Re: [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?

2015-08-04 Thread Yawning Angel
On Tue, 4 Aug 2015 17:55:51 -0400 (EDT) "Steve Snyder" wrote: > Given a contemporary release of Tor with a contemporary version of > OpenSSL, under what circumstances is the intrinsic curve25519_donna() > preferred over the libsodium/NaCl crypto_scalarmult_curve25519(), or > vice versa? A quick

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 8/4/2015 5:42 PM, Nick Mathewson wrote: > Hi, s7r! > > This is an impressive writeup; thanks! > > One thing that makes it hard for me to follow this document is > that I'm not sure which parts are describing how things work _now_, > and which pa

[tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?

2015-08-04 Thread Steve Snyder
Given a contemporary release of Tor with a contemporary version of OpenSSL, under what circumstances is the intrinsic curve25519_donna() preferred over the libsodium/NaCl crypto_scalarmult_curve25519(), or vice versa? Does it come down to 32-bit vs. 64-bit? Or CPU instruction sets detected at

Re: [tor-dev] Get Stem and zoossh to talk to each other

2015-08-04 Thread Philipp Winter
On Fri, Jul 31, 2015 at 04:22:19PM -0400, l.m wrote: > I know I've already mentioned some thoughts on this subject. I would > be interested in your thoughts on the types of challenging questions > such a hypothetical DSL might answer. I've already put some effort > into this (forking metrics-lib),

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-08-04 Thread teor
> On 4 Aug 2015, at 22:00 , George Kadianakis wrote: > >>> XXX The number of active participants is dynamic as authorities leave and >>> join the protocol. Since the number of active participants is dynamic , >>> an attacker could trick some authorities believing there are N >>> part

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-04 Thread Nick Mathewson
On Mon, Aug 3, 2015 at 6:55 PM, s7r wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Hi, > > Tor 0.2.7.x will support Ed25519 router identities along with the > traditional 1024-bit RSA ones which will be used simultaneously for > some time, until we will completely deprecate RSA rou

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-08-04 Thread teor
> On 4 Aug 2015, at 22:00 , George Kadianakis wrote: > > Hello, > > and thanks for the comments. > > I uploaded a new version of the proposal that addresses some of your feedback. > > You can find it here: > https://gitweb.torproject.org/user/asn/torspec.git/log/?h=rng-draft-v4-asn Thanks f

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-08-04 Thread George Kadianakis
teor writes: >> On 4 Aug 2015, at 00:03 , George Kadianakis wrote: >> … > >> 3.1.2. Shared Random Document During Commitment Phase [SRDOCCOMMIT] > … Hello, and thanks for the comments. I uploaded a new version of the proposal that addresses some of your feedback. You can find it here: http