Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Benjamin J. Thompson
Tor
Commits
76117b3f
Commit
76117b3f
authored
21 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
a few more clarifications to rendezvous spec
svn:r345
parent
4fc94789
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/rendezvous.txt
+13
-10
13 additions, 10 deletions
doc/rendezvous.txt
with
13 additions
and
10 deletions
doc/rendezvous.txt
+
13
−
10
View file @
76117b3f
How to make rendezvous points work
with tor
How to make rendezvous points work
0. Overview
...
...
@@ -20,12 +20,14 @@
We also provide the necessary glue code so that Alice can view webpages
on a location-hidden webserver, and Bob can run a location-hidden
server, with minimal invasive changes (see Section 3). Both Alice
and Bob must run local onion proxies (OPs).
and Bob must run local onion proxies (OPs) -- software that knows
how to talk to the onion routing network.
The big picture follows. We direct the reader to the rest of the
document for more details and explanation.
1) Bob chooses some Introduction Points, and advertises them on a DHT.
1) Bob chooses some Introduction Points, and advertises them on a
Distributed Hash Table (DHT).
2) Bob establishes onion routing connections to each of his
Introduction Points, and waits.
3) Alice learns about Bob's service out of band (perhaps Bob gave her
...
...
@@ -34,15 +36,15 @@
4) Alice chooses and establishes a Meeting Point for this transaction.
5) Alice goes to one of Bob's Introduction Points, and gives it a blob
(encrypted for Bob) which tells him about herself and the Meeting
Point she chose.
6)
IP sends the blob to Bob
.
7) Bob chooses whether to ignore the blob, or to onion route to MP
.
8
) MP plugs together Alice and Bob. Note that MP doesn't know (or care)
Point she chose.
The Introduction Point sends the blob to Bob.
6)
Bob chooses whether to ignore the blob, or to onion route to MP
.
Let's assume the latter
.
7
) MP plugs together Alice and Bob. Note that MP doesn't know (or care)
who Alice is, or who Bob is; and it can't read anything they
transmit either, because they share a session key.
9
) Alice sends a 'begin' cell along the circuit. It makes its way
8
) Alice sends a 'begin' cell along the circuit. It makes its way
to Bob's onion proxy. Bob's onion proxy connects to Bob's webserver.
10
) Data goes back and forth as usual.
9
) Data goes back and forth as usual.
1. Introduction service
...
...
@@ -157,7 +159,8 @@
his service.
We assume the existence of a robust decentralized efficient lookup
system (call it "DHT"). Bob publishes
system (call it "DHT" for distributed hash table -- note that the
onion routers can run nodes). Bob publishes
* Bob's Public Key for that service
* Expiration date ("don't use after")
* Introduction server 0 ... Introduction server N
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment