Roger Dingledine commited on 2012-02-06 23:33:40
Zeige 1 geänderte Dateien mit 7 Einfügungen und 3 Löschungen.
| ... | ... |
@@ -1550,7 +1550,8 @@ the same geographic location. |
| 1550 | 1550 |
<b>Encryption</b>: first, all connections in Tor use TLS link encryption, |
| 1551 | 1551 |
so observers can't look inside to see which circuit a given cell is |
| 1552 | 1552 |
intended for. Further, the Tor client establishes an ephemeral encryption |
| 1553 |
- key with each relay in the circuit, so only the exit relay can read |
|
| 1553 |
+ key with each relay in the circuit; these extra layers of encryption |
|
| 1554 |
+ mean that only the exit relay can read |
|
| 1554 | 1555 |
the cells. Both sides discard the circuit key when the circuit ends, |
| 1555 | 1556 |
so logging traffic and then breaking into the relay to discover the key |
| 1556 | 1557 |
won't work. |
| ... | ... |
@@ -1559,11 +1560,14 @@ the same geographic location. |
| 1559 | 1560 |
<p> |
| 1560 | 1561 |
<b>Authentication</b>: |
| 1561 | 1562 |
Every Tor relay has a public decryption key called the "onion key". |
| 1563 |
+ Each relay rotates its onion key once a week. |
|
| 1562 | 1564 |
When the Tor client establishes circuits, at each step it <a |
| 1563 | 1565 |
href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands |
| 1564 | 1566 |
that the Tor relay prove knowledge of its onion key</a>. That way |
| 1565 | 1567 |
the first node in the path can't just spoof the rest of the path. |
| 1566 |
- Each relay rotates its onion key once a week. |
|
| 1568 |
+ Because the Tor client chooses the path, it can make sure to get |
|
| 1569 |
+ Tor's "distributed trust" property: no single relay in the path can |
|
| 1570 |
+ know about both the client and what the client is doing. |
|
| 1567 | 1571 |
</p> |
| 1568 | 1572 |
|
| 1569 | 1573 |
<p> |
| ... | ... |
@@ -1576,7 +1580,7 @@ the same geographic location. |
| 1576 | 1580 |
of all the known relays, and in that list are a set of certificates from |
| 1577 | 1581 |
each relay (self-signed by their identity key) specifying their keys, |
| 1578 | 1582 |
locations, exit policies, and so on. So unless the adversary can control |
| 1579 |
- a majority of the directory authorities (as of 2011 there were 8 |
|
| 1583 |
+ a majority of the directory authorities (as of 2012 there are 8 |
|
| 1580 | 1584 |
directory authorities), he can't trick the Tor client into using |
| 1581 | 1585 |
other Tor relays. |
| 1582 | 1586 |
</p> |
| 1583 | 1587 |