[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] fix earlier things, plus polish sec5
Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/routing-zones
Modified Files:
routing-zones.tex
Log Message:
fix earlier things, plus polish sec5
Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -d -r1.45 -r1.46
--- routing-zones.tex 28 Jan 2004 23:37:09 -0000 1.45
+++ routing-zones.tex 29 Jan 2004 01:38:41 -0000 1.46
@@ -380,14 +380,13 @@
A successful endpoint attack against a high-latency system like
Mixmaster takes a lot more time and effort than one against a low-latency
-system like Tor. Because an observer of even a few Mixmaster nodes
+system like Tor. However, because an observer of even a few Mixmaster nodes
may be able to link Alice to her recipients over time~\cite{e2e-traffic},
our work here also has impact on protecting such high-latency systems
-from a one-AS adversary. Further, intra-network observations,
-flooding messages into the network~\cite{trickle02}, or
-simply waiting for periods of low traffic may
-the attack more effective by shrinking the set of messages that mix with
-Alice's
+from a one-AS adversary. Further, intra-network observations
+(particularly during periods of low traffic) can be combined with active
+attacks such as message flooding to shrink the set of messages that mix
+with Alice's
message~\cite{disad-free-routes,minion-design}. As a simple example,
an adversary who learns the first half of Alice's path learns where to
make his next phone call to track Alice's recipient.
@@ -546,28 +545,30 @@
\section{Data}
-In this section, we summarize the data that we use in or analysis of
-AS-level paths in mix networks. In our analysis of mix networks, we
-perform our analysis based on the location of mix nodes today. We then
+In this section, we summarize the data that we use in our analysis of
+AS-level paths in mix networks. % In our analysis of mix networks, we
+Our analysis of mix networks is based
+%We base our analysis
+on the location of mix
+nodes in deployed systems today. We then
describe the data we used to generate the AS-level network topology.
\subsection{Mix Networks, Senders, and Receivers}
-To evaluate node selection in the Mixmaster and Tor networks, we use the
-list of operational mix nodes for each respective network; the tables
-Appendix~\ref{sec:mixnode_summary} provide lists of mix nodes for each
-of these networks.
+To evaluate node selection in the Mixmaster and Tor models, we use the
+list of operational mix nodes for each respective network; the tables in
+Appendix~\ref{sec:mixnode_summary} provide lists of mix nodes for the
+two networks.
-Since we are also interested in the AS-level paths between the sender
-(Alice) and the mix entry point, and between the mix exit point and the
-receiver (Bob) we must also estimate the ASes where the sender (Alice)
-and receiver (Bob) may typically be located. Unfortunately, usage data
-for these mix networks is not readily available, so it is not possible
-to drive our simulation with lists of common locations of senders and
-receivers. Nevertheless, we can perform reasonable approximations by
-assuming that Alice is located on a home network (e.g., a cable modem
-network, a DSL network, etc.) and that Bob is a content host located at
-a data hosting ISP.
+Since we are also interested in the AS-level paths between Alice and
+the mix entry point, and between the mix exit point and Bob, we must
+also estimate the ASes where Alice and Bob may typically be located.
+Unfortunately, usage data for these mix networks is not readily available,
+so it is not possible to drive our simulation with lists of common
+locations of senders and receivers. Nevertheless, we can perform
+reasonable approximations by assuming that Alice is located on a home
+network (e.g., a cable modem network, a DSL network, etc.) and that Bob
+is a content host located at a data hosting ISP.
To generate a reasonable list of ASes where senders might be
located, we created a list of DSL and cable modem providers from {\tt
@@ -579,8 +580,17 @@
lists of senders and receivers that we used in our experiments are in
Appendix~\ref{sec:send_recv}.
+Note that in this paper we use these networks to get a plausible set of
+nodes for our model. The Tor nodes represent a newborn network where the
+only participants are developers and very early adopters, whereas the
+Mixmaster network represents a wider participant set because it has been
+deployed for many years. We compare how each of these node sets performs
+when the initiators are typical DSL or cablemodem users in the US, and the
+responders are popular websites in the US---in effect, we are evaluating
+the safety of the newborn Tor network and the safety of a node set that
+we hope reflects how the Tor network will look when it grows more mature.
-\subsection{Network Topology}
+\subsection{Internet Topology}
To generate an estimate of the Internet's AS-level topology, we use the
routing table dump from the {\tt route-views.oregon-ix.net} route server
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/