Roger Dingledine commited on 2010-04-29 05:24:27
Zeige 2 geänderte Dateien mit 53 Einfügungen und 14 Löschungen.
... | ... |
@@ -67,6 +67,19 @@ the code they used. Let us know if you have new tools we should list, |
67 | 67 |
or improvements to the existing ones. The more the better, at this stage. |
68 | 68 |
</li> |
69 | 69 |
|
70 |
+<li> |
|
71 |
+<b>We need defenses too — not just attacks.</b> |
|
72 |
+Most researchers find it easy and fun to come up with novel attacks on |
|
73 |
+anonymity systems. We've seen this result lately in terms of improved |
|
74 |
+congestion attacks, attacks based on remotely measuring latency or |
|
75 |
+throughput, and so on. Knowing how things can go wrong is important, |
|
76 |
+and we recognize that the incentives in academia aren't aligned with |
|
77 |
+spending energy on designing defenses, but it sure would be great to |
|
78 |
+get more attention to how to address the attacks. We'd love to help |
|
79 |
+brainstorm about how to make Tor better. As a bonus, your paper might |
|
80 |
+even end up with a stronger "countermeasures" section. |
|
81 |
+</li> |
|
82 |
+ |
|
70 | 83 |
<li> |
71 | 84 |
<b>In-person help.</b> |
72 | 85 |
If you're doing interesting and important Tor research and need help |
... | ... |
@@ -116,8 +129,46 @@ href="http://freehaven.net/anonbib/">these papers</a> (especially the |
116 | 129 |
ones in boxes).</p> |
117 | 130 |
|
118 | 131 |
<p>We need people to attack the system, quantify defenses, |
119 |
-etc. See the "Research" section of the |
|
120 |
-<a href="<page volunteer>#Research">volunteer</a> page.</p> |
|
132 |
+etc. Here are some example projects: |
|
133 |
+ |
|
134 |
+<ul> |
|
135 |
+ |
|
136 |
+<li>The "website fingerprinting attack": make a list of a few |
|
137 |
+hundred popular websites, download their pages, and make a set of |
|
138 |
+"signatures" for each site. Then observe a Tor client's traffic. As |
|
139 |
+you watch him receive data, you quickly approach a guess about which |
|
140 |
+(if any) of those sites he is visiting. First, how effective is |
|
141 |
+this attack on the deployed Tor design? The problem with all the |
|
142 |
+previous attack papers is that they look at timing and counting of |
|
143 |
+IP packets on the wire. But OpenSSL's TLS records, plus Tor's use of |
|
144 |
+TCP pushback to do rate limiting, means that tracing by IP packets |
|
145 |
+produces very poor results. The right approach is to realize that |
|
146 |
+Tor uses OpenSSL, look inside the TLS record at the TLS headers, and |
|
147 |
+figure out how many 512-byte cells are being sent or received. Then |
|
148 |
+start exploring defenses: for example, we could change Tor's cell |
|
149 |
+size from 512 bytes to 1024 bytes, we could employ padding techniques |
|
150 |
+like <a href="http://freehaven.net/anonbib/#timing-fc2004">defensive |
|
151 |
+dropping</a>, or we could add traffic delays. How much of an impact do |
|
152 |
+these have, and how much usability impact (using some suitable metric) |
|
153 |
+is there from a successful defense in each case?</li> |
|
154 |
+</li> |
|
155 |
+ |
|
156 |
+<!-- |
|
157 |
+<li> |
|
158 |
+Path selection algorithms, directory fetching schedules for Tor-on-mobile |
|
159 |
+that are compatible anonymity-wise with our current approaches. |
|
160 |
+</li> |
|
161 |
+ |
|
162 |
+<li> |
|
163 |
+Figure out how bad 10 minutes is for maxcircuitdirtiness. |
|
164 |
+</li> |
|
165 |
+--> |
|
166 |
+ |
|
167 |
+<li>More coming soon. See also the "Research" section of the |
|
168 |
+<a href="<page volunteer>#Research">volunteer</a> page for other topics. |
|
169 |
+</li> |
|
170 |
+ |
|
171 |
+</ul> |
|
121 | 172 |
|
122 | 173 |
</div><!-- #main --> |
123 | 174 |
|
... | ... |
@@ -915,18 +915,6 @@ href="http://dl.dropbox.com/u/37735/index.html">thesis and prototype</a>. |
915 | 915 |
<a id="Research"></a> |
916 | 916 |
<h2><a class="anchor" href="#Research">Research</a></h2> |
917 | 917 |
<ol> |
918 |
-<li>The "website fingerprinting attack": make a list of a few |
|
919 |
-hundred popular websites, download their pages, and make a set of |
|
920 |
-"signatures" for each site. Then observe a Tor client's traffic. As |
|
921 |
-you watch him receive data, you quickly approach a guess about which |
|
922 |
-(if any) of those sites he is visiting. First, how effective is |
|
923 |
-this attack on the deployed Tor codebase? Then start exploring |
|
924 |
-defenses: for example, we could change Tor's cell size from 512 |
|
925 |
-bytes to 1024 bytes, we could employ padding techniques like <a |
|
926 |
-href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>, |
|
927 |
-or we could add traffic delays. How much of an impact do these have, |
|
928 |
-and how much usability impact (using some suitable metric) is there from |
|
929 |
-a successful defense in each case?</li> |
|
930 | 918 |
<li>The "end-to-end traffic confirmation attack": |
931 | 919 |
by watching traffic at Alice and at Bob, we can <a |
932 | 920 |
href="http://freehaven.net/anonbib/#danezis:pet2004">compare |
933 | 921 |