[or-cvs] r13986: cleanup (website/trunk/en)
arma at seul.org
arma at seul.org
Wed Mar 12 01:49:50 UTC 2008
Author: arma
Date: 2008-03-11 21:49:50 -0400 (Tue, 11 Mar 2008)
New Revision: 13986
Modified:
website/trunk/en/volunteer.wml
Log:
cleanup
Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml 2008-03-12 01:41:41 UTC (rev 13985)
+++ website/trunk/en/volunteer.wml 2008-03-12 01:49:50 UTC (rev 13986)
@@ -409,11 +409,11 @@
The Tor 0.2.0.x series makes <a
href="<svnsandbox>doc/design-paper/blocking.html">significant
improvements</a> in resisting national and organizational censorship.
-But Tor still needs bettere mechanisms for some parts of its
+But Tor still needs better mechanisms for some parts of its
anti-censorship design. For example, current Tors can only listen on a
single address/port combination at a time. There's
<a href="<svnsandbox>doc/spec/proposals/118-multiple-orports.txt">a
-proposal to address this limitation</a>, and allow clients to connect
+proposal to address this limitation</a> and allow clients to connect
to any given Tor on multiple addresses and ports, but it needs more
work. Another anti-censorship project (far more difficult) is to try
to make Tor more scanning-resistant. Right now, an adversary can identify
@@ -443,11 +443,11 @@
<br />
Tor should make better use of the more recent features of Niels
Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a>
-library. Tor already, uses Libevent for its low-level asynchronous IO
+library. Tor already uses Libevent for its low-level asynchronous IO
calls, and could also use Libevent's increasingly good implementations
-of network buffers, and of HTTP. This wouldn't be simply a matter of
+of network buffers and of HTTP. This wouldn't be simply a matter of
replacing Tor's internal calls with calls to Libevent: instead, we'll
-need to refactor Tor's to use Libevent calls that do not follow the
+need to refactor Tor to use Libevent calls that do not follow the
same models as Tor's existing backends. Also, we'll need to add
missing functionality to Libevent as needed — most difficult likely
will be adding OpenSSL support on top of Libevent's buffer abstraction.
@@ -465,12 +465,14 @@
<br />
Likely Mentors: <i>Nick, Roger, Mike</i>
<br />
-Right now, Tor servers measure and report their own bandwidth, and Tor
-clients choose which servers to use in part based on that bandwidth.
-This approach is vulnerable to attacks where servers lie about their
-abandwidth; to address this, Tor currently caps the maximum bandwidth
-it's willing to believe any server provides. This is a limited fix, and
-a waste of bandwidth capacity to boot. Instead,
+Right now, Tor relays measure and report their own bandwidth, and Tor
+clients choose which relays to use in part based on that bandwidth.
+This approach is vulnerable to
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
+relays lie about their bandwidth</a>;
+to address this, Tor currently caps the maximum bandwidth
+it's willing to believe any relay provides. This is a limited fix, and
+a waste of bandwidth capacity to boot. Instead,
Tor should possibly measure bandwidth in a more distributed way, perhaps
as described in the
<a href="http://freehaven.net/anonbib/">"A Tuneup for Tor"</a> paper
@@ -478,7 +480,7 @@
double-check this paper's findings and verify the extent to which they
dovetail with Tor as deployed in the wild, and determine good ways to
incorporate them into their suggestions Tor network without adding too
-much communications overhead between servers and directory
+much communications overhead between relays and directory
authorities.
</li>
More information about the tor-commits
mailing list