Roger Dingledine commited on 2005-07-13 00:09:41
Zeige 1 geänderte Dateien mit 11 Einfügungen und 11 Löschungen.
... | ... |
@@ -76,12 +76,12 @@ crimes like stalking, and so on. </p> |
76 | 76 |
<a id="DDoS"></a> |
77 | 77 |
<h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3> |
78 | 78 |
|
79 |
-<p>Distributed denial of service attacks typically rely on having a group |
|
79 |
+<p>Distributed denial of service (DDoS) attacks typically rely on having a group |
|
80 | 80 |
of thousands of computers all sending floods of traffic to a victim. Since |
81 | 81 |
the goal is to overpower the bandwidth of the victim, they typically send |
82 | 82 |
UDP packets since those don't require handshakes or coordination. </p> |
83 | 83 |
|
84 |
-<p>But because Tor only transports correctly-formed TCP streams, not |
|
84 |
+<p>But because Tor only transports correctly formed TCP streams, not |
|
85 | 85 |
all IP packets, you cannot send UDP packets over Tor. (You can't do |
86 | 86 |
specialized forms of this attack like SYN flooding either.) So ordinary |
87 | 87 |
DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth |
... | ... |
@@ -134,7 +134,7 @@ since October 2003, and it's only generated a handful of complaints. Of |
134 | 134 |
course, like all privacy-oriented networks on the net, we attract our |
135 | 135 |
share of jerks. Tor's exit policies help separate the role of "willing |
136 | 136 |
to donate resources to the network" from the role of "willing to deal |
137 |
-with exit abuse complaints", so we hope our network is more sustainable |
|
137 |
+with exit abuse complaints," so we hope our network is more sustainable |
|
138 | 138 |
than past attempts at anonymity networks. </p> |
139 | 139 |
|
140 | 140 |
<p>Since Tor has <a |
... | ... |
@@ -150,20 +150,20 @@ default exit policy), it's probably safe to say that you will eventually |
150 | 150 |
hear from somebody. Abuse |
151 | 151 |
complaints may come in a variety of forms. For example: </p> |
152 | 152 |
<ul> |
153 |
-<li>Somebody connects to hotmail, and sends a ransom note to a |
|
153 |
+<li>Somebody connects to Hotmail, and sends a ransom note to a |
|
154 | 154 |
company. The |
155 | 155 |
FBI sends you a polite email, you explain that you run a Tor server, |
156 |
-and they say 'oh well' and leave you alone. [Port 80]</li> |
|
157 |
-<li>Somebody tries to get you shut down by using Tor to connect to google |
|
158 |
-groups and post spam to usenet, and then sending an angry mail to |
|
156 |
+and they say "oh well" and leave you alone. [Port 80]</li> |
|
157 |
+<li>Somebody tries to get you shut down by using Tor to connect to Google |
|
158 |
+groups and post spam to Usenet, and then sends an angry mail to |
|
159 | 159 |
your ISP about how you're destroying the world. [Port 80]</li> |
160 |
-<li>Somebody connects to an irc network and makes a nuisance of |
|
160 |
+<li>Somebody connects to an IRC network and makes a nuisance of |
|
161 | 161 |
himself. Your ISP gets polite mail about how your computer has been |
162 |
-compromised; and/or your computer gets ddosed. [Port 6667]</li> |
|
162 |
+compromised; and/or your computer gets DDoSed. [Port 6667]</li> |
|
163 | 163 |
<li>Somebody uses Tor to download a Vin Diesel movie, and |
164 | 164 |
your ISP gets a DMCA takedown notice. See EFF's <a |
165 | 165 |
href="http://tor.eff.org/eff/tor-dmca-response.html">Tor DMCA Response |
166 |
-Template</a>, which explains to your ISP why they can probably ignore |
|
166 |
+Template</a>, which explains to your ISP why it can probably ignore |
|
167 | 167 |
the notice without any liability. [Arbitrary ports]</li> |
168 | 168 |
</ul> |
169 | 169 |
|
... | ... |
@@ -250,7 +250,7 @@ to unblock exit nodes that have been blocked inadvertently. </p> |
250 | 250 |
<p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for |
251 | 251 |
spamming</a>, some over-zealous blacklisters seem to think that all |
252 | 252 |
open networks like Tor are evil --- they attempt to strong-arm network |
253 |
-administrators on policy, service and routing issues, and then extract |
|
253 |
+administrators on policy, service, and routing issues, and then extract |
|
254 | 254 |
ransoms from victims. </p> |
255 | 255 |
|
256 | 256 |
<p>If your server administrators decide to make use of these |
257 | 257 |