[or-cvs] clean up bib; remove incorrect directory consensus discussion
Roger Dingledine
arma at seul.org
Tue May 18 06:14:31 UTC 2004
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc
Modified Files:
tor-design.bib tor-design.tex
Log Message:
clean up bib; remove incorrect directory consensus discussion
Index: tor-design.bib
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.bib,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -d -r1.31 -r1.32
--- tor-design.bib 17 May 2004 09:07:08 -0000 1.31
+++ tor-design.bib 18 May 2004 06:14:29 -0000 1.32
@@ -91,7 +91,7 @@
@inproceedings{eax,
author = "M. Bellare and P. Rogaway and D. Wagner",
- title = "The EAX Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency",
+ title = {The {EAX} Mode of Operation: A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency},
booktitle = {Fast Software Encryption 2004},
month = {February},
year = {2004},
@@ -258,7 +258,7 @@
@InProceedings{sybil,
author = "John Douceur",
title = {{The Sybil Attack}},
- booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002)",
+ booktitle = "Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS)",
month = Mar,
year = 2002,
}
@@ -915,7 +915,7 @@
title = {Passive Attack Analysis for Connection-Based Anonymity Systems},
author = {Andrei Serjantov and Peter Sewell},
booktitle = {Computer Security -- ESORICS 2003},
- publisher = {Springer-Verlag, LNCS (forthcoming)},
+ publisher = {Springer-Verlag, LNCS 2808},
year = {2003},
month = {October},
}
@@ -1014,7 +1014,7 @@
@InProceedings{p5,
author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan},
title = {$P^5$: A Protocol for Scalable Anonymous Communication},
- booktitle = {2002 IEEE Symposium on Security and Privacy},
+ booktitle = {IEEE Symposium on Security and Privacy},
pages = {58--70},
year = 2002,
publisher = {IEEE CS}
Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -d -r1.158 -r1.159
--- tor-design.tex 18 May 2004 05:34:45 -0000 1.158
+++ tor-design.tex 18 May 2004 06:14:29 -0000 1.159
@@ -1379,39 +1379,16 @@
simplifying assumption that all participants agree on the set of
directory servers. Second, while Mixminion needs to predict node
behavior, Tor only needs a threshold consensus of the current
-state of the network.
-
-% XXXX Do we really want this next part? It isn't really sound, and
-% XXXX we haven't implemented it. -NM
-Tor directory servers build a consensus directory through a simple
-four-round broadcast protocol. In round one, each server dates and
-signs its current opinion, and broadcasts it to the other directory
-servers; then in round two, each server rebroadcasts all the signed
-opinions it has received. At this point all directory servers check
-to see whether any server has signed multiple opinions in the same
-period. Such a server is either broken or cheating, so the protocol
-stops and notifies the administrators, who either remove the cheater
-or wait for the broken server to be fixed. If there are no
-discrepancies, each directory server then locally computes an algorithm
-(described below)
-on the set of opinions, resulting in a uniform shared directory. In
-round three servers sign this directory and broadcast it; and finally
-in round four the servers rebroadcast the directory and all the
-signatures. If any directory server drops out of the network, its
-signature is not included on the final directory.
-
-The rebroadcast steps ensure that a directory server is heard by
-either all of the other servers or none of them, even when some links
-are down (assuming that any two directory servers can talk directly or
-via a third). Broadcasts are feasible because there are relatively few
-directory servers (currently 3, but we expect as many as 9 as the network
-scales). Computing the shared directory locally is a straightforward
-threshold voting process: we include an OR if a majority of directory
-servers believe it to be good.
+state of the network. Third, we assume that we can fall back to the
+human administrators to discover and resolve problems when a concensus
+directory cannot be reached. Since there are relatively few directory
+servers (currently 3, but we expect as many as 9 as the network scales),
+we can afford operations like broadcast to simplify the consensus-building
+protocol.
To avoid attacks where a router connects to all the directory servers
but refuses to relay traffic from other routers, the directory servers
-must build circuits and use them to anonymously test router
+must also build circuits and use them to anonymously test router
reliability~\cite{mix-acc}. Unfortunately, this defense is not yet
designed or
implemented.
More information about the tor-commits
mailing list