Changes between Version 94 and Version 95 of AnonymityModule


Ignore:
Timestamp:
Jul 7, 2011 10:47:04 AM (13 years ago)
Author:
jhudson
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • AnonymityModule

    v94 v95  
    3030
    3131=== Onion Routing & Tor ===
    32 Another method of cloaking one's identity is through using a program called Tor.  Tor takes the proxy idea and expands it using the idea of onion routing.  Onion routing is an anonymity tool which uses multiple routers to hide web traffic from the sender to the server. The web data is encrypted using layers, with each layer being removed at the subsequent routers. This means that each router can only see two parts of the traffic, the preceding node and the next node. Therefore a compromised node would not lead to the identity of either person being revealed.
     32Another method of cloaking one's identity is through using a program called [https://www.torproject.org/ Tor].  Tor takes the proxy idea and expands it using the idea of onion routing.  Onion routing is an anonymity tool which uses multiple routers to hide web traffic from the sender to the server. The web data is encrypted using layers, with each layer being removed at the subsequent routers. This means that each router can only see two parts of the traffic, the preceding node and the next node. Therefore a compromised node would not lead to the identity of either person being revealed.
    3333
    3434[[Image(onion.png)]]
     
    3737
    3838= The Exercise =
     39For this exercise, we are going to set up a network with 11 different nodes.  2 nodes will be client nodes, Alice and Bob, which will be making HTTP requests from 2 other nodes, Server1 and Server2, which will be running Apache2.  There will be a proxy node running tinyproxy, 4 nodes running the Tor program, and 2 routers. Once we set up the network, we will set up tinyproxy on the proxy node and Apache2 on the 2 Server nodes.  Then we will have Alice make HTTP requests of the Server1 node directly, through the proxy, and through the Tor network, while we sniff the requests.  We will then analyze this data using Wireshark to determine who is communicating and what they are saying.
    3940
    4041== Step 1 Setting Up the Network ==