[tor-dev] Cupcake: browser extension for flash proxies

2013-01-04 Thread Griffin Boyce
Hi all,

  Made this extension for Google Chrome to extend the concept of the Flash
Proxy, and make it easy for users to create bridges.  (and as a result
cause a bunch of fairly robust bridges to be made).  The concept could be
used in addons for FireFox, Opera, or Safari as well, since they all allow
processes to run in the background.

Benefits:
* Allows people to opt-in to becoming flash proxies, rather than current
opt-out model
* Works in Chrome OS
* Takes all guesswork out of making a bridge
* Flash proxies made with Cupcake have a substantially longer uptime than
those using site visitors
* Uses less memory than either Tor BB or Vidalia

Source code: https://github.com/glamrock/cupcake

Now that I've tested it and it seems to work well, I'd love to get input
and suggestions on it. If it's useful, I'll submit it to the Chrome Web
Store. Right now it uses the Stanford project site's embed page. If there's
much interest in this, I'll switch to a dedicated site since it's maybe not
fair to send that many requests to them ^_^;

Input, ideas, and tomatoes welcome =)

Best,
Griffin Boyce

-- 
What do you think Indians are supposed to look like?
What's the real difference between an eagle feather fan
and a pink necktie? Not much.
~Sherman Alexie

PGP Key etc: https://www.noisebridge.net/wiki/User:Fontaine
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Cupcake: browser extension for flash proxies

2013-01-04 Thread Griffin Boyce
On Fri, Jan 4, 2013 at 5:42 PM, David Fifield d...@cs.stanford.edu wrote:


 Thank you for doing this. Would you please add this information to the
 ticket at https://trac.torproject.org/projects/tor/ticket/7721? This is
 the ticket for creating a browser addon. You can create an account or
 use the anonymous account cypherpunks:writecode. There are people
 watching the ticket who will be interested in helping you test.


No sweat - didn't realize that there was a thread about it already.
https://trac.torproject.org/projects/tor/ticket/7721#comment:5


 We will probably be moving to an all-opt-in model for flash proxy. Your
 addon should send the flashproxy-allow=1 cookie, if it doesn't already


It doesn't, but I'll make that update


 At this point, it will help if you can keep it pointing to the same
 embed page. As we are on the verge of deployment, we may need to make
 changes to the proxy program quickly.

 David Fifield


Sounds good to me. I don't think it would be too difficult to get a couple
thousand users through the Chrome Web Store.

Best,
Griffin Boyce
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Improving the HTTP interface of BridgeDB: bridges.torproject.org

2013-03-21 Thread Griffin Boyce
SiNA Rabbani s...@redteam.io wrote:

 Are we also interested in translating this to other languages? Perhaps
 we can get the Farsi done ASAP, since we now have a country obfsproxy
 users coming to this page soon :)

 All the best,
 SiNA


If everyone's open to interface ideas, a rough number of bridges per day in
the past whenever would be great, in addition to the graph now.  I know
it's likely an estimate, but it would help outsiders like me make
calculations. =)

~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Tor Exit Images

2013-03-24 Thread Griffin Boyce
Hey all,

  After talking to Wendy Seltzer, I decided to bring this up on the list.
 I frequently talk to people who would like to run an exit node, but who
aren't as good a sysadmin as they'd like to be.  It would be great if there
were server images that could be fairly easily installed and then
configured.  All of these people so far have had the means to spend $150ish
a month on the required hosting, they just felt that getting it running was
a stumbling block.

  Thoughts?

~Griffin

-- 
What do you think Indians are supposed to look like?
What's the real difference between an eagle feather fan
and a pink necktie? Not much.
~Sherman Alexie

PGP Key etc: https://www.noisebridge.net/wiki/User:Fontaine
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Tor Exit Images

2013-03-24 Thread Griffin Boyce
Fabio Pietrosanti (naif) li...@infosecurity.ch wrote:

 To fix that need it would be nice to make a sort of hosting provider
 (using existing tool for customer management, payments,
 server/application deployment  maintenance) to host Tor Exit.


This would definitely be cool, though honestly I was thinking more
pre-configured bundles for common ISP(s).

~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Hidden service access without TOR

2013-04-09 Thread Griffin Boyce
Rather than going through a large process to reach hidden services without
the Tor bundle, I'd suggest instead using Tor2Web or Onion.to.  Tor2Web is
also open-source, but both are fairly reliable.

Example: DuckDuckGo
Tor only: http://3g2upl4pq6kufc4m.onion
http://3g2upl4pq6kufc4m.tor2web.org
http://3g2upl4pq6kufc4m.onion.to

best,
Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Human factors of security software

2013-04-09 Thread Griffin Boyce
  While I'm not quite sure it's what you're looking for, cross-cultural
factors come into play a lot and seriously affect trust.  I work with an
organization that (in turn) works with Chinese activists  organizers.
 It's a bit of a catch-22 that tools and guides in Chinese dialects are
critically important, but tools made in China aren't necessarily trusted.
 (Though this is probably owing to the extreme levels of infiltration in
activist communities there).  But tools that aren't trusted might be used
more often than non-translated alternatives.

...It's problematic.

best,
Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] New flash proxy facilitator domain fp-facilitator.org

2013-04-25 Thread Griffin Boyce
David Fifield da...@bamsoftware.com wrote:

 I moved the flash proxy facilitator to a new domain, fp-facilitator.org.
 This is to get it away from bamsoftware.com, which also has a lot of
 unrelated stuff. The old facilitator name tor-facilitator.bamsoftware.com
 will continue to work (the DNS for both points to the same place).
 https://trac.torproject.org/projects/tor/ticket/7160 is the ticket.

 David Fifield


I'll push an update to Cupcake [1] that has permissions on the new domain.

~Griffin

[1]
https://chrome.google.com/webstore/detail/cupcake/dajjbehmbnbppjkcnpdkaniapgdppdnc

-- 
Please note that I do not have PGP access at this time.
OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Status of Torouter project

2013-05-13 Thread Griffin Boyce
Jacob Appelbaum ja...@appelbaum.net wrote:

 Yes, it is. I'm working on it and so are a number of other people.

 All the best,
 Jacob


 Good to hear.  Is there a tentative date for a beta release?

best,
Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-05-19 Thread Griffin Boyce
Matthew Finkel matthew.fin...@gmail.com wrote:

 So I think we should make some terms clear (just for the sake of
 clarity). We have, I guess, three different naming-system ideas
 floating here: petnames, (distibuted) namecoin-ish, and centralized
 consensus-based - rough summary.

 Some months ago, the petname system interested me enough that I started
 to write a proposal for it. At this point, it's wound up in bitrot.
 Though I'd spent a bit of time working on it, there was no comprehensive
 way to accomplish it.


  I too started writing a petname proposal only to have it wind up on the
backburner.

  In a nutshell, there would be a sort of pseudo-DNS that allow a given
.onion to define a petname through a file on their site.  For example,
somename.onion/petname.txt could shorten the address to bettername.pet.
 The pseudo-DNS would check if a hidden service is alive once every few
days, and if the onion is down for thirty days, the petname is freed up for
someone else to use.  This has the side effect of promoting good onion
upkeep.

  I like the idea of federating hidden services and eepsites into one
petname system, but not sure how possible/practical that would be.  Of
course, there's really nothing keeping an independent actor from making
this and offering it as a firefox plugin for those who might want to use it.

Thoughts?

~Griffin
-- 
Technical Program Associate, Open Technology Institute
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] New flash proxy facilitator domain fp-facilitator.org

2013-06-30 Thread Griffin Boyce
I've updated the Cupcake extension already.  Thanks for the heads up. :)

~ Griffin

-- 
Sent from a phone, please excuse fatfingers and grammatical errors.
On Jun 30, 2013 5:55 PM, David Fifield da...@bamsoftware.com wrote:

 On Thu, Apr 25, 2013 at 01:32:08AM -0700, David Fifield wrote:
  I moved the flash proxy facilitator to a new domain, fp-facilitator.org.
  This is to get it away from bamsoftware.com, which also has a lot of
  unrelated stuff. The old facilitator name
 tor-facilitator.bamsoftware.com
  will continue to work (the DNS for both points to the same place).
  https://trac.torproject.org/projects/tor/ticket/7160 is the ticket.

 The SSL certificate for the old tor-facilitator.bamsoftware.com will
 expire on 14 August. I'm planning to let it expire, unless someone
 critically needs it. Public flash proxies should all be using the new
 fp-facilitator.org domain.

 David Fifield
 ___
 tor-dev mailing list
 tor-dev@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Retiring old user number estimates

2013-09-16 Thread Griffin Boyce
  I would actually really appreciate the old numbers (from ~2007-8/2013)
being kept online.  Estimating growth over time and mapping spikes is
kind of a big deal to me. =)

~Griffin


On 09/16/2013 02:28 PM, Karsten Loesing wrote:
 Hi everyone,

 some of you may already know our new approach to estimating daily Tor users:

 https://metrics.torproject.org/users.html#userstats

 This new approach is in beta since April, and I'm quite happy with it.
 I trust the new numbers more than the old ones, both for direct users
 and bridge users.  The new code for direct users is quite similar to the
 old one, but much cleaner.  The approach for bridge users is a much
 better idea than the old hack.  Today I added the missing features like
 the top-10 lists and the censorship detector.

 Why do I tell you this?

 Because the old approach uses resources on our poor, already overloaded
 metrics machine, and I'm planning to shut down the old approach in the
 very near future.  Here's the plan:

  - Compute user numbers for 2012 and before; the current numbers start
 on January 1, 2013.  This is going to take at least until September 23.

  - Take out the BETA labels and throw out everything above New
 approach to estimating daily Tor users (BETA).  This could happen on
 October 1.

 Thoughts?  Did I miss anything that's worth keeping?  Anyone want to
 create an archive of their favorite graphs before I pull the plug?

 All the best,
 Karsten
 ___
 tor-dev mailing list
 tor-dev@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev



-- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] OnionMail First Test

2013-09-16 Thread Griffin Boyce

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 09/16/2013 09:51 PM, Liste wrote:
 Work complete for the version 0.0.0Beta

  Any chance you could upload your project to github, or a similar site
so that people can review it before downloading?  Github also uses SSL,
which does offer some amount of protection when downloading random bits
of code.

~Griffin

- -- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=oPlE
-END PGP SIGNATURE-

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Attentive Otter: Analysis of Instantbird/Thunderbird

2013-10-09 Thread Griffin Boyce

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

  So the lack of OTR support in Instantbird is nearly a dealbreaker for
me, as it makes it a bit more likely than a rogue exit could intercept a
user's communications. Though this depends in part on SSL/TLS support
and whether a user *actually enables* it in their settings.

  Would the plan be to create and test a reliable OTR patch for Instantbird?

  Pidgin's big issue before was DNS leaks. How is this addressed by
Instantbird? (okay, there are a few big issues with Pidgin but...)

  I like Instantbird's UI, but we should come up with a plan to set
proper defaults.

~Griffin


Mike Perry  Sukhbir Singh wrote:
   - No OTR support yet
 + OTR support tickets:
   https://bugzilla.instantbird.org/show_bug.cgi?id=877
   https://bugzilla.mozilla.org/show_bug.cgi?id=779052
 + For a stopgap/prototype: We can use the js-ctypes wrapper of libotr
   along with the message observer API
   + Example observer API use w/ rot13:
 http://hg.instantbird.org/addons/file/tip/rot13
   + JS-Ctypes wrapper for native libotr:

http://gitorious.org/fireotr/fireotr/blobs/master/chrome/content/otr_wrapper.js
 + The ctypes wrapper can be converted to an XPCOM wrapper later.
 + According to sshagarwal #maildev on irc.mozilla.org, Mozilla is
   also working towards implementing all of the primitives needed
for OTR (and OTR
   itself) in NSS. These are listed in this comment:
   https://bugzilla.mozilla.org/show_bug.cgi?id=779052#c17
   + We could also rely on the ctypes wrapper until native support is
 available, and possibly skip an XPCOM libotr wrapper entirely.


- -- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=5/Gh
-END PGP SIGNATURE-

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Browser extension identification/fingerprinting mitigation?

2013-10-26 Thread Griffin Boyce
Hi all,

  I'm looking at possibly replacing the images used by Cupcake with
inline SVG XML, to reduce the possibility of fingerprinting/identifying
Cupcake users who use Chrome [1].  One of the more talked-about methods
of identifying a user's browser extensions is to look for images used by
the extension (in Chrome at least), so this seems to make some amount of
sense. [2]

Does anyone have any thoughts on this?

~Griffin

[1]
https://chrome.google.com/webstore/detail/cupcake/dajjbehmbnbppjkcnpdkaniapgdppdnc
[2] http://blog.kotowicz.net/2012/02/intro-to-chrome-addons-hacking.html

-- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Help me guague how full your plate is via regular check-in conversations

2013-10-30 Thread Griffin Boyce
On 10/29/2013 07:30 PM, Tom Lowenthal wrote:
 Any questions or suggestions?

 -Tom

  Is this a tor dev thing, or a devs who work on tor-related projects
but who are not part of tor thing?

~Griffin

-- 
Cypherpunks write code not flame wars. --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Registering special-use domain names of peer-to-peer name systems with IETF

2013-11-07 Thread Griffin Boyce
Nick Mathewson wrote:
 establishing the precedent that if you make a P2P network that uses a
 new virtual TLD, you can officially own that TLD forever for free 

  Well, if the barrier-to-entry is ten(ish) years of hardcore
development, a robust research community, and hundreds of thousands of
daily users, then that might be an acceptable precedent to set :-D

  Though I am slightly saddened that I'll never own notatrap.onion ;-)

~Griffin

PS: thanks for doing this, Christian!

-- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Finalizing translation strings

2013-11-12 Thread Griffin Boyce
  So I'm hiring translators for Cupcake, for Persian and
Urdu translations.  As it turns out, this is surprisingly inexpensive.
Because I'm hiring translators anyway, I want to go ahead and donate
translations of Tor project strings.  (Especially Urdu, which is
inexpensive, but difficult to find volunteers for).

  After looking at Transifex for a few projects, there
seem to be some extraneous strings. Torbutton and TorBirdy both
have a lot of single-character strings which don't make sense (or lack
context).

  After chatting with Runa, decided to go ahead and post this to the
list.  If strings could be updated/finalized by early December, that
would help the process a lot. =)

best,
Griffin

-- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Finalizing translation strings

2013-11-12 Thread Griffin Boyce

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Nima Fatemi wrote:
 I didn't find it on torproject page. but anyways here it is:

 https://www.transifex.com/projects/p/cupcake/language/fa/

 Please donate the /whatever amount of/ money you had in mind for this
 translation to Tor Project.

 My small contribution. Only for David's great job.

 Bests,Nima

  Thanks so much!  Tor's Persian page is at:
https://www.transifex.com/projects/p/torproject/language/fa/  I will
donate that money to the tor project.

  David does amazing work and I am incredibly honored to be using
flashproxy as the basis for this project.

thanks again,
Griffin

- -- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)

iQIcBAEBAgAGBQJSgtnJAAoJEOMx/SmueSyX0+gQAKqYO/LuVLM6XPZmCCjAbCLf
uWoLFZEqrMMTD6b2FA/GRzEgCC2tsQ78lUDUY2xVrcVS4uunzhzP8OIUwDeNGyH9
lmmp4LqGTC8uFHXxuS4SPqFAdcIWZG2U83SGZrEYKfbWV+77WmS9bgCuF0qiEV7G
7YoHA/b2oh2VkvMM6Q+C9MNKolJyA7nm1KxzCRHmR9pT5eyvsbAk2OrZXYOtNxVB
1HQxjoryOeXWd7mraj+YpCT1AR95Erb4hF6JE+hkplgmULHAZdTK2+QeeXxKxYm2
m7CS4Va2FxJoPW6fd/As0LMODnbyODDyLqpNjZMaIo0abGvEmkoetyfjT/TUPAhd
HPss+u/O3JAc1wXrOOwcgjIW765blUXqIDH+RO4vbvlH6ITv9z2GwqQFGKgxTfdX
isaGChIkM3vIvEHhw8p/2gq7gYNPprTnHbkD9O/cuaMxwhbczLVLhTygf8ENGJQ7
K3Oua3cvRYPpH0wCBu+4UNV9ZYO7MpiSd3HJHxyWuVrtcP5YqTzT+B0hdo6DCbOH
KR82lOqblDfwT/kD6T5D/m61QLXGhBzZvmyTIZAZTrRSP+Y+wjXx4kfBFOoxqhqM
M/jBD94LMr4pZJNDUvgO9kWpWiHLL2DVcINVqpew8Hv9zEIh5vATXDuuAOgQyZvZ
CvomcyL8+q55jRpzA6Sl
=lbE7
-END PGP SIGNATURE-

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Apple App Store Redux

2013-11-20 Thread Griffin Boyce
Sorry for taking so long to respond to this thread.  Responses are
(mostly) inline below.

  At a training event a couple of days ago, a user was sketched out by
the warning her Mac gave her -- in spite of the advance notice she'd
been given by the trainers.

Erinn Clark wrote:
 Please see Ralf's reply to me elsewhere in the thread -- do you still
 think this while taking into account what we know about US companies'
 cooperation the NSA/USG with regards to turning over user data?

  This is an extremely important point, and I don't want to minimize
user risk in this regard. But I think that it needs to be weighed
against the probability that it will expand availability to censored
users. (Especially if the bundle uploaded is the pluggable transport
bundle, hint hint hint).

  The situation is similar to Orbot's deployment (as Nathan points out).
Censor X would have to block the app store in order to block access to
Orbot, but the trade-off is that Google gets a list of people interested
in anonymity.

  Part of me feels that if a user is using an Apple device, they're on
the hook to do their homework -- responsibility and informed consent and
definitely in play there. AFAIK, the last bug submitted was #6540.

  However, having said all of that, it turns out that Tor doesn't need
to distribute it via app store to distribute a signed app [1] (there are
two types of certificates). Though the signing situation itself is
complicated (eg, Apple would still likely know that you've downloaded Tor).


and...@torproject.is wrote:
 I agree with this method. I don't think The Tor Project should be the
 one maintaining Tor-something in the App Store. I'd rather a trusted 3rd
 party who signs a trademark licensing agreement with us be the person
 who maintains an App Store presence.

  I really like this idea. My only real concerns are about licensing and
whether Apple would consider a Tor-licensing dev to be effectively a
proxy of the Tor Project Inc.  Also, the tpo site right now indicates
that someone could just submit TBB to an app store without a licensing
agreement, so that could use clarifying.

  Other than that, agree with Naif :D  To Nathan's point, Macs and
Chromebooks subscribe highly to the walled garden model of app
accessibility, and more users look to Apple's blessed apps than for
independent solutions.  This is either a good thing or a bad thing,
depending on your outlook (broader userbase vs. better-educated users).

abusing his parenthetical privileges,
Griffin

[1] Page 11 of:
https://developer.apple.com/library/mac/documentation/security/conceptual/CodeSigningGuide/CodeSigningGuide.pdf

-- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] What happened to Tor Router?

2013-11-23 Thread Griffin Boyce
Fabio Pietrosanti (naif) wrote:
 I mean supporting many hardware devices, rather than going with a custom
 hardware?

Hey Naif,

  Access Labs' openwrt-based torouter firmware is still the best and
most stable.  It worked pretty well for me back in August on a TP-Link
N750, and earlier on a Buffalo router, so it's worth looking at.  PORTAL
is also a cool project, but tbh I don't know much about it.

  This is the sort of project that someone should pitch to RFA when the
next Open Tech Fund round opens in January.  In my mind, the ability to
make your own torouter out of inexpensive (and ubiquitous) routers
somewhat trumps having open-hardware torouters available for purchase. 
But all work in this area is a true labor of love, and it makes sense
for people to pool their efforts where they feel the greatest impact can
be made.

~Griffin

(unsurprisingly, I speak only for myself and not my employer)

-- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] exit-node block bypassing

2013-12-31 Thread Griffin Boyce

Hey Ximin,

  I don't think it's been discussed in-depth before (at least not 
on-list), but I've thought a fair bit about it. While it's an 
interesting idea, I don't think that the risks for deploying it far 
outweigh any minor reward that could come of it.  This idea has come up 
several times in the context of Cupcake wouldn't it be great if we 
could sort of thing.  It really wouldn't.


  Exit node operators take on some pretty serious legal and security 
risks if they operate their exit from home. (NEVER DO THIS).  More than 
one person has been raided by police who didn't do their due diligence 
beforehand.  Expanding that into the territory of people who aren't 
fully aware of their risks would have terrible repercussions.


  It also becomes trivial to flood the Tor network with bad ephemeral 
exits, which disappear before people catch on.  Speed would be an issue 
also.


  While I really believe that expanding Flashproxy and Fog and Bridges 
is extremely important, I don't that's plausible for exit points.  
Educating groups of website owners about censorship would help us a lot. 
 Circumvention isn't something that's thought a lot about in the US, 
which unfortunately is where a lot of large websites are based.  
Unblocking all or portions of [big website] can be extremely helpful to 
at-risk groups of people, and that's not always obvious to sysops.


~Griffin


Il 31.12.2013 06:07 Ximin Luo ha scritto:

Hey all,

Flashproxy[1] helps to bypass entry-node blocks. But we could apply
the general idea to exit-nodes as well - have the exit-node connect to
the destination via an ephemeral proxy. The actual technology probably
needs to be different since we can't assume the destination has a
flashproxy (websocket/webrtc) PT server running, but we could probably
find a technical solution to that.

However, I talked this over with a few people and there might be legal
and security issues. A few points:

- running an exit node carries a great risk, it would be bad/unethical
to let ephemeral proxy runners take this risk
- (for security reasons we don't fully understand) there is a process
for trusting exit nodes and/or detecting misbehaviour (I see badexit
emails from time to time). this would be made much harder if exits
were ephemeral.
- someone could create a massive number of ephemeral exit nodes and
capture a lot of exit traffic, giving them extra data to de-anonymise
people.

I was wondering if any of these have been discussed in depth before
already, or if the general topic of exit-node block bypassing is
something to be explored.

X

[1] http://crypto.stanford.edu/flashproxy

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread Griffin Boyce

Ximin Luo wrote:
In my understanding, the anonymity set doesn't apply to use of PTs 
since this is only at the entry side. The exit side does not know[1] 
what PT the originator is using, so is unable to use that information 
to de-anonymise.


[1] at least, in theory should not know, perhaps someone can check 
there are no side-channels? would be pretty scary if exit could work 
out that originator is using PTs.


  Anonymity is still a consideration, even if it's highly unlikely to 
be impinged upon by pluggable transports.  For example, if a network 
notices someone connect to a known obfsproxy bridge, then they can make 
an educated guess that the person is using both Tor and obfsproxy.  With 
flashproxy, this is of much less concern given address diversity.  With 
bananaphone, it wouldn't really apply at all as far as I can see.


~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Fwd: [OpenITP Dev] Python Javascript volunteer?

2014-01-29 Thread Griffin Boyce

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

OpenITP  TA3M have had a python dev ask if STEM or txtorcon need
assistance =)  For more details, talk to Sandy (sandraordo...@openitp.org).

~Griffin

-  Original Message 
Subject: [OpenITP Dev] Do u needa Python  Javascript volunteer?
Date: Wed, 29 Jan 2014 10:45:46 -0500
From: Sandra sandraordo...@openitp.org
Organization: OpenITP
To: d...@lists.openitp.org



I've started asking at TA3M if people are interested in volunteering
to shot me an email with qualifications. Do any of your projects need
someone like this

You said I should shoot you an email since I was one of the women
in New York and also to get involved volunteering. I would like to
help with development for one of the projects - I am currently
programming in Python and JavaScript - I do Django development, and I
have some background in security. I saw on the site that stem and
txtorcon are in Python - do either of those groups need assistance?
Also feel free to ask if you guys need help with set up or organizing
local events.

Let me know, I'll make intros :)






___
Dev mailing list
d...@lists.openitp.org
https://lists.openitp.org/mailman/listinfo/dev



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iQEcBAEBAgAGBQJS6SLCAAoJEAPPSgqzx5pjUUEH/1ybIOkHrUxnkBs0Sjmu4TP9
O/zsPLFFnGFOvDFrQCsv8nErNTgeSivpTT9I2+4FeIpDu4VEEdwnyCOe7qpAZE63
sef/zX2oZaMPAlM8Fbyjz1jUCUXgo1SsSFGpEGK35WiQi1O3Xa5kbBRn05oc7jvU
Qspjd9wf/C6A23usK2Jq3XA7/sJf8oCXl+f6zBXTb+yhXJX+ZqunwYb6Xks2De3U
pzTaOuVChcmlfFGTwPKND1io4Bhx/coi3+ANg2fNvHkyTLZRLHly7TkjRhc34lPs
9hCeMsfjoPHqFNu1zUSZ+qTmcmMtSiY/SaG8Kmkpz5UeCgkCWJR23VksTiXAiP4=
=PWtb
-END PGP SIGNATURE-

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Weekly Tor dev meeting: Tuesday 25 Feb, 20:00 UTC

2014-02-24 Thread Griffin Boyce

On 2014-02-24 12:59, Roger Dingledine wrote:

I see this was answered on irc, but to answer it here for completeness:
it is my understanding that the Tuesday dev meeting will be held on
Tuesday this week. :)


  Is this for little-t tor, or more user-facing projects like TBB?

~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Novel distribution mechanisms (was: s3 alternatives on libtech)

2014-03-07 Thread Griffin Boyce
Nathan of Guardian wrote:
 Github? Maybe not whole sites, but specific files.

  I've been working with users who have networks in censored countries
to expand access to specific software bundles (not just Tor).  My two
approaches right now are Google Web Store and torrents attached to a
stable offsite seedbox.  Both are fairly accessible, but both have
pros/cons.  With torrents, someone can sit as a seeder and try to tally
information on downloaders. Google Web Store downloads are tracked in
unknown (legally requestable?) ways by Google and of course it requires
downloading/installing Google Chrome to gain access.[1]

  It's not perfect, but at least for the user groups I talk to, they are
realistic solutions to a really tricky problem.

~Griffin

[0] cross-posted upon recommendation of David Fifield
[1] most users can't figure out how to download extensions manually
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Novel distribution mechanisms (was: s3 alternatives on libtech)

2014-03-07 Thread Griffin Boyce
Nathan Freitas wrote:
 Have you looked into BitTorrent Sync? You can do semi-private (I
 believe) Dropbox-like Torrent shares, that could be provisioned based on
 emails or other requests from users.

 There is a really nice mobile BitTorrent Sync app, so I have
 particularly been interested in this as a means to distribute apps to
 Iran and China.

 +n

  I haven't looked into BitTorrent Sync, actually.  But that sounds like
it could be an improvement on torrent distribution (or at least an
additional approach).  I'm not sure to what extent user downloads are
tracked via mobile phones in the target areas, but my assumption is
100%.  Having said that, I'd like to know more -- and it makes absolute
sense for something like Orbot to be distributed friend-to-friend via
BlueTooth or something like BitTorrent Sync.

~Griffin
gpg: 879B DA5B F6B2 7B61 2745  0A25 03CF 4A0A B3C7 9A63
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Novel distribution mechanisms (was: s3 alternatives on libtech)

2014-03-10 Thread Griffin Boyce
David Fifield wrote:
 GitHub is how Chinese users download GoAgent. It's a little weird, but
 they keep the binary right there in their source tree (goagent.exe).
   https://github.com/goagent/goagent/tree/3.0/local
 GitHub is great because it's HTTPS only, projects are subdirectories
 rather than subdomains (so no DNS poisoning), and it's important
 infrastructure that's difficult to block.
 
 David Fifield

  It would also be fairly trivial to create and maintain a repo just for
newest TBB release and signatures.  Not the fastest thing to `git clone`
as a dev, but makes it possible for a user to visit the page and
download a zip file for their language and the signature to verify it.

  Of course, if every project did this, it would change the equation a
bit for censors, but we won't know until we try ;-)

~Griffin

[0] this is a project that is *so* easy that someone could just go ahead
and do it, but of course it's far better to have an official repo
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] TBB for Chromebooks?

2014-03-16 Thread Griffin Boyce
Hello all,

  Is there a plan to port TBB for chromebooks? 
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Moving ownership to TheTorProject

2014-04-01 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

  In your git config, you can define a pushurl that is different from
url.  Which effectively means that you can pull from github but push
to tor.

  So in .git/config, your entry would look something like this
(double-check pushurl syntax):


[core]
repositoryformatversion = 0
filemode = true
bare = false
logallrefupdates = true
[remote origin]
url = g...@github.com:zackw/stegotorus.git
fetch = +refs/heads/*:refs/remotes/origin/*
pushurl = za...@gitweb.torproject.org/stegotorus.git
[branch master]
remote = origin
merge = refs/heads/master


  You could also clone to new directory, change the origin to tor,
then push each branch.  Unless there are just tons of branches, this
should only take a couple of minutes =)

best,
Griffin


On 04/01/2014 11:01 AM, Zack Weinberg wrote:
 On 02/20/2014 10:48 AM, vmonmoonsh...@gmail.com wrote:
 Hey Zack,
 
 I want to put up Stegotorus up for GSoC this summer. I was
 wondering if you mind transfering the ownership of your
 Stegotorus repo:
 
 https://github.com/zackw/stegotorus
 
 To TheTorProject on github:
 
 https://github.com/TheTorProject
 
 ? (https://github.com/zackw/stegotorus/settings then Transfer)
 
 If you don't feel comfortable, we can fork it as well.
 
 [ Background for tor-dev: I am no longer involved in Stegotorus 
 development.  vmon and at least one other person are continuing to
 work on it; this is currently happening in non-default branches of
 the copy on my github account.  There is also a copy of the repo
 on gitweb.torproject.org but it has not been updated in quite some
 time. ]
 
 I discussed this with Roger on IRC yesterday and we came to the 
 conclusion that instead of transferring my Stegotorus repo to the 
 TheTorProject organizational account, 
 gitweb.torproject.org/stegotorus.git should be promoted to the
 master copy.  I think right now I am the only person with write
 access to that copy, and I am not sure what the right procedure is
 for granting you access.  I'm also not good enough at Git to know
 how to copy all branches of remote A into remote B (short of
 tedious manual actions and/or shell loops).
 
 I think this would also entail using Tor's Trac for issues instead
 of Github's issue tracker.
 
 zw
 
 
 
 ___ tor-dev mailing
 list tor-dev@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTOtnhAAoJEAPPSgqzx5pjlKgH/AmLj3tHAOPg3VvJaDHAt/Nh
ZesH9vJrF2ZdipJhK0QTXnOHsdk5nIxNlnNC/VRLv09At7mzu4X5l9ZvECLlj64f
JeQVhHJ4lFj141mc1LabBnGoppYHOssBMS2HZH0ef8pEGyOJwhacYILDuzIfmn1A
Zs21V9EKd6WIIyyLtnA5BNNZmMHWSCqVSxbXDMM3Sk8lRupYzD2FF4D6xkdlqW3A
WKMBLTA0MTOVDkmJVYv0e65A05hFOv6Fxh/YF41HrgIhjulv6fdK50Y5pFqaKuv6
BU1hU3n80rWPnLjezUj8a/cd2ZliXUVMElAnyoVd41Nprfem2XuJMT3UmgShydQ=
=Kdkg
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] [Flashproxy] Some sites filtering users?

2014-04-18 Thread Griffin Boyce

Hey all,

  Got a report from a friend* who noticed that twitch.tv stops letting 
him watch broadcasts while flashproxy is in an active state.  He uses 
Cupcake, which shows flashproxy's status in the icon bar, and he only 
has an issue when the cupcake icon has a mustache.


  Has anyone noticed similar behavior when using flashproxy?

~Griffin

* who is a hacker
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] GSoC: Pluggable Transports Combiner

2014-04-26 Thread Griffin Boyce

quinn jarrell wrote:

Hi everyone,

My name is Quinn Jarrell and I'm a student University of Illinois at
Urbana Champaign. I'm excited to join GSoC and I'll be working on
building a pluggable transporter this summer for Google summer of
code. The pluggable transports combiner will allow transports to be
chained together to form more varieties of transports and make them
harder to detect and block. You can read more about it here: [0].


That's *awesome* ^_^  Please keep us all in the loop! Very excited to 
see how your project progresses.


best,
Griffin

(monchichi on IRC)
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Torspec proposal for adding new X- fields to relay descriptor

2014-07-03 Thread Griffin Boyce
In addition to explicitly forbidding newlines, perhaps it would be a good idea 
to either strip them entirely or ignore any value with a newline.
-- 
Sent from my tracking device. Please excuse brevity and cat photos.___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-24 Thread Griffin Boyce

isis wrote:

Do you have a better suggestion for what to call vanilla bridges?


  I keep calling them standard bridges (as opposed to fancy, 
monocle-wearing bridges).  People seem to understand immediately that 
other types of bridges are special somehow if I call 
regular/vanilla/non-obfs bridges Standard.  And then I explain how obfs 
bridges and flashproxy are used in different circumstances.


  Also, I vote that we ditch the 'obfs' name from obfs5 and beyond in 
favor of 'crypto-voltron.'  This will also make user education 40% more 
awesome.


  As an aside, I'm happy that 'huggable transports' [1] is a thing now 
:D


best,
Griffin

[1] https://twitter.com/abditum/status/431665969627672576
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Lunar wrote:
 We can't just make Tor Browser stop accepting obfs2 because some
 people are using obfs2 bridges right now. But we shouldn't add more
 people to the set of users of a broken protocol.

  We should really be reaching out to those running obfs2 nodes and
convincing them to move to obfs3 if at all possible.

  Related question: are there geographic areas where standard bridges
are being blocked, where obfs2 are still usable?  If so, maybe in the
future it would be possible to restrict distribution of remaining
obfs2 bridges to those areas.  But on the whole I agree that giving
those out is problematic.  Unless they comprise a large portion of
bridges, maybe it's time to phase them out of bridgeDB (not
necessarily TBB).

best,
Griffin

- -- 
Wherever truth, love and laughter abide, I am there in spirit.
- -Bill Hicks
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iQEcBAEBAgAGBQJT0f/jAAoJEAPPSgqzx5pjSn0IAIpa7EY0si58vgM61Zqzt3Fi
qCICh7CMpLBWJqWJVF+1kv09L+28ZEsGkrvR+9nzjmd2lOAUJZvtgvOMgv81YTUc
jPF+ZhvAwh0vdyvk0ANmncO3uI7yBN6Xsxam6iIjERksLRwgPfxJNLwdGYC2235J
eKVVWmlQpvLW1oTsnUU1Gw/5rChIYMnsJisUDeVoz/yJ3HAl5hCqjdSwXVAmzdjJ
P0cR7034iLfhnYotVfeDpyxUwrNp6yFeE2b8QcZVlLjW0pTPUMXMmwJ73GQ9egIp
KLqKq0RcUPijoNLI0AIt8aZGm40FV0gixGbxWl2AvSr1wIWqt2jIB7nBGvZdHfg=
=0jn8
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Decentralized VOIP (or video chat) over Tor

2014-08-15 Thread Griffin Boyce


  This is similar, though not *quite* the same.  A while back ioerror 
released FreeNote[1], which makes it easier to broadcast audio and video 
on a hidden service.  This is a pretty cool idea and works pretty well.  
AND it should be pointed out that two one-way conversations can be a 
two-way conversation by virtue of just sharing the links over OTR [2].


  Scott Ainslie and I discussed the possibility of taking that basic 
two-way conversation hidden service concept and making a GUI for it with 
Glade+GTK.  Unfortunately, neither of us really have the time or 
expertise for this endeavor.  I got as far as wireframing some ideas 
before going face-first into developing a more time-sensitive project 
[3].  I'd love it if someone actually did this and released their 
prototype as free software.  There are way too many issues with 
centralized services like Skype and Google Hangouts.[4]


best,
Griffin


[1] https://github.com/ioerror/freenote
[2] Of course, if someone shares the links further, there can be privacy 
issues.

[3] Satori: https://github.com/glamrock/Satori
[4] and jitsi never recognizes my fucking microphones =/

On 2014-08-15 21:43, Jordan wrote:

Hi, terryz,

Thanks for the idea! Today I was actually wondering if *video* were 
possible,

too. :-D

Guardian project has [Ostel](https://guardianproject.info/apps/ostel/). 
Is
that what you're wanting? If not, was there a feature you were wanting 
from

Ostel or another application that has features that Ostel doesn't?

As for decentralized, I think the whole point of tor is that tor 
itself is

decentralized. Check out [Running a relay]
(https://www.torproject.org/docs/tor-doc-relay.html.en) to see how this 
works.


Again, thanks for the input! :-D

On Friday, August 15, 2014 05:53:44 PM ter...@safe-mail.net wrote:

Hi,

I'm interested an anonymous decentralized VOIP network on Tor. All 
traffic

routed through Tor. Every Tor user being an optional server for PTT or
Continuous Speech.

How feasible does this sound?


--TZ
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Debian popcon as a vulnerability?

2014-09-13 Thread Griffin Boyce

Hello all!

  I am wondering whether to force-uninstall Debian's popularity-contest 
package as part of Stormy's installation process. It would be good to 
have an idea how popular Stormy is, but on the other hand, I'm not sure 
how anonymous the reporting is on Debian's end.


  This is also relevant for users of the tor package, who might also be 
at mild risk (though far less so because the number of users is so high, 
and doesn't reveal location of location-hidden services).


  Anyone have opinions on this? I'm leaning towards checking if 
popularity-contest is installed and then asking if the user would like 
it to be removed.  If y'all have other recommendations, please comment 
here or on the ticket.


Ticket: https://trac.torproject.org/projects/tor/ticket/13154

thanks!
Griffin

--
I believe that usability is a security concern; systems that do
not pay close attention to the human interaction factors involved
risk failing to provide security by failing to attract users.
~Len Sassaman
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Making and distributing custom TBB with a new home-page

2014-09-21 Thread Griffin Boyce

On 2014-09-21 11:32, Fabio Pietrosanti (naif) wrote:
Have you considered just distributing Tails USB sticks along with the 
.onion

address on a piece of paper?


We've considered it, but it was outside the logistically doable
opportunity, as far as i understood.

Sounds like the most apparently obvious solution for our community,
are not so easily applicable in that context of use by speaking with 
the

end-users.


  Yeah, even if you distributed DVDs with the .onion address written on 
it, there's still a trail leading from them to you (however tangential). 
 Better for press organizations to provide potential whistleblowers with 
easily-understood documentation and try to be as pervasive an option as 
possible.


~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-21 Thread Griffin Boyce

Roger Dingledine wrote:

h) Back to the community again. There have recently appeared a few
   messaging protocols that are inherently using HSes to provide link
   layer confidentiality and anonymity [1]. Examples include Pond,
   Ricochet and TorChat.


  There are also a fair few IRC and XMPP servers floating around 
onionland (and soon to be many more via Stormy).  I'm also really 
curious what the impact that Pond would have on the HS landscape if it 
become popular.  Right now, there are probably only a handful of people 
who run their own independent Pond HS, but that could change.


  There's also onionshare, which creates hidden services as-needed -- 
which are typically discarded after sharing a single file one time.



   It might be worth researching these use cases to see how well Tor
   supports them and how they can be supported better (or whether they
   are a bad idea entirely).


Yes. My guess is that it's lightweight to establish a circuit with each
of your friends, and then when it goes away you try to reestablish it
and if you fail then your friend is probably gone. And my guess is that
it's heavyweight to try rendezvousing with each of your friends every
5 minutes to see if they're still there.

We should put up some guidelines for eco-friendly use of hidden 
services

in this situation.


  Scott Ainslie and I came to the conclusion that two one-way video 
conversations over hidden services is a pretty decent replacement for 
Skype etc[2].  At a really crude level, this can be achieved using 
gstreamer (maybe with FreeNote[1]) and then sharing the hidden service 
addresses with each other.  Some assembly required, obviously.  It's my 
undying wish that someone create a proof-of-concept app for this using 
gtk or kivy or something.



== Opt-in HS indexing service ==

The question of whether this has to be built-in is a fine one to
explore. I bet we'd get more people doing it if it were just a torrc
option that you can uncomment. But it also seems inherently less safe,
since it might mean more publishings by your Tor than the human would 
do.


  It would definitely get more opt-ins than if there were additional 
steps.  There's a measure of informed consent there, because if you are 
opting in intentionally, then you are saying that you want your hidden 
service publicized.  Any given person running a library or art project 
might think Oh nobody cares about my hidden service and not bother 
going through additional steps, but would be perfectly happy to have 
more people look at their work.


  The question, to me, is how to frame the torrc option so as to make 
sure people know it's optional.



- #8902 	Rumors that hidden services have trouble scaling to 100 
concurrent connections


  I've been curious about this ticket for a while, and happy to 
structurerun a follow-up test on a controlled server.  Since the 
original problem was with an IRC server, it makes sense to set one up 
for the purposes of a test, and then set up a secondary machine for 
'user' connections and an extra monitoring point.


  I suspect that there are other factors that might have influenced that 
report.  Could it be an issue with one of the intermediary points?  
There certainly *seem* to be tons of people using the OFTC hidden 
service, but that could be perception (ie, still 100 concurrent users).




What useful projects/tickets did I forget here?


1) We should identify and describe the great use cases of hidden 
services,

especially the ones that are not of the form I want to run a website
that the man wants to shut down.


  One thing that is interesting: in practice, onionshare (RetroShare et 
al) winds up being easier than trying to share a file with a friend 
using third-party services.  Particularly for large-ish files or 
something where you want some measure of privacy (ohai dropbox), sending 
it to a third-party and then making it available to your friend and then 
deleting/hiding it again is a little annoying.  (And there are of course 
privacy and cost tradeoffs with this as well).


  People like to set up private IRC  Jabber chats to chat without 
attracting trolls and spambots, and get an extra layer of encryption 
from Tor.


What sorts of hidden service examples are we missing from the world 
that

we'd really like to see, and that would help everybody understand the
value and flexibility of hidden services?

Along these lines would be fleshing out the hidden service challenge
idea I've been kicking around, where as a follow-up to the EFF relay
challenge, we challenge everybody to set up a novel hidden service. We
would somehow need to make it so people didn't just stick their current
website behind a hidden service -- or maybe that would be an excellent
outcome?


  This could be fun. =)  We could put out a blog post when Stormy 
reaches 1.0 about this too.



there is a lot of, shall we call it, dark matter in hidden service
space. What are some safe ways we can improve our 

Re: [tor-dev] Hidden Service authorization UI

2014-11-09 Thread Griffin Boyce
So most of my work over the next three days is writing and editing 
documentation on hidden services. 

I'm in Boston and the purpose of this trip is to rewrite existing documentation 
to be more useful, but with authenticated hidden services, what's available is 
extremely sparse. GlobaLeaks and SecureDrop have good authenticated hidden 
service setups (and good use cases for them). A friend of mine uses an 
authenticated HS for his personal cloud.  More secure for him than logging into 
DropBox, etc. So they're also useful for mere mortals like us. ;-) 

Is there something you need/want in terms of documentation.

best,
Griffin

PS: yes I'm aware of the hilarious timing of this trip.


On November 9, 2014 7:50:00 AM EST, George Kadianakis desnac...@riseup.net 
wrote:
Hidden Service authorization is a pretty obscure feature of HSes, that
can be quite useful for small-to-medium HSes.

Basically, it allows client access control during the introduction
step. If the client doesn't prove itself, the Hidden Service will not
poroceed to the rendezvous step.

This allows HS operators to block access in a lower level than the
application-layer. It also prevents guard discovery attacks since the
HS will not show up in the rendezvous. It's also a way for current
HSes to hide their address and list of IPs from the HSDirs (we get
this for free in rend-spec-ng.txt).

In the current HS implementation there are two ways to do
authorization:
https://gitweb.torproject.org/torspec.git/blob/HEAD:/rend-spec.txt#l768
both have different threat models.

In the future Next Generation Hidden Services specification there
are again two ways to do authorization:
https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt#l1446
One way is with a password and the other is with a public key.

I suspect that HS authorization is very rare in the current network,
and if we believe it's a useful tool, it might be worthwhile to make
it more useable by people.

For example, it would be interesting if TBB would allow people to
input a password/pubkey upon visiting a protected HS. Protected HSes
can be recognized by looking at the authentication-required field of
the HS descriptor. Typing your password on the browser is much more
useable than editing a config file.

Furthermore on the server-side, like meejah recently suggested [0], it
would be nice if there was a way for HSes to be able to dynamically
add/remove authorized clients using the control port.

[0]:
https://lists.torproject.org/pipermail/tor-dev/2014-October/007693.html
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Hidden Service authorization UI

2014-11-09 Thread Griffin Boyce

On 2014-11-09 15:30, Fabio Pietrosanti - lists wrote:

On 11/9/14 8:58 PM, Jacob Appelbaum wrote:

For example, it would be interesting if TBB would allow people to
input a password/pubkey upon visiting a protected HS. Protected HSes
can be recognized by looking at the authentication-required field 
of

the HS descriptor. Typing your password on the browser is much more
useable than editing a config file.

That sounds interesting.


Also i love this idea but i would suggest to preserve the copypaste
self-authenticated URL property of TorHS, also in presence of 
authorization.


  I'm conflicted about this idea.  Much better for usability ~but~ there 
should be an option for authenticated hidden services that want to *not* 
prompt and instead fail silently if the key isn't in the torrc (or 
x.y.onion url, depending on the design).


  Use case: if someone finds my hidden service url written in my planner 
while traveling across the border, they might visit it to see what it 
contains. If it offers a prompt, then they know it exists and can press 
me for the auth key (perhaps with an M4 carbine).  If there's no prompt 
and the request fails, then perhaps it used to exist a long time ago, 
or I wrote down an example URL.


best,
Griffin

--
I believe that usability is a security concern; systems that do
not pay close attention to the human interaction factors involved
risk failing to provide security by failing to attract users.
~Len Sassaman
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Of CA-signed certs and .onion URIs

2014-11-14 Thread Griffin Boyce

Lee wrote:

c) Get .onion IANA reserved


It doesn't look like that's going to happen.


  Yeah. Though the biggest use-case for cert+onion is when trying to 
match a clearnet service to a hidden service -- such as Facebook or 
Erowid.


~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Stormy - request for feedback

2014-11-17 Thread Griffin Boyce

Hello all,

  So as some of you know, I've been working on installers for hidden 
services, to ideally make very common services (such as blogs and plain 
websites) easy to deploy and automatically update.  This is a very rough 
version of the one-click hidden service installer, but I'd love to get 
feedback on places where it breaks and where it could use a major 
structural change.


Script is here, please feel free to flag bugs or tell me how I'm doing 
it wrong:

https://github.com/glamrock/Stormy/blob/master/one-click-blog.sh

Q: Can I use this right now to set up a hidden service?
A: Please don't use this in production until firewall settings are in 
place.


Q: Are there firewall settings in place?
A: Not yet - the current setup is entirely for development and should 
not be used as-is.


best,
Griffin

--
I believe that usability is a security concern; systems that do
not pay close attention to the human interaction factors involved
risk failing to provide security by failing to attract users.
~Len Sassaman
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Stormy - request for feedback

2014-11-28 Thread Griffin Boyce

Hey all,

  Sorry for the delay in responding -- comments inline.

Fabio Pietrosanti - lists wrote:
I would suggest to add a Tor2web policy that, looking at X-Tor2web: 
HTTP

header, enable or disable access to the Blog trough he internet:


  What is your reasoning for disabling access via tor2web?


You may also consider adding support for Ahmia directory index


  This seems reasonable =)  Added as a task.

Nicolas Vigier wrote:

So I am thinking that an other way to do it could be to write a few
ansible modules (or modules for your favorite configuration management
tool) for the various tasks currently done by the script (installing
nginx, installing a blog software, setup a hidden service, configure
the firewall, etc ...), or take existing modules if they do what is
needed.


  I've been considering creating ansible modules to make it easier to 
deploy for some people.  An organization reached out who wants to offer 
it in-house as some kind of enterprise service, which has reignited the 
discussion.



Then write a GUI program that will ask some questions, and when
you click on the setup button generate an ansible variables file
containing the answers to those questions (variables which are used by
the ansible modules), and run ansible to apply the changes on the 
system.


  Lots of people would like a GUI, which would make it much easier to 
deploy, but I always recommend that people segregate their hidden 
services (and websites) from their personal machine.  I might be slowly 
changing my mind on GUIs for a number of reasons.  It's still not a good 
idea to run on one's personal machine if there is a large risk 
associated with being personally linked to running a particular hidden 
service (eg, Muslims in Myanmar should host in a VM or a dedicated 
machine). But this may be a case where more users would be better served 
by having a gui than the fairly mild risk of someone running a service 
on their personal machine.


  And a GUI would be great for people who want to run a hidden service 
using Tails.  =)


Patrick Schleizer wrote:

I think it's non-ideal to modify config files using cat/sed/echo. That
breaks sooner or later. And if later settings are supposed to be 
changed

in the same file, things get messy. Some suggestions...

It would be better to put the config files into (debian) packages.


  While this is true for popcon, this is not possible for most config 
files being edited.  The most critical edits require the onionsite 
address, which of course has to be generated by each user on their own.


  It's possible for debian and ubuntu packages to list package 
conflicts, which would be much better than rolling up custom packages 
that only exist to remove another.


Please consider to set timezone to UTC. Perhaps use the timezone-utc 
[2]

package?


  Tor requires an accurate clock to work properly.


You're sure you're not inventing a new linux distribution here? :)


  Quite sure ;-)  There's a real risk in trying to be everything to 
everyone.  Not only does everything have to be created and documented, 
but maintained long-term.  Bash scripts are straightforward for these 
tasks, as is ansible, VMs much less so, and GUIs very difficult.


best,
Griffin


--
The apparent safety of modern life is just a shallow skin atop
an ocean of blood, guts and bricked devices.
~Pearce Delphin

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Distributing TBB and Tails via Torrents

2014-12-10 Thread Griffin Boyce

Fabio Pietrosanti (naif) - lists wrote:

On 12/10/14 7:53 PM, Chuck Peters wrote:
The torrent files are available through https with a valid 
certificate.

We would love to distribute Tor Browser Bundle via Tor2web, useful for
specific use-cases:

https://github.com/globaleaks/Tor2web-3.0/issues/168


  It's on the roadmap for the next Satori release.  I've distributed Tor 
Browser and Thunderbird via torrents in the past few months, but am keen 
to automate torrent creation since there are 60 separate TBB files (plus 
GPG signatures) for each release.  Right this moment, don't have the 
time to keep up with that.  January there should be a semi-automated 
system in place to release updates as torrents.


~Griffin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Distributing TBB and Tails via Torrents

2014-12-10 Thread Griffin Boyce

SiNA Rabbani wrote:

We can also use S3's bit-torrent feature:
http://docs.aws.amazon.com/AmazonS3/latest/dev/S3Torrent.html It's
relatively painless. Tor has its own Amazon account, I am also more
than happy to provide my own S3 for to mirror Tor's binaries.


Hi Sina,

  Thanks for this - I actually did not know about this feature.  I have 
a long list of trackers that I want added, so this might not be an ideal 
long-term solution.  Though right now I'm distributing via S3 directly.


~Griffin

--
The apparent safety of modern life is just a shallow skin atop
an ocean of blood, guts and bricked devices.
~Pearce Delphin

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Research repository [was: Master's Thesis]

2015-02-09 Thread Griffin Boyce

grarpamp wrote:
Is there a project to collect, index and archive all the relevant 
papers

from all the various internet sites, homepages, anonbib, etc... into
one central, easily mirrored and referenced repository? git would
seem more useful for this than the various disparate http resouces
of uncommon design. If the fame of the original site is needed that
would be included in the commit or a per paper paired metadata file.
This model could be extended to multimedia formats of papers via
rsync, with the index being git'd. The index itself could of course
be stored in git in html format to point browser at locally, or even
remotely over gitweb as the possible internet frontend.

There may be volnteers on tor-talk if fwd there.


  I whipped up this github repository, based on anonbib.  Anonbib is the 
most in-depth project for cataloging these kinds of papers, so 
contributing new entries there is probably your best bet.  However, if 
people submit issues or pull requests to my repo, I'll send a bibtex 
entry to anonbib.


  The readme probably still has some errant formatting errors: 
https://github.com/glamrock/anonbib


that was a fun distraction,
Griffin

--
Cypherpunks write code, not flamewars.
~Jurre van Bergen

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] thanks redditt

2015-03-19 Thread Griffin Boyce

Tyrano Sauro wrote:

This is funny


  Oh, I agree :D  There was an outtake where Karen (development 
director) was walking around with a tiny orange tree saying Orange 
Routing! Orange Routing! It was pretty great ^_^


~Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Tor Browser sha256 checksums for old versions?

2015-03-07 Thread Griffin Boyce

David Fifield wrote:

I don't know if there's a place where they're all in a single file, but
you can get them for historical releases here:

https://archive.torproject.org/tor-package-archive/torbrowser/


  Thanks!  That's perfect :D  Satori's new version will detect version 
based on the hash.  I'm only looking to go back to v3.5 (Dec 2013) right 
now, but might add more back to Jan 2012.  The version numbers get kind 
of annoying if you go back to v2.2.35-4, and people are less likely to 
be using those old versions, but it would be good to trigger a warning 
to download the new Tor Browser.


best,
Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Tor Browser sha256 checksums for old versions?

2015-03-07 Thread Griffin Boyce

Hey all,

  I was just wondering if it's possible to get a gpg-signed list of 
sha256 checksums for the Tor Browser.  The website only shows the 
current version's list of hashes.  Which is really useful, but it would 
be great to have them all if possible.


thanks,
Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] #15060: Decide the fate of MyFamily / prop242 better families

2015-03-23 Thread Griffin Boyce



So, what do we think?  I'd say that MyFamily is likely to continue to


MyFamily is also critical for people who are running a lot of relays.  
It's ideal to list keys, but in a scenario where I run two dozen relays 
or more, having a good shorthand for them would make it easier to group 
them.


~Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Urdu Hindi translations of Tor browser ?

2015-04-19 Thread Griffin Boyce

Sukhbir Singh wrote:

I am sure other users
from India/Pakistan can back this up, but personally, even though my
native language is Punjabi and Hindi, I have always selected English
when installing Debian. Similary, I have almost never seen a copy of
Windows in any of the local languages, anywhere in India.

The English precedence is slowly changing though, with more and more
technology products being shipped in local languages so that they can
reach populations that don't speak English (which is more in number 
than

the population that can.)


  These are great points, and the perspective is critical.  It's worth 
noting I only speak English and by necessity only interact with people 
who also speak English.  So frequently I have to wonder how that shapes 
my perspective and whether various users might have unmet needs.  
Whereas in your case, you've lived in some of these areas and speak 
Hindi so have a more realistic idea of what might be useful in India.



So while my experience with this has been different from Griffin's in
that no Tor user in India has asked me for a translation in their local
language, I think the simple reason may be that English-speaking
population doesn't feel the need and right now, they are the ones that
dominate the online market. Not that this is an excuse for not having
local translations, but I am stating the probable reasons for the lack
of translations.


  Those who've approached me about Urdu have been trainers from 
Pakistan, and I'd imagine that as you say they are hoping to reach more 
users who don't speak English.  But I'm not actually sure how to really 
measure need based on these individual interactions.


best,
Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Summary of meek's costs, April 2015

2015-05-05 Thread Griffin Boyce

Mike Perry wrote:

David Fifield:

Here's the summary of meek's CDN fees for April 2015.

total by CDN  $3292.25 + $3792.79 + $0.00 = $7085.04 grand total
https://metrics.torproject.org/userstats-bridge-transport.html?graph=userstats-bridge-transportstart=2015-02-01end=2015-04-30transport=meek


Yikes! Are these costs covered by a grant or anything? Should we be
running a donations campaign?


If you want to help reduce costs, you can
 1. Use meek-azure; it's still covered through a grant for the next 
four

months.
 2. Set up your own App Engine or CDN account. Then you can pay for 
your

own usage (it might even be free depending on how much you use).
Here are instructions on how to set up your own:
  
https://gitweb.torproject.org/pluggable-transports/meek.git/tree/appengine/README
  
https://trac.torproject.org/projects/tor/wiki/doc/meek#AmazonCloudFront
  
https://trac.torproject.org/projects/tor/wiki/doc/meek#MicrosoftAzure

Then you will have to enter a bridge line manually. Follow the
instructions at
  
https://trac.torproject.org/projects/tor/wiki/doc/meek#Howtochangethefrontdomain

but instead of changing the front= part, change the url= part.
For example,
  bridge meek 0.0.2.0:1 url=https://myappname.appspot.com/ 
front=www.google.com


Please let me know if anyone takes you up on this!

I am happy to add the meek bridges of anyone who does this as an option
in Tor Browser. We can add logic to round robin or randomly select
between the set of meek providers for a given meek type upon first
install, or even for every browser startup.


  If there were some randomization logic included, I'd be happy to 
contribute an App Engine or Amazon meek access point.  If a few people 
did that, the costs might be more manageable.  But also the stats might 
be a bit harder to aggregate (which might be important if David is 
writing a thesis/paper/etc).


  Either way, way to go =)

best,
Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Urdu Hindi translations of Tor browser ?

2015-04-18 Thread Griffin Boyce


Hello all,

  Whenever I attend events with a large Pakistani or Indian contingent, 
I'm asked why there isn't an Urdu or Hindi translation of Tor Browser.  
And I'm not totally sure what to say.  There's clearly a large need, 
given Pakistan's history internet censorship.  At a recent event in DC, 
an activist from Pakistan spoke with me about increased surveillance in 
recent years, as well as the shocking trend of targeting activists with 
charges of blasphemy for criticizing the government.  (Blasphemy is 
punishable by death, and those accused frequently do not survive until 
trial due to mob violence).


  The situation in India is a bit different, but their need for online 
privacy much the same as like Pakistan they are subject to mass 
surveillance.


  Both populations also have a large number of speakers: ~300M for Hindi 
and ~66M for Urdu.


  What do you think?

~Griffin

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Please vote on times for the Pluggable Transports, Bridges, and BridgeDB Meeting!

2015-04-06 Thread Griffin Boyce
So, just to clarify, this would be 10pm EST on Tuesday or Wednesday 
night, correct?


~Griffin


On 2015-04-06 16:31, Brandon Wiley wrote:

I can't do 0200 UTC on Wednesdays. I could potentially do 0200 on some
Thursdays.

On Mon, Apr 6, 2015 at 3:06 PM, isis i...@torproject.org wrote:


Last chance. http://doodle.com/tn28wgzw8iydpznp [1]

We're currently leaning towards 0200 UTC on Wednesdays. If this
doesn't work
for you, now's your chance to Rock The Vote™ or whatever.

I should mention that Yawning and I are both entirely willing to
switch to a
different day; please let either of us know if this would help with
scheduling
in any way.

isis transcribed 2.6K bytes:


Hello!

Did you have an interest in attending the Pluggable Transports

Meeting v1.0?

Well then, you will certainly be excited to here about the *BRAND

NEW*

Pluggable Transports Meeting v2.0

*NOW INCLUDING DEVELOPMENT DISCUSSION OF BRIDGEDB AND BRIDGES IN

GENERAL*


That's 3 meetings for the price of 1!! Wow!!!

Please take a moment away from your undeniable shock and ecstatic

joy at this

great news to vote for a new time for this combined meeting:
http://doodle.com/tn28wgzw8iydpznp [1]

Thanks!


--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt [2]

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev [3]




Links:
--
[1] http://doodle.com/tn28wgzw8iydpznp
[2] https://blog.patternsinthevoid.net/isis.txt
[3] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Stormy update

2015-06-30 Thread Griffin Boyce

Hey all,

  It seems like time to give the tor-dev list an update on Stormy's 
development.  Right now, the scripts are undergoing third-party testing 
to identify any obvious bugs before sending them to security auditors.  
Testing should be finished imminently, any bugs found will be fixed this 
week, and then sent to auditors (along with the GUI).  The security 
audit may take about two to three weeks [1].


  Currently, Stormy's functions include installing typical onion service 
dependencies (webserver+tor), setting up a Ghost-based content 
management system, creating a personal cloud server to handle files/rss 
feeds/calendars/tasks, installing an XMPP/jabber server for private 
communications, and installing an IRC server for group communications.


Shortcomings and future work:
  Like all software projects, Stormy has some shortcomings.  Users can't 
configure multiple onion services on the same machine as Stormy doesn't 
account for virtual hosts.  For users to run more than one onion 
service, they must be on separate physical or virtual machines.  Stormy 
also doesn't detect the currently-running clearnet service, so users who 
seek to make their existing service also an onion service may need to 
adjust their configuration manually.  Currently, Stormy lives on my 
github page [2], though once it passes a security audit, the goal is for 
it to live within Tor's git repositories.


best,
Griffin

[1] Cupcake's audit took about two weeks, so that's really my only real 
data point for audit timing.

[2] https://github.com/glamrock/stormy

--
“Sometimes the questions are complicated and the answers are simple.”
― Dr. Seuss
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Finding location metadata in large dark market datasets

2015-07-17 Thread Griffin Boyce

Hello all,

  I came across a blog post that might interest you all.  @techdad did a 
quick analysis of public images from online black markets (such as Silk 
Road et al)[2] from 2011-2015, and came to the following conclusion:


After parsing hundreds of thousands of images, I came across about 37 
unique images that were not properly sanitized.[1]


  That's surprisingly low -- 0.00037% if one assumes 100k images 
analyzed.  Given the number of high-profile cases [4] where this 
location information led to arrests, it's not very surprising that some 
people likely took the time to remove the EXIF data, but I'm curious 
whether a given website may have stripped the metadata for uploaded 
images.  The images that tested positive are shown on the blog post, and 
8/37 were clearly from the same individual.


  When mapped out, the location data is primarily in the US (5 
locations), along with 1 location in France and Australia.


  Incidentally, the full 1.6TB dataset from 2011-2015 is available on 
the Internet Archive [3], just in case the Hacking Team disclosures 
haven't used up all your hard drive space. ;-)  This data on its own is 
a rather interesting look into the workings of black markets -- many of 
which no longer exist.  Curious to see what you all think and what 
analyses you'd like to see from this kind of data.


best,
Griffin


[1] http://atechdad.com/Deanonymizing-Darknet-Data/
[2] http://www.gwern.net/Black-market%20archives
[3] https://archive.org/details/dnmarchives
[4] 
https://www.eff.org/deeplinks/2012/04/picture-worth-thousand-words-including-your-location



___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] UX tag

2015-11-02 Thread Griffin Boyce

Georg Koppen wrote:

Nima Fatemi:

Lunar:

Tor Browser folks have been tagging tickets with tbb-usability:
https://trac.torproject.org/projects/tor/tags/tbb-usability

Do you want an extra tag for those?


This is a good question. I'm aware of tbb-usability tag and have 
already

added it to my filters; but I'm treating tbb team special and am not
sure if that's the right path to take with every component we have.


I don't know either but I'd prefer to have just the tbb-usability*
keywords for Tor Browser. As the asterisk already indicates we have a
more fine-grained keyword system tracking various areas where we need 
to

improve Tor Browser's usability and just using "UX" would blur lines


  I agree with this.  Keep in mind also that looking up "usability" as a 
keyword aggregates all of these tickets.  So if you wanted to make sure 
that UX-related tickets for the website get seen, making the keywords 
more granular but including usability wouldn't be a bad approach.


best,
Griffin

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Introducing Snowflake (webrtc pt)

2016-01-25 Thread Griffin Boyce

Serene wrote:

Q: Why is it called Snowflake?
There's a bunch of "ICE" negotiation happening for WebRTC, and it also
involves a great abundance of ephemeral and short-lived (and special!)
volunteer proxies...

Anyhow, if Snowflake seems like it would be useful / desired here, it
would be awesome if we had more help getting it stable, polished,
audited, deployable, etc...
Plenty of work to do!


  This is really great work, Serene ^_^  Once it is a bit more stable 
(and perhaps audited!), I'd be happy to incorporate Snowflake into 
Cupcake if that's useful.


  I am curious why you chose CoffeeScript for the proxy, rather than 
JavaScript.


woot,
Griffin

--
“I did then what I knew then, & when I knew better, I did better.”
― Maya Angelou
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] "Not our bug" bugs

2016-02-23 Thread Griffin Boyce

Hey all,

There have been quite a few bug reports that discuss incompatibility with
various Firefox extensions and with websites. In most cases, I can't 
replicate
these bugs -- either because the extension in question has been patched, 
the
website reported no longer exists, or the issue can't be replicated (which 
could

be due to site updates and past Firefox incompatibility).

Occasionally, the issue is real and still in effect, but isn't really a Tor 
bug
(such as #7279, where a forum restricts logins by Tor users). We've all 
worked

very hard to reduce overly-restrictive blacklist policies, but can't be
everything for everyone.

In these cases, I'd propose rejecting these bugs as either invalid or `not 
a
bug`. These are all varying degrees of "not our bug" or "actually not a bug 
at

all." Open to more thoughts on this.

~Griffin___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Request for feedback/victims: cfc

2016-03-23 Thread Griffin Boyce

Yawning Angel wrote:

Inspired by https://trac.torproject.org/projects/tor/ticket/18361
I've been working on way to improve the situation.


  Neat. In the thread someone mentions that it's possible to derive the 
answer for the old-style street number captchas using tesseract [1]. 
Interestingly, there is a version of tesseract in javascript [2]. This 
is probably not especially useful for the current "select all boxes that 
contain one pixel of street sign" Recaptcha system, but if there were a 
way to trigger the old behavior, these techniques could be used 
together.


~Griffin

[1] https://trac.torproject.org/projects/tor/ticket/18361#comment:173
[2] http://tesseract.projectnaptha.com/

--
“Not having a clear goal leads to death by a thousand compromises.”
~ Mark Pincus
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Is it possible to leak huge load of data over onions?

2016-04-03 Thread Griffin Boyce

How do you transmit an elephant? One byte at a time...

But on a serious note, it's possible to transfer 2.6TB over Tor in small 
pieces (such as file by file or via torrent). Given the size, however, I'd 
suspect they mailed hard drives after establishing contact with 
journalists. Even on a fairly fast connection, 2.6TB would take quite a 
while...


~Griffin



--
On Sun, Apr 03, 2016 at 5:24 PM, Ivan Markin < t...@riseup.net 
[t...@riseup.net] > wrote:

Recently someone leaked enormous amount of docs (2.6 TiB) to the
journalists [1]. It's still hard to do such thing even over plain old
Internet. Highly possible that these docs were transfered on a physical
hard drive despite doing so is really *risky*.

Anyways, in the framework of anonymous whistleblowing, i.e. SecureDrop
and Tor specifically it's seems to be an interesting case. I'm wondering
about the following aspects:

o Even if we use exit mode/non-anonymous onions (RSOS)
is such leaking reliable? The primary issue here
is time of transmission. It's much longer than any
time period we have in Tor.

o What is going to happen with the connection after
the HS republishes its descriptor? Long after?
[This one is probably fine if we are not using
IPs, but...]

o Most importantly, is transferring data on >1 TiB
scale (or just transferring data for days) safe at
all? At least the source should not change their
location/RP/circuits. Or need to pack all this stuff
into chunks and send them separately. It's not
obvious how it can be done properly. So at what
point the source should stop the transmission
(size/time/etc)/change location or the guard/
pick new RP?

--
[1] http://panamapapers.sueddeutsche.de/articles/56febff0a1bb8d3c3495adf4/
--
Happy hacking,
Ivan Markin
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Scheduled changes to Tor Metrics CSV files in the Performance and the Traffic category

2018-12-06 Thread Griffin Boyce
Thanks for the heads up 

On December 6, 2018 3:52:43 PM EST, Karsten Loesing  
wrote:
>Hi,
>
>if you're not pulling CSV files from the Tor Metrics website in an
>automated fashion, you can stop reading now.
>
>We just scheduled some changes to the Tor Metrics CSV files in the
>Performance and the Traffic category:
>
> - December 20, 2018 (scheduled): Remove source parameters and output
>rows with aggregates over all sources from Time to download files over
>Tor, Timeouts and failures of downloading files over Tor, Circuit build
>times, Circuit round-trip latencies graphs.
>
> - December 20, 2018 (scheduled): Remove two graphs Total relay
>bandwidth and Consumed bandwidth by Exit/Guard flag combination, and
>update the data format of the Advertised and consumed bandwidth by
>relay
>flag graph to cover all data previously contained in the first two
>graphs.
>
>For more details, see: https://metrics.torproject.org/stats.html
>
>I'm posting this note here, because some folks might pull these CSV
>files automatically, and they should have at least a two-weeks warning
>to update their scripts.
>
>All the best,
>Karsten

-- 
Transmitted via Minitel -- the New Wave in telephonics! ___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev