Roger Dingledine commited on 2010-09-21 05:04:24
Zeige 2 geänderte Dateien mit 14 Einfügungen und 16 Löschungen.
... | ... |
@@ -134,6 +134,20 @@ etc. Here are some example projects:</p> |
134 | 134 |
|
135 | 135 |
<ul> |
136 | 136 |
|
137 |
+<li>Right now Tor clients are willing to reuse a given circuit for ten |
|
138 |
+minutes after it's first used. The goal is to avoid loading down the |
|
139 |
+network with too many circuit creations, yet to also avoid having |
|
140 |
+clients use the same circuit for so long that the exit node can build a |
|
141 |
+useful pseudonymous profile of them. Alas, ten minutes is probably way |
|
142 |
+too long, especially if connections from multiple protocols (e.g. IM and |
|
143 |
+web browsing) are put on the same circuit. If we keep fixed the overall |
|
144 |
+number of circuit extends that the network needs to do, are there more |
|
145 |
+efficient and/or safer ways for clients to allocate streams to circuits, |
|
146 |
+or for clients to build preemptive circuits? Perhaps this research item |
|
147 |
+needs to start with gathering some traces of what requests typical |
|
148 |
+clients try to launch, so you have something realistic to try to optimize. |
|
149 |
+</li> |
|
150 |
+ |
|
137 | 151 |
<li>The "website fingerprinting attack": make a list of a few |
138 | 152 |
hundred popular websites, download their pages, and make a set of |
139 | 153 |
"signatures" for each site. Then observe a Tor client's traffic. As |
... | ... |
@@ -159,9 +173,6 @@ Path selection algorithms, directory fetching schedules for Tor-on-mobile |
159 | 173 |
that are compatible anonymity-wise with our current approaches. |
160 | 174 |
</li> |
161 | 175 |
|
162 |
-<li> |
|
163 |
-Figure out how bad 10 minutes is for maxcircuitdirtiness. |
|
164 |
-</li> |
|
165 | 176 |
--> |
166 | 177 |
|
167 | 178 |
<li>More coming soon. See also the "Research" section of the |
... | ... |
@@ -882,19 +882,6 @@ hurt, or not matter? Consider: cookies and recognizing Torbutton users |
882 | 882 |
by their rotating UserAgents; malicious websites who only attack certain |
883 | 883 |
browsers; and whether the answers to question one impact this answer. |
884 | 884 |
</li> |
885 |
-<li>Right now Tor clients are willing to reuse a given circuit for ten |
|
886 |
-minutes after it's first used. The goal is to avoid loading down the |
|
887 |
-network with too many circuit extend operations, yet to also avoid having |
|
888 |
-clients use the same circuit for so long that the exit node can build a |
|
889 |
-useful pseudonymous profile of them. Alas, ten minutes is probably way |
|
890 |
-too long, especially if connections from multiple protocols (e.g. IM and |
|
891 |
-web browsing) are put on the same circuit. If we keep fixed the overall |
|
892 |
-number of circuit extends that the network needs to do, are there more |
|
893 |
-efficient and/or safer ways for clients to allocate streams to circuits, |
|
894 |
-or for clients to build preemptive circuits? Perhaps this research item |
|
895 |
-needs to start with gathering some traces of what connections typical |
|
896 |
-clients try to launch, so you have something realistic to try to optimize. |
|
897 |
-</li> |
|
898 | 885 |
<li>How many bridge relays do you need to know to maintain |
899 | 886 |
reachability? We should measure the churn in our bridges. If there is |
900 | 887 |
lots of churn, are there ways to keep bridge users more likely to stay |
901 | 888 |