[or-cvs] r14507: Incorporated two corrections by Jan Reister and changed a fe (website/trunk/en)
kloesing at seul.org
kloesing at seul.org
Tue Apr 29 14:44:04 UTC 2008
Author: kloesing
Date: 2008-04-29 10:44:04 -0400 (Tue, 29 Apr 2008)
New Revision: 14507
Modified:
website/trunk/en/hidden-services.wml
Log:
Incorporated two corrections by Jan Reister and changed a few other inaccuracies (server != service)
Modified: website/trunk/en/hidden-services.wml
===================================================================
--- website/trunk/en/hidden-services.wml 2008-04-29 11:04:01 UTC (rev 14506)
+++ website/trunk/en/hidden-services.wml 2008-04-29 14:44:04 UTC (rev 14507)
@@ -16,9 +16,9 @@
points telling them its public key. Note that in the following figures the
green links are circuits rather than direct connections. This makes it
impossible for anyone to associate the introduction points with the hidden
-service's IP address. This is important, because although the introduction
+server's IP address. This is important, because although the introduction
points and others are told the hidden service's identity (public key), they
-must not learn about the hidden server's identity (IP address).
+must not learn about the hidden server's location (IP address).
</p>
<img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png" />
@@ -29,8 +29,9 @@
In a second step, the hidden service assembles a hidden service descriptor
containing the introduction points' addresses and its public key and signs
it with its private key. It stores that descriptor on a set of directory
-servers, again using a circuit that hides the link between storing the
-descriptor with the hidden service's IP address. The descriptor will be
+servers, again using a circuit that hides the link between the directory
+server storing the
+descriptor with the hidden server's IP address. The descriptor will be
found by clients requesting XYZ.onion where XYZ is a 16 characters long
name that can be uniquely derived from the service's public key. Although
it might seem impractical to use an automatically-generated service name,
@@ -83,9 +84,9 @@
the same set of guard nodes for creating new circuits. Otherwise an attacker
could run an own relay and force a hidden service to create an arbitrary
number of circuits in the hope of the corrupt relay to be picked as entry
-node and learn the hidden service's IP address via timing analysis. This
+node and learn the hidden server's IP address via timing analysis. This
attack was described by Øverlier and Syverson in their paper titled
-Locating Hidden Services.
+Locating Hidden Servers.
</p>
<img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png" />
More information about the tor-commits
mailing list