Re: Question and Confirmation.
On 30/01/11 02:32, and...@torproject.org wrote: On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K bytes in 53 lines about: : My understanding is that Tor encrypts both the content of a data : packet and also the header. It encrypts the packet and header three : times on the client (my computer) and then at each node one layer is : decrypted until the data packet and header are decrypted to : plaintext at the final exit node (except when TLS is used). Right? Actually, tor wraps the original traffic in encryption and tunnels it through the 3 hops of a circuit. We do not touch the original data. SorryI'm not trying to be dumb but I'm unclear how your answer differs from my assumption. Tor takes all the data (header and content), encrypts it three times on the client (me), and then at each node one layer is unencrypted OR is it all of it unencrypted at the exit node? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Question and Confirmation.
On Sun, 30 Jan 2011 22:33:21 + Matthew pump...@cotse.net wrote: On 30/01/11 02:32, and...@torproject.org wrote: On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K bytes in 53 lines about: : My understanding is that Tor encrypts both the content of a data : packet and also the header. It encrypts the packet and header three : times on the client (my computer) and then at each node one layer is : decrypted until the data packet and header are decrypted to : plaintext at the final exit node (except when TLS is used). Right? Actually, tor wraps the original traffic in encryption and tunnels it through the 3 hops of a circuit. We do not touch the original data. SorryI'm not trying to be dumb but I'm unclear how your answer differs from my assumption. Tor takes all the data (header and content), encrypts it three times on the client (me), and then at each node one layer is unencrypted OR is it all of it unencrypted at the exit node? Each relay removes one layer of encryption. Tor does *not* encrypt and send packet headers. Tor only relays the data within a TCP connection. Robert Ransom signature.asc Description: PGP signature
Re: Question and Confirmation.
Each relay removes one layer of encryption. Tor does *not* encrypt and send packet headers. Tor only relays the data within a TCP connection. I'm still not getting this. My understanding is that you have the data and the header when using TCP. If only the data is encrypted then what happens to the headers? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Question and Confirmation.
On Sun, 30 Jan 2011 23:15:17 + Matthew pump...@cotse.net wrote: I'm still not getting this. My understanding is that you have the data and the header when using TCP. If only the data is encrypted then what happens to the headers? Does this image help at all? https://svn.torproject.org/svn/projects/presentations/images/tor-keys.svg Your original data is tunnelled through tor. Your original packets are wrapped in onionskins and moved about the globe. -- Andrew pgp 0x74ED336B *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Question and Confirmation.
Each relay removes one layer of encryption. Tor does *not* encrypt and send packet headers. Tor only relays the data within a TCP connection. OK. I get it. I think. Please confirm: The data is encrypted. The header is not encrypted. So if my ISP is monitoring my traffic all they see for the header is the connection to the first Tor node. In which case my question is: where is the information that tells the exit node which DNS resolution to do and therefore which website I am asking for? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Question and Confirmation.
On Sun, 30 Jan 2011 23:33 +, Matthew pump...@cotse.net wrote: Each relay removes one layer of encryption. Tor does *not* encrypt and send packet headers. Tor only relays the data within a TCP connection. OK. I get it. I think. Please confirm: The data is encrypted. The header is not encrypted. So if my ISP is monitoring my traffic all they see for the header is the connection to the first Tor node. In which case my question is: where is the information that tells the exit node which DNS resolution to do and therefore which website I am asking for? In the *HTTP* headers, which are part of the encrypted TCP data payload. GD -- http://www.fastmail.fm - Same, same, but different... *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Question and Confirmation.
On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K bytes in 53 lines about: : My understanding is that Tor encrypts both the content of a data : packet and also the header. It encrypts the packet and header three : times on the client (my computer) and then at each node one layer is : decrypted until the data packet and header are decrypted to : plaintext at the final exit node (except when TLS is used). Right? Actually, tor wraps the original traffic in encryption and tunnels it through the 3 hops of a circuit. We do not touch the original data. : The Tor FAQ says Tor is not illegal anywhere in the world. Can : that really be the case? What about North Korea for example? Tor : as a specific tool might not be specifically illegal but surely it : would fall under the rubric of some kind of stupid prohibition? North Korea doesn't have Internet, much less personal computers connected to anything. As for the larger question, Tor itself is not illegal that we know of. Circumventing the state-run proxy/firewall may be illegal. However, I'm sure if a Ministry of Culture wants to trump up charges, crimes against the common good or morals is a fine charge to levy on someone in custody. A fine bit of legal research would be to discover in which countries circumventing a national firewall or blocklist is illegal. -- Andrew pgp key: 0x74ED336B *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Question and Confirmation.
I just want to confirm one thing and ask something else. My understanding is that Tor encrypts both the content of a data packet and also the header. It encrypts the packet and header three times on the client (my computer) and then at each node one layer is decrypted until the data packet and header are decrypted to plaintext at the final exit node (except when TLS is used). Right? The Tor FAQ says Tor is not illegal anywhere in the world. Can that really be the case? What about North Korea for example? Tor as a specific tool might not be specifically illegal but surely it would fall under the rubric of some kind of stupid prohibition? Just wondering.