import the KeyManagement faq entry
Roger Dingledine

Roger Dingledine commited on 2008-11-23 07:32:39
Zeige 1 geänderte Dateien mit 48 Einfügungen und 3 Löschungen.

... ...
@@ -39,6 +39,11 @@ funding?</a></li>
39 39
 
40 40
 <p>Running a Tor hidden service:</p>
41 41
 
42
+<p>Anonymity and Security:</p>
43
+<ul>
44
+<li><a href="#KeyManagement">What are all these keys used for?</a></li>
45
+</ul>
46
+
42 47
 <hr />
43 48
 
44 49
 <a id="General"></a>
... ...
@@ -444,14 +449,54 @@ to the project, or <a href="<page contact>">contact</a> our executive
444 449
 director for information on making grants or major donations.
445 450
 </p>
446 451
 
447
-
448 452
 <hr />
449 453
 
450
-<a id="question"></a>
451
-<h3><a class="anchor" href="#question">Question?</a></h3>
454
+<a id="KeyManagement"></a>
455
+<h3><a class="anchor" href="#KeyManagement">What are all these keys
456
+used for?</a></h3>
457
+
458
+<p>
459
+Every Tor relay has a public decryption key (rotated once a
460
+week). When the Tor clients establish circuits, at each step they <a
461
+href="<svnsandbox>doc/design-paper/tor-design.html#subsec:circuits">demand
462
+that the Tor relay prove knowledge of its private key</a>. That way
463
+the first node in the path can't just spoof the rest of the path.
464
+</p>
465
+
466
+<p>
467
+How do clients know what the relays are, and how do they know that they
468
+have the right keys for them? The directory servers provide a signed list
469
+of all the approved relays, and in that list are a set of self-signed
470
+certificates from each relay, specifying their keys, locations, exit
471
+policies, and so on. So unless the adversary can control a directory
472
+server (and starting in Tor 0.1.1.x, a threshold of the directory
473
+servers), he can't trick the Tor client into using other Tor relays.
474
+</p>
475
+
476
+<p>
477
+How do clients know what the directory servers are? The list comes with
478
+the Tor distribution. It hard-codes their locations and their public
479
+keys. So the only way to trick the user into using a fake Tor network
480
+is to give them a specially modified version of the software.
481
+</p>
452 482
 
483
+<p>
484
+How do users know they've got the right software? When we distribute
485
+the source code or a package, we digitally sign it with <a
486
+href="http://www.gnupg.org/">GNU Privacy Guard</a>. Also see the <a
487
+href="https://wiki.torproject.org/noreply/TheOnionRouter/VerifyingSignatures">instructions
488
+on how to check Tor's signatures</a>.
489
+</p>
453 490
 
491
+<p>
492
+In order to be absolutely certain that it's signed by the developers,
493
+you need to have met them in person and gotten a copy of their key
494
+fingerprint, or you need to know somebody who has. If you're concerned
495
+about an attack on this level, we recommend you get involved with the
496
+security community and start meeting people.
497
+</p>
454 498
 
499
+<hr />
455 500
 
456 501
   </div><!-- #main -->
457 502
 
458 503