> HS -> Guard_1 -> Guard_2 -> Guard_3 -> RP.
>
> The idea is that Guard_1 is a single node that you choose and keep for
> O(6 months, or as long as possible), but Guard_2 actually comes from a
> set of 3-6 or so nodes that you keep for O(weeks), and Guard_3 you
> rotate something like O(hours).
.
A. Johnson:
> >> The idea would be that Guard_3 would rotate on the order of hours,
> >> Guard_2 would come from a set that is rotated on the order of days
> >> (based on the expected duration for the adversary to become
> >> Guard_3), and Guard_1 would rotate on the order of months (based on
> >>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 09/11/14 12:50, George Kadianakis wrote:
> I suspect that HS authorization is very rare in the current
> network, and if we believe it's a useful tool, it might be
> worthwhile to make it more useable by people.
For what it's worth, the reason I
>> The idea would be that Guard_3 would rotate on the order of hours,
>> Guard_2 would come from a set that is rotated on the order of days
>> (based on the expected duration for the adversary to become Guard_3), and
>> Guard_1 would rotate on the order of months (based on the expected
>> duration
Hi,
I want to develop extension(intrusion detection) for tor. for that i have
to extract TCP and IP header from packet.
I need to know where and how tor handle packet(TCP/IP).
is it in buffer.c / connection.c ?
Regards
Kawsar
___
tor-dev mailing list
to