Re: [tor-dev] Opening new SOCKS to client plugin for new circuit?

2012-12-11 Thread Nick Mathewson
On Mon, Dec 3, 2012 at 12:20 PM, David Fifield wrote: > I noticed a change in behavior in cb62a0b69a7d67b427224ca4c3075b49853a3a1f > or thereabouts. tor opens a new SOCKS connection to a client transport > plugin while bootstrapping at 50% (if descriptors are not cached) or at > 85% (if descriptor

Re: [tor-dev] [tor-reports] George's status report: November 2012

2012-12-03 Thread Nick Mathewson
On Mon, Dec 3, 2012 at 10:19 PM, Mike Perry wrote: > Thus spake George Kadianakis (desnac...@riseup.net): > >> Hi, >> >> - Started researching and developing obfs3, an improved version of the >> obfs2 pluggable transport. The proposed protocol currently looks >> like this: >> >> https://git

Re: [tor-dev] Proposal 216: Improved circuit-creation key exchange

2012-11-30 Thread Nick Mathewson
On Fri, Nov 30, 2012 at 12:07 AM, Mike Perry wrote: > Thus spake Nick Mathewson (ni...@freehaven.net): > >> Title: Improved circuit-creation key exchange >> Author: Nick Mathewson >> >> Summary: >> >> This is an attempt to translate the proposed circ

Re: [tor-dev] Parallel relaycrypt data structures for review

2012-11-30 Thread Nick Mathewson
On Nov 29, 2012 9:30 PM, "Andrea Shepard" wrote: > > Please review first draft proposed parallel relaycrypt structures > in my parallel_relay_crypt branch. > Hi! Here are some initial thoughts: * If we're going to do it like this, maybe we need to make cell_t packed or something eventually. I

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 8:42 PM, Nick Mathewson wrote: > On Tue, Nov 27, 2012 at 12:49 AM, Roger Dingledine wrote: [...] >> While I was looking at this design, I thought of a cool attack on >> 0.2.3 users: This is now Ticket #7582 on trac.

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 10:08 AM, Julian Yon wrote: > On Tue, 27 Nov 2012 00:49:28 -0500 > Roger Dingledine wrote: > >> (Also, if we have no client-side dns cache, further streams requesting >> the same address, e.g. fetching pictures from the website, might try >> the same circuit even if we cou

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 12:49 AM, Roger Dingledine wrote: > On Sun, Nov 25, 2012 at 07:54:51PM -0500, Nick Mathewson wrote: >> [tl;dr: We should make client-side DNS cacheing off by default.] > > Be careful -- we seem to rely on the client-side dns cache to let us > move on t

Re: [tor-dev] Proposal: Tor Extended ORPort Authentication

2012-11-27 Thread Nick Mathewson
Added as proposal 217; thanks! ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Proposal 216: Improved circuit-creation key exchange

2012-11-27 Thread Nick Mathewson
Hi, all. This is just the ntor proposal draft, as circulated last year, but with a proposal number assigned to it, and a closing section about how to make Tor actually work with it. Filename: 216-ntor-handshake.txt Title: Improved circuit-creation key exchange Author: Nick Mathewson Created

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-25 Thread Nick Mathewson
[tl;dr: We should make client-side DNS cacheing off by default.] On Fri, Jul 20, 2012 at 6:27 PM, Nick Mathewson wrote: > Filename: 205-local-dnscache.txt > Title: Remove global client-side DNS caching > Author: Nick Mathewson > Created: 20 July 2012 > Status: Open [...] F

Re: [tor-dev] Request for comments on notes on parallel cell crypto

2012-11-19 Thread Nick Mathewson
On Mon, Nov 19, 2012 at 5:18 PM, Ian Goldberg wrote: > On Mon, Nov 19, 2012 at 05:06:58PM -0500, Nick Mathewson wrote: >> On Sun, Nov 18, 2012 at 7:43 PM, Andrea Shepard >> wrote: >> > I've made some notes on parallelizing cell crypto on relays which I've >&

Re: [tor-dev] Request for comments on notes on parallel cell crypto

2012-11-19 Thread Nick Mathewson
On Sun, Nov 18, 2012 at 7:43 PM, Andrea Shepard wrote: > I've made some notes on parallelizing cell crypto on relays which I've > attached to this mail and added to the wiki page on this [1], which I > would like comment on. Particularly, I want to resolve the following > points: > > * Should we

[tor-dev] Proposal 215: Let the minimum consensus method change with time

2012-11-19 Thread Nick Mathewson
Filename: 215-update-min-consensus-ver.txt Title: Let the minimum consensus method change with time Author: Nick Mathewson Created: 15 Nov 2012 Status: Open 0. Overview This proposal suggests that we drop the requirement that authorities support the very old consensus method "1&

Re: [tor-dev] Proposal 214: Allow 4-byte circuit IDs in a new link protocol

2012-11-07 Thread Nick Mathewson
On Wed, Nov 7, 2012 at 12:51 AM, Roger Dingledine wrote: > On Tue, Nov 06, 2012 at 10:10:15PM -0500, Nick Mathewson wrote: > > > And if a very few do, maybe the solution is to > > > move to a new TLS connection for those rare cases, rather than impose > > > a 2-byt

Re: [tor-dev] Proposal 214: Allow 4-byte circuit IDs in a new link protocol

2012-11-06 Thread Nick Mathewson
On Tue, Nov 6, 2012 at 9:55 PM, Roger Dingledine wrote: > On Tue, Nov 06, 2012 at 09:36:34PM -0500, Nick Mathewson wrote: > >Relays are running out of circuit IDs. It's time to make the field > >bigger. > > I don't doubt the second sentence, but is the fir

[tor-dev] Proposal 214: Allow 4-byte circuit IDs in a new link protocol

2012-11-06 Thread Nick Mathewson
Filename: 214-longer-circids.txt Title: Allow 4-byte circuit IDs in a new link protocol Author: Nick Mathewson Created: 6 Nov 2012 Status: Open 0. Overview Relays are running out of circuit IDs. It's time to make the field bigger. 1. Background and Motivation Long ago, we th

[tor-dev] Reminder of November, December deadlines for Tor 0.2.4

2012-11-01 Thread Nick Mathewson
Hi, all! >From the Tor 0.2.4 schedule at https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/024 : """November 20, 2012: Big feature proposal freeze. Any big feature which requires a design proposal must have its design proposal finished by this date. If it needs changes after this da

Re: [tor-dev] circuitmux_ewma.c

2012-11-01 Thread Nick Mathewson
On Thu, Nov 1, 2012 at 1:04 PM, Gisle Vanem wrote: > These gcc extensions: > Hi, Gisle! I'm happy to open another ticket for these, but have you tried using the bugtracker yourself? Is there some UI issue or something that prevents you from opening tickets? If so I'd be glad to try to help wor

Re: [tor-dev] [Patch] tools\tor-fw-helper\tor-fw-helper-natpmp.c

2012-11-01 Thread Nick Mathewson
On Thu, Nov 1, 2012 at 1:11 PM, Gisle Vanem wrote: > The code in tools\tor-fw-helper\tor-fw-**helper-natpmp.c does > things wrong on Winsock where e.g. errno isn't set on socket-errors and > 'fd' is (always?) >= FD_SETSIZE. Patch attached. Thanks. I've copied this information to the bugtracker

Re: [tor-dev] Even more notes on relay-crypto constructions

2012-10-18 Thread Nick Mathewson
On Thu, Oct 18, 2012 at 11:18 PM, Mike Perry wrote: > Thus spake Nick Mathewson (ni...@alum.mit.edu): > >> On Thu, Oct 18, 2012 at 6:10 PM, Mike Perry wrote: >> [...] >> >> There are modes that are supposed to prevent this, and applying them >> >> to

Re: [tor-dev] Even more notes on relay-crypto constructions

2012-10-18 Thread Nick Mathewson
On Thu, Oct 18, 2012 at 6:10 PM, Mike Perry wrote: [...] >> There are modes that are supposed to prevent this, and applying them >> to a decent wide-block cipher might solve the issue. IGE is one of >> them [IGE], but it turns out to be broken by an attacker who knows >> some plaintext. The Accu

Re: [tor-dev] Proposal: Increase Acceptable Consensus Age

2012-10-16 Thread Nick Mathewson
On Tue, Oct 16, 2012 at 6:41 PM, Mike Perry wrote: > Also available at: > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/tolerate-old-consensus:/proposals/xxx-using-old-consensus.txt > > -- > > Title: Increase Acceptable Consensus Age > Author: Mike P

Re: [tor-dev] Proposal 211: Internal Mapaddress for Tor Configuration Testing

2012-10-15 Thread Nick Mathewson
On Mon, Oct 15, 2012 at 4:38 PM, Mike Perry wrote: [...] >> What does that protect against? My first thought is that you're >> trying to prevent the case where a malicious local DNS server maps >> "selftest.torproject.org" to some IP address in their control, and >> then just runs a server at tha

Re: [tor-dev] Proposal 210: Faster Headless Consensus Bootstrapping

2012-10-15 Thread Nick Mathewson
On Thu, Oct 11, 2012 at 5:32 AM, Mike Perry wrote: > Also at: > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/consensus-bootstrap:/proposals/xxx-faster-headless-consensus-bootstrap.txt > > - > > Title: Faster H

Re: [tor-dev] Proposal 211: Internal Mapaddress for Tor Configuration Testing

2012-10-15 Thread Nick Mathewson
On Thu, Oct 11, 2012 at 5:38 AM, Mike Perry wrote: > Also at: > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/mapaddress-check:/proposals/xxx-mapaddress-tor-status.txt > > --- > > Title: Internal Mapaddress for Tor Configu

Re: [tor-dev] Proposal 207: Directory guards

2012-10-15 Thread Nick Mathewson
On Mon, Oct 15, 2012 at 2:48 PM, Mike Perry wrote: [...] > Again, this experimentation is already done. It's quite clear that > adding more objects to the world of Guard activity reduces traffic > fingerprinting accuracy, regardless of if that activity is concurrent > with client traffic or not.

Re: [tor-dev] Proposal 207: Directory guards

2012-10-15 Thread Nick Mathewson
On Fri, Oct 12, 2012 at 10:53 PM, Mike Perry wrote: > Thus spake Nick Mathewson (ni...@alum.mit.edu): > >> On Fri, Oct 12, 2012 at 3:17 PM, Mike Perry wrote: >> > Thus spake Nick Mathewson (ni...@torproject.org): >> >> Discussion: >> >> >> &

Re: [tor-dev] [patch] fix cparser/firm compiler warnings

2012-10-14 Thread Nick Mathewson
On Sun, Oct 14, 2012 at 5:03 AM, Christian Grothoff wrote: > Hi! > > We're trying to compile Tor with cparser and got some warnings and an > error. Patch looks okay to me! In the future, it is indeed best to use the bugtracker. I've added it at https://trac.torproject.org/projects/tor/ticket/71

Re: [tor-dev] Proposal 207: Directory guards

2012-10-12 Thread Nick Mathewson
On Fri, Oct 12, 2012 at 3:17 PM, Mike Perry wrote: > Thus spake Nick Mathewson (ni...@torproject.org): >> Discussion: >> >>The rule that the set of guards and the set of directory guards need to >>be disjoint, and the rule that multiple directory guards

Re: [tor-dev] Proposal: Internal Mapaddress for Tor Configuration Testing

2012-10-11 Thread Nick Mathewson
On Thu, Oct 11, 2012 at 5:38 AM, Mike Perry wrote: > Also at: > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/mapaddress-check:/proposals/xxx-mapaddress-tor-status.txt > This is now proposal 211. ___ tor-dev mailing list tor-dev@lists.to

Re: [tor-dev] Proposal: Faster Headless Consensus Bootstrapping

2012-10-11 Thread Nick Mathewson
On Thu, Oct 11, 2012 at 5:32 AM, Mike Perry wrote: > Also at: > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/consensus-bootstrap:/proposals/xxx-faster-headless-consensus-bootstrap.txt > Added this as proposal 210. ___ tor-dev mailing li

Re: [tor-dev] Proposal: Tuning the Parameters for the Path Bias Defense

2012-10-11 Thread Nick Mathewson
On Thu, Oct 11, 2012 at 5:20 AM, Mike Perry wrote: > Also exists at > https://gitweb.torproject.org/user/mikeperry/torspec.git/blob/path-bias-tuning:/proposals/xxx-path-bias-tuning.txt > This is now Proposal 209. ___ tor-dev mailing list tor-dev@lists.t

[tor-dev] Proposal 208: IPv6 Exits Redux

2012-10-10 Thread Nick Mathewson
Filename: 208-ipv6-exits-redux.txt Title: IPv6 Exits Redux Author: Nick Mathewson Created: 10-Oct-2012 Status: Open Target: 0.2.4.x 1. Obligatory Motivation Section [Insert motivations for IPv6 here. Mention IPv4 address exhaustion. Insert official timeline for official IPv6 adoption

[tor-dev] Proposal 207: Directory guards

2012-10-10 Thread Nick Mathewson
Filename: 207-directory-guards.txt Title: Directory guards Author: Nick Mathewson Created: 10-Oct-2012 Status: Open Target: 0.2.4.x Motivation: When we added guard nodes to resist profiling attacks, we made it so that clients won't build general-purpose circuits through just any

[tor-dev] Proposal 206: Preconfigured directory sources for bootstrapping

2012-10-10 Thread Nick Mathewson
Filename: 206-directory-sources.txt Title: Preconfigured directory sources for bootstrapping Author: Nick Mathewson Created: 10-Oct-2012 Status: Open Target: 0.2.4.x Motivation and History: We've long wanted a way for clients to do their initial bootstrapping not from the dire

Re: [tor-dev] Even more notes on relay-crypto constructions

2012-10-09 Thread Nick Mathewson
On Tue, Oct 9, 2012 at 12:31 PM, Robert Ransom wrote: [...] >> AES-CTR + HMAC-SHA512/256. >> >> AES-CTR + Poly1305. Poly1305 requires nonces, but we can use a >> counter for those. > > Poly1305AES requires nonces. Poly1305 itself requires > (computationally-indistinguishable-from-) indepe

[tor-dev] Even more notes on relay-crypto constructions

2012-10-08 Thread Nick Mathewson
I should share with the list an update of where I am with a design for an improved relay crypto protocol. For background and motivation, please see the last thread on the topic [Prop202]. There are three main questions remaining for me in choosing among new relay crypto protocols. Basically, the

Re: [tor-dev] 10 days left for proposals for hard stuff [Re: Reminder: Big/tricky/interesting features for 0.2.4 need proposals by 10 October]

2012-10-07 Thread Nick Mathewson
On Sat, Oct 6, 2012 at 10:32 AM, Fabio Pietrosanti (naif) wrote: > On 10/1/12 6:49 PM, Nick Mathewson wrote: >>> Hi, all! >>> >>> From https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/024 : >>> >>> "October 10, 2012: Big feature p

Re: [tor-dev] 10 days left for proposals for hard stuff [Re: Reminder: Big/tricky/interesting features for 0.2.4 need proposals by 10 October]

2012-10-01 Thread Nick Mathewson
On Mon, Oct 1, 2012 at 12:49 PM, Nick Mathewson wrote: > On Mon, Sep 17, 2012 at 11:47 AM, Nick Mathewson wrote: >> Hi, all! >> >> From https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/024 : >> >> "October 10, 2012: Big feature proposal checkp

[tor-dev] 10 days left for proposals for hard stuff [Re: Reminder: Big/tricky/interesting features for 0.2.4 need proposals by 10 October]

2012-10-01 Thread Nick Mathewson
On Mon, Sep 17, 2012 at 11:47 AM, Nick Mathewson wrote: > Hi, all! > > From https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/024 : > > "October 10, 2012: Big feature proposal checkpoint. Any large > complicated feature which requires a design proposal must

Re: [tor-dev] Compiling tor against OpenSSL_1_0_2-stable

2012-09-25 Thread Nick Mathewson
On Mon, Sep 24, 2012 at 4:13 AM, Christian Kujau wrote: > Hi, > > while trying to compile the latest git-checkout against openssl-1.0.2, > I've come across the following issues: [...] > While this is really an issue with openssl, I wanted to have this > documented, just in case anybody else tries

[tor-dev] Reminder: Big/tricky/interesting features for 0.2.4 need proposals by 10 October

2012-09-17 Thread Nick Mathewson
Hi, all! >From https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/024 : "October 10, 2012: Big feature proposal checkpoint. Any large complicated feature which requires a design proposal must have its first design proposal draft by this date." There are only 23 days till October 10.

Re: [tor-dev] Tenative schedule for Tor 0.2.4 [Or, why I might reject your patches in November->March]

2012-09-07 Thread Nick Mathewson
On Fri, Sep 7, 2012 at 5:53 PM, Mike Perry wrote: > Thus spake Mike Perry (mikepe...@torproject.org): >> Thus spake Nick Mathewson (ni...@freehaven.net): >> >> > Last year, I announced a tenative schedule for 0.2.3.x. We didn't >> > stick to it, and thin

[tor-dev] Tenative schedule for Tor 0.2.4 [Or, why I might reject your patches in November->March]

2012-09-07 Thread Nick Mathewson
Hi, all! Last year, I announced a tenative schedule for 0.2.3.x. We didn't stick to it, and things have gone a little pear-shaped with getting 0.2.3.x stabilized, but I think with a few tweaks we can use something similar to get a good schedule out for 0.2.4.x. My goals remain about what they we

Re: [tor-dev] Parallel release series for directory authorities?

2012-09-06 Thread Nick Mathewson
On Tue, Sep 4, 2012 at 10:57 PM, Jacob Appelbaum wrote: Hi, Jake! > I think this is a fine plan - my preference is generally to track git > tip for urras. I'm happy to track whatever branches need experimenting > or lots of use. I will need to acquire some IPv6 space for the machine > soon for i

[tor-dev] Nick's August 2012 status report

2012-08-31 Thread Nick Mathewson
THINGS I DID IN AUGUST I spent a few days vacationing with my family in Maine; took a day off for my birthday, and generally chilled out. I merged lots of bugfixes and patches -- some mine, some other people's, some requiring rewriting and review, some not. This included some security-related st

[tor-dev] Parallel release series for directory authorities?

2012-08-31 Thread Nick Mathewson
Hi, all! Here's an idea I had for directory authorities and the 0.2.3 release series. "As you know Bob," Tor 0.2.3 will be stable very soon, and I'm hoping not to take any more patches for it except for important security issues. I want 0.2.4 to come out very early next year. But in the meantim

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD [SOLVED ?]

2012-08-10 Thread Nick Mathewson
On Fri, Aug 10, 2012 at 6:21 PM, Jordi Espasa Clofent wrote: > Well, finally it seems a Tor configure.in bug/problem: > > http://lists.freebsd.org/pipermail/freebsd-ports/2012-August/077440.html > > So.. I guess it has to be fixed by some tor dev then. Very interesting. That first stanza is inde

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-10 Thread Nick Mathewson
On Fri, Aug 10, 2012 at 10:14 AM, Jordi Espasa Clofent wrote: > On 08/09/2012 04:54 PM, Nick Mathewson wrote: >> Have a look near the top of "config.log" (please don't send the whole >> file; it will be enormous) -- there should be a part that says what >>

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-09 Thread Nick Mathewson
On Thu, Aug 9, 2012 at 6:04 AM, Jordi Espasa Clofent wrote: >> >> Can you see what arguments are being passed to configure, and what >> configure does with them? Is the freebsd build process passing >> --with-tcmalloc to the configure script? > > > Sure. > > mb# pwd && make showconfig Hm. Does a

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-08 Thread Nick Mathewson
On Wed, Aug 8, 2012 at 7:09 PM, Jordi Espasa Clofent wrote: > Here is the log: > > ===> Installing for tor-0.2.2.37 > ===> tor-0.2.2.37 depends on file: /usr/local/lib/libcrypto.so.7 - found > ===> tor-0.2.2.37 depends on shared library: event-2.0 - found > ===> tor-0.2.2.37 depends on shar

[tor-dev] Another key exchange algorithm for extending circuits: alternative to ntor?

2012-08-08 Thread Nick Mathewson
Hi, all! Michael Backes, Aniket Kate, and Esfandiar Mohammadi have a paper in submission called, "An Efficient Key-Exchange for Onion Routing". It's meant to be more CPU-efficient than the proposed "ntor" handshake. With permission from Esfandiar, I'm sending a link to the paper here for discussi

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-08 Thread Nick Mathewson
On Wed, Aug 8, 2012 at 4:26 PM, Jordi Espasa Clofent wrote: >> What line does the build process use when linking Tor? > > > Hi again Nick, > > I have no idea, but I guess I could do the next: > > 1. Stop the tor service > 2. deinstall the present port > 3. Check the tcmalloc option is enabled > 4.

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-08 Thread Nick Mathewson
On Mon, Aug 6, 2012 at 2:06 PM, Jordi Espasa Clofent wrote: > On 08/06/2012 07:03 PM, Nick Mathewson wrote: >> >> Hm. Tor itself doesn't have a tcmalloc compilation option, so whatever >> it's doing is something freebsd added. To debug this kind of thing, >>

Re: [tor-dev] [patch] fix vidalia compilation in gcc 4.7

2012-08-08 Thread Nick Mathewson
On Wed, Aug 8, 2012 at 1:44 PM, Jason A. Donenfeld wrote: > Fixed in a gentoo bug report: > > https://422645.bugs.gentoo.org/attachment.cgi?id=320722 I've added this to the bug tracker at https://trac.torproject.org/projects/tor/ticket/6575 so that it doesn't get lost. Thanks! -- Nick

Re: [tor-dev] Next Tor release timeframes?

2012-08-08 Thread Nick Mathewson
On Wed, Aug 8, 2012 at 5:04 AM, Roger Dingledine wrote: > 1) Do we have any requirements to release an 0.2.4.1-alpha at any > particular date? I haven't been following e.g. the latest SponsorG > timelines. > > 2) Nick was enthusiastic about an 0.2.2.38 with the latest fix. Nick, > do you still thi

Re: [tor-dev] Fwd: [tor-relays] tcmalloc in FreeBSD

2012-08-06 Thread Nick Mathewson
Hm. Tor itself doesn't have a tcmalloc compilation option, so whatever it's doing is something freebsd added. To debug this kind of thing, what I usually suggest is to rebuild and look carefully at which compiler and linker options are used in building Tor, and see if they include the appropriate

Re: [tor-dev] How to best support tor 0.2.3.x in Tor Browser Bundle?

2012-08-01 Thread Nick Mathewson
On Wed, Aug 1, 2012 at 2:55 AM, Erinn Clark wrote: IMO this comes down to the question of: Can we make the alpha TBB branch stable fast enough to have it be useful for testing? The crash bugs that Roger mentions make it less than useful anybody trying to get good testing info for Tor. So if we

[tor-dev] Proposal 205: Remove global client-side DNS caching

2012-07-20 Thread Nick Mathewson
Filename: 205-local-dnscache.txt Title: Remove global client-side DNS caching Author: Nick Mathewson Created: 20 July 2012 Status: Open 0. Overview This proposal suggests that, for reasons of security, we move client-side DNS caching from a global cache to a set of per-circuit caches

Re: [tor-dev] Clarification of prop 186

2012-07-17 Thread Nick Mathewson
On Tue, Jul 17, 2012 at 12:24 AM, Linus Nordberg wrote: > Hi, > > Can votes and consensuses have more than one "a" line? Prop 186 says, on > one hand > > [...] votes should include a single "a" line for every relay that has > an IPv6 address, to include the first IPv6 line in its > descripto

Re: [tor-dev] Minimum required ciphers for running Tor as both client and router.

2012-07-13 Thread Nick Mathewson
On Fri, Jul 13, 2012 at 8:14 AM, Gino Badouri wrote: Hi! > From the OpenSSL documentation it seems that no-hw and no-engines leaves out > support for hardware crypto engines so those are safe to set (our devices > don't have them). > > Could anybody provide us with more "no-" options for ciphers

Re: [tor-dev] Proposal 204: Subdomain support for Hidden Service addresses

2012-07-11 Thread Nick Mathewson
On Wed, Jul 11, 2012 at 11:09 AM, Nick Mathewson wrote: > Then I see no reason not to accept this proposal. Does anyone else? > Actually, there's a detail to think about: Isolation. If I connect to foo.a.onion bar.a.onion, should those streams be allowed to go over the s

Re: [tor-dev] Proposal 204: Subdomain support for Hidden Service addresses

2012-07-11 Thread Nick Mathewson
On Tue, Jul 10, 2012 at 7:24 AM, Karsten Loesing wrote: > On 7/7/12 7:06 PM, Nick Mathewson wrote: >> The only part I'm worried about here is that we had once considered >> doing authenticated hidden services or some other kind of wacky hidden >>

Re: [tor-dev] [PATCH] Implement proposal xxx: ignore subdomains in hidden service addresses

2012-07-07 Thread Nick Mathewson
Looks On Fri, Jul 6, 2012 at 10:56 AM, Jérémy Bobbio wrote: > The implementation is pretty straightforward: parse_extended_hostna me() is > modified to drop any leading components from an address like > 'foo..onion'. Looks good except for a few things: * It needs a "changes"

Re: [tor-dev] Proposal 204: Subdomain support for Hidden Service addresses

2012-07-07 Thread Nick Mathewson
On Fri, Jul 6, 2012 at 10:23 AM, wrote: > Hello! > > As discussed with a few people at the Florence Hackfest, here's a quick > proposal > for subdomain support on Hidden Service addresses. The implementation seems > pretty > straightforward (a patch will follow). > > Please forgive me if the pr

[tor-dev] Nick's status report for June 2012

2012-06-29 Thread Nick Mathewson
June was a pretty decent month! With help from Mike Perry, I finished a couple of rounds of job interviews, so we could select a new core developer. Let's welcome Andrea Shepard to the Tor project; she's already off to a great start, even though she's only part-time for her first couple of months

[tor-dev] Proposal 203: Avoiding censorship by impersonating an HTTPS server

2012-06-25 Thread Nick Mathewson
Hi all. Here's a proposal for ticket #5548. Let's discuss! Filename: 203-https-frontend.txt Title: Avoiding censorship by impersonating an HTTPS server Author: Nick Mathewson Created: 24 Jun 2012 Status: Draft Overview: One frequently proposed approach for censorship resistan

Re: [tor-dev] TLS warning using static OpenSSL 1.0.1c

2012-06-21 Thread Nick Mathewson
On Thu, Jun 21, 2012 at 5:05 PM, Gino Badouri wrote: > Hi there, > > My goal is to run Tor on small cluster of embedded mips devices. > Because the platform runs on an older version of OpenSSL and libevent I have > chosen to statically link them with Tor. > > So I went ahead to compile the compone

[tor-dev] The master branch is now 0.2.4.0-alpha-dev

2012-06-20 Thread Nick Mathewson
Hi, all. I have forked off a maint-0.2.3 and a release-0.2.3 branch in the usual fashion, and incremented the version in the master branch to "0.2.4.0-alpha-dev". All branches targeted for inclusion in Tor 0.2.3.x should now be based on "maint-0.2.3"; all branches targeted for inclusion in 0.2.4

Re: [tor-dev] Proposal 202: Two improved relay encryption protocols for Tor cells

2012-06-19 Thread Nick Mathewson
On Tue, Jun 19, 2012 at 2:06 PM, Robert Ransom wrote: > On 6/19/12, Nick Mathewson wrote: >> Filename: 202-improved-relay-crypto.txt > >>    Any new approach should be able to coexist on a circuit >>    with the old approach.  That is, if Alice wants to build a >>

[tor-dev] Proposal 202: Two improved relay encryption protocols for Tor cells

2012-06-19 Thread Nick Mathewson
Filename: 202-improved-relay-crypto.txt Title: Two improved relay encryption protocols for Tor cells Author: Nick Mathewson Created: 19 Jun 2012 Status: Open Overview: This document describes two candidate designs for a better Tor relay encryption/decryption protocol, designed to stymie

Re: [tor-dev] Open Proposals as of June 2012

2012-06-19 Thread Nick Mathewson
On Mon, Jun 18, 2012 at 8:30 PM, Jacob Appelbaum wrote: > On 06/18/2012 11:26 PM, Nick Mathewson wrote: >> This list of open Tor proposals is based on one I sent out in May of >> last year.  Since I'd like to do this more regularly, I have added to >> each descriptio

Re: [tor-dev] Open Proposals as of June 2012

2012-06-19 Thread Nick Mathewson
On Mon, Jun 18, 2012 at 10:40 PM, ahmed wrote: > On Mon, 2012-06-18 at 17:26 -0400, Nick Mathewson wrote: >>    194  Mnemonic .onion URLs > > Hello: > > I made a post about that topic in February, and it seems no one was > interested. I can implement a dictionary compi

[tor-dev] Open Proposals as of June 2012

2012-06-18 Thread Nick Mathewson
This list of open Tor proposals is based on one I sent out in May of last year. Since I'd like to do this more regularly, I have added to each description the date when I wrote it. Most of the summaries from older proposals are unchanged since last May; the later ones in the list for 6/2012 I wr

[tor-dev] Tor proposals implemented in Tor 0.2.3.x

2012-06-18 Thread Nick Mathewson
uces a notion of "consensus flavors" such that any every consensus vote produces a signed consensus in all the formats, caches cache all the formats, and clients download only those they need. (Proposal 158 by Roger Dingledine, revised a bunch by Nick Mathew

Re: [tor-dev] start_daemon and finish_daemon

2012-06-13 Thread Nick Mathewson
On Wed, Jun 13, 2012 at 7:26 PM, Zack Weinberg wrote: > Why is the process of going into daemon mode (on Unix) split into two > functions, start_daemon and finish_daemon? It's been so long since we added that code; I hope I remember. If I've got it right, the idea is that you call start_daemon()

Re: [tor-dev] [tor-assistants] Python metrics-lib

2012-05-15 Thread Nick Mathewson
On Mon, May 14, 2012 at 2:04 AM, Karsten Loesing wrote: > Hi Beck, > > I don't have good answers to your questions.  To be honest, when I > implemented the Java verification code for #2768, I looked for hints in > an old Java version of Tor, rewrote that code, updated it for current > BouncyCastle

Re: [tor-dev] Proposal: Make bridges report statistics on daily v3 network status requests

2012-05-10 Thread Nick Mathewson
On Thu, May 10, 2012 at 4:31 AM, Karsten Loesing wrote: > Hi Nick, > > here is the proposal as discussed in #5807 to improve our bridge usage > statistics. > > Thanks, > Karsten This is now proposal 201. Thanks! ___ tor-dev mailing list tor-dev@lists.t

Re: [tor-dev] Win32: tor-gencert.c

2012-05-07 Thread Nick Mathewson
On Fri, May 4, 2012 at 7:52 AM, Gisle Vanem wrote: > MSVC doesn't have . Hence this little patch is needed: Applied; thanks! -- Nick ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] [Patch] test_util.c with MSVC

2012-04-26 Thread Nick Mathewson
On Thu, Apr 26, 2012 at 4:37 PM, Esteban Manchado Velázquez wrote: > On Thu, 26 Apr 2012 09:09:09 +0200, Gisle Vanem wrote: > >> The src/test/test_util.c doesn't compile with MSVC (CL ver. >> 16.00.30319.01). >> It doesn't like the "#ifdef 0" construct, but the whole chunk should be >> enabled wi

Re: [tor-dev] Missing methodname in proposal 180 example

2012-03-26 Thread Nick Mathewson
On Sun, Mar 25, 2012 at 1:02 AM, David Fifield wrote: > I found a little typo in proposal 180. > > David Fifield Thanks; just merged it. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-26 Thread Nick Mathewson
On Mon, Mar 26, 2012 at 3:17 AM, Robert Ransom wrote: [...] >>    (OpenSSL before 1.0.0 did not support ECDHE ciphersuites; OpenSSL >>    before 1.0.0e or so had some security issues with them.) > > Can Tor detect that it is running with a version of OpenSSL with those > security issues and refus

[tor-dev] Proposal 200: Adding new, extensible CREATE, EXTEND, and related cells

2012-03-22 Thread Nick Mathewson
Filename: 200-new-create-and-extend-cells.txt Title: Adding new, extensible CREATE, EXTEND, and related cells Author: Robert Ransom Created: 2012-03-22 Status: Open History The original draft of this proposal was from 2010-12-27; nickm revised it slightly on 2012-03-22 and added it as proposa

Re: [tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-20 Thread Nick Mathewson
On Tue, Mar 20, 2012 at 11:57 PM, Jacob Appelbaum wrote: [...] > Ah ha. That sounds like a nightmare. Is there a bug report we can pile > on to request that they don't create a headache for everyone in the future? There is, but I don't currently see much point: their developers are irritated, and

Re: [tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-20 Thread Nick Mathewson
Jacob sent me this message in reply to my last; sending to tor-dev with permission. On Tue, Mar 20, 2012 at 11:57 PM, Jacob Appelbaum wrote: > On 03/20/2012 08:14 PM, Nick Mathewson wrote: >> On Tue, Mar 20, 2012 at 9:30 PM, Jacob Appelbaum wrote: >>> On 03/20/2012 08:33

Re: [tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-20 Thread Nick Mathewson
Forgot to send this to tor-dev: ouch. Sending now. On Tue, Mar 20, 2012 at 9:30 PM, Jacob Appelbaum wrote: > On 03/20/2012 08:33 AM, Nick Mathewson wrote: >> Filename: 198-restore-clienthello-semantics.txt >> Title: Restore semantics of TLS ClientHello >> Author: Nick Mat

Re: [tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-20 Thread Nick Mathewson
On Tue, Mar 20, 2012 at 10:48 PM, Tom Ritter wrote: > On 20 March 2012 11:33, Nick Mathewson wrote: >> Filename: 198-restore-clienthello-semantics.txt >> Title: Restore semantics of TLS ClientHello >> Author: Nick Mathewson >> Created: 19-Mar-2012 >> Status:

[tor-dev] Proposal 198: Restore semantics of TLS ClientHello

2012-03-20 Thread Nick Mathewson
Filename: 198-restore-clienthello-semantics.txt Title: Restore semantics of TLS ClientHello Author: Nick Mathewson Created: 19-Mar-2012 Status: Open Overview: Currently, all supported Tor versions try to imitate an older version of Firefox when advertising ciphers in their TLS ClientHello

Re: [tor-dev] Proposal: Message-based Inter-controller IPC Channel

2012-03-16 Thread Nick Mathewson
On Fri, Mar 16, 2012 at 8:15 PM, Mike Perry wrote: > Ugh.. Without the annoying tabs: > Added as proposal 197. Thanks! ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Pre-draft of Proposal XXX: Extended ORPort and TransportControlPort

2012-03-15 Thread Nick Mathewson
ports.txt > Title: Extended ORPort and TransportControlPort > Author: George Kadianakis, Nick Mathewson > Created: 14 Mar 2012 > Status: Open > Target: 0.2.4.x Thanks! I have added this as proposal 196. ___ tor-dev mailing list tor-dev@list

Re: [tor-dev] Pre-draft of Proposal XXX: Extended ORPort and TransportControlPort

2012-03-12 Thread Nick Mathewson
On Fri, Mar 9, 2012 at 5:01 AM, George Kadianakis wrote: [...] > > Hm, when I thought of 'WANT_CONTROL', I was considering that there > might be transports that absolutely _require_ the use of > TransportControlPort. Since we don't have such transports at the > moment, and the short-term future tr

Re: [tor-dev] Tor and DNS - draft finalized into proposal

2012-03-12 Thread Nick Mathewson
On Sat, Mar 10, 2012 at 9:22 AM, Ondrej Mikle wrote: > Hi all, > > the DNS/DNSSEC resolving draft for seems to be finished. Hi, Ondrej! I've got a few questions and comments. I might have more once I've thought a little more about the issues on this. > I added a few thoughts on mitigating cir

Re: [tor-dev] Proposal 195: TLS certificate normalization for Tor 0.2.4.x

2012-03-12 Thread Nick Mathewson
On Fri, Mar 9, 2012 at 8:03 PM, Robert Ransom wrote: > > Users need to specify a full certificate chain, not just the > end-entity certificate. Agreed that this is desirable, but if we take that route, we need to amend the current rule for deciding whether to use the v3/v2 vs the v1 handshake. C

Re: [tor-dev] Proposal 195: TLS certificate normalization for Tor 0.2.4.x

2012-03-12 Thread Nick Mathewson
On Fri, Mar 9, 2012 at 7:18 PM, George Kadianakis [...] > What is the reason we don't like session resumption? Does it still > makes sense to keep it disabled even after #4436 is implemented? The main reason not to support session resumption is that, as noted later in this thread, it can require

[tor-dev] Proposal 195: TLS certificate normalization for Tor 0.2.4.x

2012-03-09 Thread Nick Mathewson
Filename: 195-TLS-normalization-for-024.txt Title: TLS certificate normalization for Tor 0.2.4.x Author: Jacob Appelbaum, Gladys Shufflebottom, Nick Mathewson, Tim Wilde Created: 6-Mar-2012 Status: Draft Target: 0.2.4.x 0. Introduction The TLS (Transport Layer Security) protocol was designed

Re: [tor-dev] Pre-draft of Proposal XXX: Extended ORPort and TransportControlPort

2012-03-07 Thread Nick Mathewson
On Thu, Jan 26, 2012 at 8:38 PM, George Kadianakis wrote: > After discussion in tickets #4773 and #3587 this is a pre-draft of a > proposal that revamps the Extended ORport, introduced in proposal 180, > and specifies the new TransportControlPort. > > Comments are marked with '#', and there is als

Re: [tor-dev] First test "report"

2012-02-11 Thread Nick Mathewson
On Sat, Feb 11, 2012 at 7:12 AM, Esteban Manchado Velázquez wrote: > Hi there, > > I'm done with the first batch of work on the test side. You have the > (rebased just now) work here: > https://github.com/emanchado/tor/commits/master. A suggestion: In the future, it's best to do commits on one or

Re: [tor-dev] Tor and DNS

2012-02-07 Thread Nick Mathewson
On Tue, Feb 7, 2012 at 7:33 PM, Ondrej Mikle wrote: > On 02/07/2012 07:18 PM, Nick Mathewson wrote: >> part of the relay cell header should already fulfill this role, if I'm >> understanding the purpose of "ID" correctly. > > You're understanding t

Re: [tor-dev] Tor and DNS

2012-02-07 Thread Nick Mathewson
On Sat, Feb 4, 2012 at 10:38 PM, Ondrej Mikle wrote: > On 02/01/2012 10:01 AM, Jacob Appelbaum wrote: >> >> That sounds good. I'll wait for the first draft and send feedback. > > First draft is ready here: > > https://github.com/hiviah/torspec/blob/master/proposals/ideas/xxx-dns-dnssec.txt Cool!

Re: [tor-dev] Proposal xxx: Safe cookie authentication

2012-02-07 Thread Nick Mathewson
On Sun, Feb 5, 2012 at 7:46 AM, Robert Ransom wrote: > See attached, because GMail would wrap lines if I sent it inline. Added as proposal 193. This seems like a general case of "A and B prove to each other that they both know some secret S without revealing S." Are there existing protocols for

<    2   3   4   5   6   7   8   >