Changes between Version 73 and Version 74 of AnonymityModule


Ignore:
Timestamp:
Jul 5, 2011 9:55:13 AM (13 years ago)
Author:
TTaggart
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v73 v74  
    5252[[Image(wiresharkdirect.png)]]
    5353
    54 It should look similar to this.  Let's check out the source and destination information from the HTTP data packets.  We can see that the source is 10.1.4.2, which corresponds to the Alice node IP address, and the destination is 10.1.1.2, which corresponds to the Server1 node's IP address. This makes it clear that Alice was making an HTTP request to Server1.  Now open up throughproxy.pcap in Wireshark. 
     54
     55It should look similar to this.  Let's check out the source and destination information from the HTTP data packets.  We can see that the source is 10.1.4.2, which corresponds to the Alice node IP address, and the destination is 10.1.1.2, which corresponds to the Server1 node's IP address. This makes it clear that Alice was making an HTTP request to Server1. 
     56
     57[[Image(Direct Dataflow.png)]]
     58
     59
     60Now open up throughproxy.pcap in Wireshark. 
    5561
    5662[[Image(wiresharkthroughproxy.png)]]
    5763
    58 What we see is much different, we see that the source is 10.1.3.4, which is the IP address of the proxy node.  So, now the destination, Server1, doesn't know that the request came from Alice, but instead thinks that the request came from the proxy node.  Now, we try it with the throughtor.pcap file.
     64What we see is much different, we see that the source is 10.1.3.4, which is the IP address of the proxy node.  So, now the destination, Server1, doesn't know that the request came from Alice, but instead thinks that the request came from the proxy node. 
     65
     66[[Image(Proxy Dataflow.png)]]
     67
     68Now, we try it with the throughtor.pcap file.
    5969
    6070[[Image(wiresharkthroughtor.png)]]
    6171
    6272Again we see that the source is not Alice, but instead matches the IP address from one of the Tor Relay nodes.  It won't always be the same every time because the path that the data takes through the Tor network is random.  This, like going through the proxy, provides anonymity for the client, in our case Alice, but this provides more anonymity because the data goes through 3 Tor relays instead of just one proxy.
     73
     74[[Image(Tor Dataflow.png)]]
     75
    6376This may provide for anonymous communication, but it doesn't keep the data secure.  We might not know who the data came from, but we can still tell what it was. Open up one of the .pcap files.
    6477