Improving Tor using a TCP-over-DTLS Tunnel

نویسندگان

  • Joel Reardon
  • Ian Goldberg
چکیده

The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. All traffic between any pair of routers, even if they represent circuits for different clients, are multiplexed over a single TCP connection. This results in interference across circuits during congestion control, packet dropping and packet reordering. This interference greatly contributes to Tor’s notorious latency problems. Our solution is to use a TCP-over-DTLS (Datagram Transport Layer Security) transport between routers. We give each stream of data its own TCP connection, and protect the TCP headers—which would otherwise give stream identification information to an attacker—with DTLS. We perform experiments on our implemented version to illustrate that our proposal has indeed resolved the cross-circuit interference.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Engineering Task Force ( IETF ) X

The General Internet Signaling Transport (GIST) protocol currently uses TCP or Transport Layer Security (TLS) over TCP for Connection mode operation. This document describes the usage of GIST over the Stream Control Transmission Protocol (SCTP) and Datagram Transport Layer Security (DTLS).

متن کامل

Secure Real-Time Communication for Tele-Immersion Systems Satisfying The Need For Secure Communication With Datagram Transport Layer Security

Real-time communication is often used in teleimmersion systems. The nature of this real-time information transmitted is often health industry related so it is imperative that security must be insured. Therefore, a need for establishing secure communication channels must be facilitated under realtime constraints. A widely used family of secure protocols to assure this is Transport Layer Security...

متن کامل

Design and Implementation of SCTP-aware DTLS

There is currently no widely accepted and deployed approach to provide security for the Stream Control Transmission Protocol (SCTP). A promising new approach is to use the Datagram Transport Layer Security (DTLS) protocol, adding an encryption and authentication layer between transport and application protocol. The adaption for SCTP supports all features without compromising security or requiri...

متن کامل

Understanding TCP over TCP: Effects of TCP Tunneling on End-to-End Throughput and Latency

TCP tunnel is a technology that aggregates and transfers packets sent between end hosts as a single or multiple TCP connections. By using a TCP tunnel, the fairness among aggregate flows can be improved and several protocols can be transparently transmitted through an Internet firewall. However, since most applications running on end hosts generally use TCP, two TCP congestion controls (i.e., e...

متن کامل

RFC 5953 TLS Transport Model for SNMP August

This document describes a Transport Model for the Simple Network Management Protocol (SNMP), that uses either the Transport Layer Security protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of a S...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009