decide to make use of these |
| 257 | 257 |