Re: Question and Confirmation.

2011-01-30 Thread Matthew



On 30/01/11 02:32, and...@torproject.org wrote:

On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K bytes in 
53 lines about:
: My understanding is that Tor encrypts both the content of a data
: packet and also the header.  It encrypts the packet and header three
: times on the client (my computer) and then at each node one layer is
: decrypted until the data packet and header are decrypted to
: plaintext at the final exit node (except when TLS is used).  Right?

Actually, tor wraps the original traffic in encryption and tunnels it
through the 3 hops of a circuit.  We do not touch the original data.


SorryI'm not trying to be dumb but I'm unclear how your answer differs 
from my assumption.


Tor takes all the data (header and content), encrypts it three times on the 
client (me), and then at each node one layer is unencrypted OR is it all of 
it unencrypted at the exit node?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Question and Confirmation.

2011-01-30 Thread Robert Ransom
On Sun, 30 Jan 2011 22:33:21 +
Matthew pump...@cotse.net wrote:

 On 30/01/11 02:32, and...@torproject.org wrote:
  On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K 
  bytes in 53 lines about:
  : My understanding is that Tor encrypts both the content of a data
  : packet and also the header.  It encrypts the packet and header three
  : times on the client (my computer) and then at each node one layer is
  : decrypted until the data packet and header are decrypted to
  : plaintext at the final exit node (except when TLS is used).  Right?
 
  Actually, tor wraps the original traffic in encryption and tunnels it
  through the 3 hops of a circuit.  We do not touch the original data.

 SorryI'm not trying to be dumb but I'm unclear how your answer differs 
 from my assumption.
 
 Tor takes all the data (header and content), encrypts it three times on the 
 client (me), and then at each node one layer is unencrypted OR is it all of 
 it unencrypted at the exit node?

Each relay removes one layer of encryption.

Tor does *not* encrypt and send packet headers.  Tor only relays the
data within a TCP connection.


Robert Ransom


signature.asc
Description: PGP signature


Re: Question and Confirmation.

2011-01-30 Thread Matthew



Each relay removes one layer of encryption.

Tor does *not* encrypt and send packet headers.  Tor only relays the
data within a TCP connection.


I'm still not getting this.  My understanding is that you have the data and 
the header when using TCP.  If only the data is encrypted then what happens 
to the headers?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Question and Confirmation.

2011-01-30 Thread Andrew Lewman
On Sun, 30 Jan 2011 23:15:17 +
Matthew pump...@cotse.net wrote:
 I'm still not getting this.  My understanding is that you have the
 data and the header when using TCP.  If only the data is encrypted
 then what happens to the headers?

Does this image help at all?

https://svn.torproject.org/svn/projects/presentations/images/tor-keys.svg

Your original data is tunnelled through tor.  Your original packets are
wrapped in onionskins and moved about the globe.  

-- 
Andrew
pgp 0x74ED336B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Question and Confirmation.

2011-01-30 Thread Matthew

 Each relay removes one layer of encryption.

Tor does *not* encrypt and send packet headers.  Tor only relays the
data within a TCP connection.


OK.  I get it.  I think.

Please confirm:

The data is encrypted.  The header is not encrypted.

So if my ISP is monitoring my traffic all they see for the header is the 
connection to the first Tor node.


In which case my question is: where is the information that tells the exit 
node which DNS resolution to do and therefore which website I am asking for?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Question and Confirmation.

2011-01-30 Thread Geoff Down


On Sun, 30 Jan 2011 23:33 +, Matthew pump...@cotse.net wrote:
   Each relay removes one layer of encryption.
  Tor does *not* encrypt and send packet headers.  Tor only relays the
  data within a TCP connection.
 
 OK.  I get it.  I think.
 
 Please confirm:
 
 The data is encrypted.  The header is not encrypted.
 
 So if my ISP is monitoring my traffic all they see for the header is the 
 connection to the first Tor node.
 
 In which case my question is: where is the information that tells the
 exit 
 node which DNS resolution to do and therefore which website I am asking
 for?

 In the *HTTP* headers, which are part of the encrypted TCP data
 payload.

GD

-- 
http://www.fastmail.fm - Same, same, but different...

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Question and Confirmation.

2011-01-29 Thread andrew
On Fri, Jan 28, 2011 at 11:29:25PM +, pump...@cotse.net wrote 2.3K bytes in 
53 lines about:
: My understanding is that Tor encrypts both the content of a data
: packet and also the header.  It encrypts the packet and header three
: times on the client (my computer) and then at each node one layer is
: decrypted until the data packet and header are decrypted to
: plaintext at the final exit node (except when TLS is used).  Right?

Actually, tor wraps the original traffic in encryption and tunnels it
through the 3 hops of a circuit.  We do not touch the original data.

: The Tor FAQ says Tor is not illegal anywhere in the world.  Can
: that really be the case?  What about North Korea for example?  Tor
: as a specific tool might not be specifically illegal but surely it
: would fall under the rubric of some kind of stupid prohibition?

North Korea doesn't have Internet, much less personal computers
connected to anything.  

As for the larger question, Tor itself is not illegal that we know of.
Circumventing the state-run proxy/firewall may be illegal.  However,
I'm sure if a Ministry of Culture wants to trump up charges, crimes
against the common good or morals is a fine charge to levy on someone
in custody.  A fine bit of legal research would be to discover in which
countries circumventing a national firewall or blocklist is illegal.

-- 
Andrew
pgp key: 0x74ED336B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Question and Confirmation.

2011-01-28 Thread Matthew

 I just want to confirm one thing and ask something else.

My understanding is that Tor encrypts both the content of a data packet and 
also the header.  It encrypts the packet and header three times on the 
client (my computer) and then at each node one layer is decrypted until the 
data packet and header are decrypted to plaintext at the final exit node 
(except when TLS is used).  Right?


The Tor FAQ says Tor is not illegal anywhere in the world.  Can that 
really be the case?  What about North Korea for example?  Tor as a specific 
tool might not be specifically illegal but surely it would fall under the 
rubric of some kind of stupid prohibition?  Just wondering.