From: Roger Dingledine Date: Sat, 1 Nov 2003 07:52:51 +0000 (+0000) Subject: mess with the formatting in sec9 X-Git-Tag: tor-0.0.2pre14~147 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=6a909560be4419dd8bc4b8d21c1f2ea4a9b2293f;p=thirdparty%2Ftor.git mess with the formatting in sec9 svn:r703 --- diff --git a/doc/tor-design.tex b/doc/tor-design.tex index 6a46075859..7e39dec71c 100644 --- a/doc/tor-design.tex +++ b/doc/tor-design.tex @@ -1704,9 +1704,8 @@ presence of unreliable nodes. Below we summarize a variety of attacks and how well our design withstands them. -\begin{enumerate} -\item \textbf{Passive attacks} -\begin{itemize} +\subsubsection*{Passive attacks} +\begin{tightlist} \item \emph{Observing user behavior.} \item \emph{End-to-end Timing correlation.} \item \emph{End-to-end Size correlation.} @@ -1733,10 +1732,10 @@ DOS three of the 4 who would allow a certain exit. anonymization of data stream. -\end{itemize} +\end{tightlist} -\item \textbf{Active attacks} -\begin{itemize} +\subsubsection*{Active attacks} +\begin{tightlist} \item \emph{Key compromise.} Talk about all three keys. 3 bullets \item \emph{Iterated subpoena.} Legal roving adversary. Works bad against this because of ephemeral keys. Criticize pets paper in section 2 for @@ -1756,7 +1755,6 @@ Subcase of running a hostile node: the exit node can change the content you're getting to try to trick you. similarly, when it rejects you due to exit policy, it could give you a bad IP that sends you somewhere else. -\end{itemize} \item \emph{replaying traffic} Can't in Tor. NonSSL anonymizer. \item Do bad things with the Tor network, so we are hated and @@ -1771,23 +1769,23 @@ Exit policy's are a start. we rely on DNS being globally consistent. if people in africa resolve IPs differently, then asking to extend a circuit to a certain IP can give away your origin. +\end{tightlist} -\item \textbf{Directory attacks} -\begin{itemize} +\subsubsection*{Directory attacks} +\begin{tightlist} \item knock out a dirserver \item knock out half the dirservers \item trick user into using different software (with different dirserver keys) \item OR connects to the dirservers but nowhere else \item foo -\end{itemize} +\end{tightlist} -\item \textbf{Attacks against rendezvous points} -\begin{itemize} +\subsubsection*{Attacks against rendezvous points} +\begin{tightlist} \item foo -\end{itemize} +\end{tightlist} -\end{enumerate} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%