Re: [tor-dev] adding smartcard support to Tor
On Tue, Oct 13, 2015 at 4:08 PM, Razvan Dragomirescuwrote: > essentially, I want to be able to host hidden service keys on the card. I'm > trying to bind the hidden service to a hardware component (the smartcard) so > that it can be securely hosted in a hostile environment as well as > impossible to clone/move without physical access to the smartcard. The host will have both physical and logical access to your process space, therefore you're compromised regardless of where you physically keep the keys or how you acccess them. Though there are trac tickets you can search for involving loading keys into tor controller via remote tunnel without need to leave and mount or access physical devices in /dev. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Re: [tor-dev] Upcoming Onionoo version 3.0 will support searches by space-separated fingerprint
On Wed, Oct 14, 2015 at 6:46 AM, Karsten Loesingwrote: > the upcoming Onionoo version 3.0 will support searches by > space-separated fingerprint. > > "9695DFC35FFEB861329B9F1AB04C46397020CE31" > > "9695 DFC3 5FFE B861 329B 9F1A B04C 4639 7020 CE31" Instead of continuing to backport and further embed useless legacy formats, will someone please write the proposal to get rid of the damn spaces. I've covered the reasons why at least twice before. Thanks. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Re: [tor-dev] Upcoming Onionoo version 3.0 will support searches by space-separated fingerprint
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 15/10/15 23:59, grarpamp wrote: > On Wed, Oct 14, 2015 at 6:46 AM, Karsten Loesing >wrote: >> the upcoming Onionoo version 3.0 will support searches by >> space-separated fingerprint. >> >> "9695DFC35FFEB861329B9F1AB04C46397020CE31" >> >> "9695 DFC3 5FFE B861 329B 9F1A B04C 4639 7020 CE31" > > Instead of continuing to backport and further embed useless legacy > formats, will someone please write the proposal to get rid of the > damn spaces. I've covered the reasons why at least twice before. > Thanks. It seems that the introduction of ed25519 identities will allow us to find a format that doesn't suffer from shortcomings like this one. Be sure to watch that process and raise your concerns while they can still be considered. At the same time this makes it less likely that somebody will touch the current RSA identities. All the best, Karsten -BEGIN PGP SIGNATURE- Version: GnuPG v1 Comment: GPGTools - http://gpgtools.org iQEcBAEBAgAGBQJWIJIJAAoJEJD5dJfVqbCr1PUH/16dYoTH3lFkLqSfhmWDNLDQ yNYUBGB/3ro/Gn39l/1tc0+ZqgXcgtv5jvirdZ9wBrGNEzaOeEiiDcNXZpUrQ9g9 8QuPe+ERQmu/Hk20TmV0XtMh/nRpKVTWQrHBCOnIeXjhlVpyeAKUFRkUTXL5OQ3I fLYkGAli8jG8M49N9KYxiv9y4lizQFraiDqetrat1vzgngLtd5gBSXLmb6dQNHbv 7pQ1U3K9RoQ6Ra/J09CT1Ms+xIwuOHzw2TIbaBxHvmV/TkqarjMNxiRCChq1xk9Y NbaTgmaXtiPgMIR2AsM46vfmhVuGdzXCc7CtS9/yK/Udxa2lfVyTSJm57vneR2I= =jOw3 -END PGP SIGNATURE- ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Re: [tor-dev] Trac priorities and severities
Hi David. Personally I find the split severity and priority redundant but that's fine (milestone, tor version, and other fields are only applicable to core tor - it's easy to ignore yet another field). However, in this case you made it mandatory by giving it a default. Mind making priority optional? Cheers! -Damian ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev