Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-20 Thread Sebastian Hahn
> On 18. Jan 2021, at 18:00, Roger Dingledine wrote: > While I was looking at moria1's directory activity during the overload, > I did say to myself "wow that's a lot of microdescriptor downloads". > > So hearing that torpy isn't caching mirodescriptors yet makes me think > that it's a good

Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-15 Thread Sebastian Hahn
Hi James, thanks for already working on patches for these issues! I will reply inline some more. > On 15. Jan 2021, at 23:56, James wrote: > > First of all, sorry if torpy hurt in some way Tor Network. It was > unintentionally. I believe you :) > In any case, it seems to me that if there

Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-11 Thread Sebastian Hahn
> On 11. Jan 2021, at 23:20, James wrote: > > Good day. > > Is there any chance that torpy (https://github.com/torpyorg/torpy) was > triggered this issue > https://gitlab.torproject.org/tpo/core/tor/-/issues/33018 ? > > Some wary facts: > - Torpy using old fashion consensus (not

Re: [tor-dev] How do Ed25519 relay IDs look like?

2020-08-01 Thread Sebastian Hahn
Hi Damian, > On 2. Aug 2020, at 00:04, Damian Johnson wrote: > >> I'd like to use "ed25519 identity" or even just "identity" here going >> forward. > > Gotcha. The name of 'identity' makes me wonder how this relates to > relay fingerprints, which are the canonical identifier we use. > >

Re: [tor-dev] Proposal 320: Removing TAP usage from v2 onion services

2020-05-19 Thread Sebastian Hahn
Hi there, > On 19. May 2020, at 19:55, Nick Mathewson wrote: > If we do decide to finally deprecate v2 onion services, that would be > a significant maintenance burden reduced for us, but we'd have to > handle the transition carefully. Unlike all the other migrations > we've done, there isn't a

Re: [tor-dev] Is there strictly a one-to-one BW scanner to BW auth relationship?

2018-03-25 Thread Sebastian Hahn
> On 24. Mar 2018, at 13:50, Rob Jansen wrote: >> I think moria1 runs its own, and Faravahar runs its own. I've lost track >> of the others, but I'd guess that bastet also runs its own, and that >> maatuska pulls numbers from a bwauth that tjr runs. >> >>

[tor-dev] Tor in a safer language: Network team update from Amsterdam

2017-03-31 Thread Sebastian Hahn
Hi there tor-dev, as an update to those who didn't have the chance to meet with us in Amsterdam or those who haven't followed the efforts to rely on C less, here's what happened at the "let's not fight about Go versus Rust, but talk about how to migrate Tor to a safer language" session and what

Re: [tor-dev] blacklisting relays with end-to-end correlation capabilities?

2016-12-09 Thread Sebastian Hahn
> On 08 Dec 2016, at 15:02, nusenu wrote: >> If we did this, also why would we blacklist the nonexit relays? That >> seems to not make sense, as a relay operator could have multiple relays >> that act as guard and exit simultaneously. > > Exit relays with the guard flag

[tor-dev] Requiring p lines in consensuses

2016-08-30 Thread Sebastian Hahn
Hi there, Karsten and I have been working on metrics-related tasks and one thing that's got a potential to cause us pain going forward is that of "p"-lines in consensuses. Tor has added them with consensus method 5 but only declared them to be optional. In practice, every consensus ever produced

[tor-dev] [::]/8 is marked as private network, why?

2016-03-29 Thread Sebastian Hahn
Hey, I've been wondering about the private_nets const in src/or/policies. It was added in a96c0affcb4cda1a2e0d83d123993d10efc6e396 but Nick doesn't remember why, and I'm hoping someone has an idea (maybe teor, who I've CCed here, who documented this in a later commit?). If nobody knows why we do

[tor-dev] Dynamically updating tor

2015-10-10 Thread Sebastian Hahn
Hi list, I recently played with the Kitsune[0] framework to figure out whether we might be able to use it to dynamically update (that is, perform an update without restarting the process) Tor relays on Linux. This post is just to make you aware such a thing has been attempted. I deem it currently

Re: [tor-dev] Draft proposal -- no number yet: How to safely drop support for old clients.

2015-09-30 Thread Sebastian Hahn
Hi, comments inline. On 09/30/2015 12:01 PM, Nick Mathewson wrote: Early versions of Tor checked the recommended-versions field in the directory to see whether they should keep running. If they didn't recognize you did the thing where you To override this, a Tor instance

Re: [tor-dev] [tor-reports] Sebastian's August 2015

2015-09-10 Thread Sebastian Hahn
> On 11 Sep 2015, at 07:04, ilv wrote: >> Next up is more of the same, especially focusing on website tickets >> and preparing the community team's dev meeting contributions. > > Maybe we could have a session at the dev meeting to talk about the > website (content, structure,

Re: [tor-dev] tor's definition of 'median'

2015-08-13 Thread Sebastian Hahn
On 13 Aug 2015, at 18:50, Nick Mathewson ni...@alum.mit.edu wrote: On Wed, Aug 12, 2015 at 5:34 PM, nusenu nus...@openmailbox.org wrote: from today's measurement meeting: 15:00:20 virgil karsten: I've decided I'm going to fix the definition of median 15:00:26 virgil in the tor

Re: [tor-dev] Brainstorming ideas for controller features for improved testing; want feedback

2015-03-26 Thread Sebastian Hahn
Hi! On 20 Mar 2015, at 16:55, Nick Mathewson ni...@torproject.org wrote: IDEAS = Many great ideas! Here's a few more, mostly just adding a bit to the things you already listed. Some of them make me kind of uneasy because they really are testing only and could be used for much

Re: [tor-dev] #if 0 unused functions?

2015-03-22 Thread Sebastian Hahn
Hi teor, On 22 Mar 2015, at 14:41, teor teor2...@gmail.com wrote: Date: Sun, 22 Mar 2015 05:12:03 +0100 From: Sebastian Hahn sebast...@torproject.org To: tor-dev@lists.torproject.org Hi there, we have some functions which we never call anywhere. In many cases, it appears we shouldn't

[tor-dev] #if 0 unused functions?

2015-03-21 Thread Sebastian Hahn
Hi there, we have some functions which we never call anywhere. In many cases, it appears we shouldn't delete them from the source because they belong there - the thing I initially stumbled across was ed25519_seckey_write_to_file(), for example. But I also don't see why compiling it and

[tor-dev] Removal of Vidalia-related content from Tor's website

2015-02-08 Thread Sebastian Hahn
Hi, I'm currently working on cleaning up the website. Our Vidalia bundles haven't been maintained in a long time, Tor Browser is the best way to use Tor as a client and nobody is stepping up to replace maintainership of the windows bundles. I'm removing the link to these bundles as well as the

Re: [tor-dev] Internet-wide scanning for bridges

2014-12-17 Thread Sebastian Hahn
Hi there, On 14 Dec 2014, at 20:06, Vlad Tsyrklevich v...@tsyrklevich.net wrote: I'm not against keeping some around, but this warning is unlikely to turn around the thousands that currently match this configuration--hopefully it'll just encourage future bridge operators to use a 'safer'

Re: [tor-dev] Git hosting changes, git:// support discontinued

2014-11-30 Thread Sebastian Hahn
Hi Jason, On 30 Nov 2014, at 23:32, Jason Cooper t...@lakedaemon.net wrote: On Sun, Nov 30, 2014 at 06:48:09PM +0100, Sebastian Hahn wrote: Access via https:// has been provided for years, and should continue to work without any hiccups. No issue there for folks that prefer the extra layer

Re: [tor-dev] Understanding bwauth data in Stem?

2014-11-21 Thread Sebastian Hahn
Hi there, On 21 Nov 2014, at 23:44, Damian Johnson ata...@torproject.org wrote: In other words, if I sorted the descriptors by measured value, what would that order mean? I *think* that would be the ordering of 'relays who receive the most tor client traffic due to having a more highly

Re: [tor-dev] Building TOR using Visual Studio

2014-10-18 Thread Sebastian Hahn
On 18 Oct 2014, at 06:29, teor teor2...@gmail.com wrote: Are there no-cost, non-license-restricted compilers available for Windows that support C99? This could be a way out for those who don't wish to pay for the VS 2013 upgrade. But it's a bit more of a barrier than using an existing

Re: [tor-dev] Building TOR using Visual Studio

2014-10-17 Thread Sebastian Hahn
On 17 Oct 2014, at 18:07, M. Ziebell ziebell_ma...@posteo.de wrote: Looking at this blog post [1] even the support for C99 in VS2013 is limited. I don't know if tor hit the limitations, that's for you to decide. C99 is 15 years old ... It should be sane to use it. Please also see bug

Re: [tor-dev] Scaling tor for a global population

2014-09-28 Thread Sebastian Hahn
On 28 Sep 2014, at 02:12, Tom Ritter t...@ritter.vg wrote: why not also change the consensus and related document formats to be something more efficient than ASCII text? Taking the latest consensus and doing some rough estimates, I found the following: Original consensus, xz-ed: 407K

Re: [tor-dev] Scaling tor for a global population

2014-09-28 Thread Sebastian Hahn
On 28 Sep 2014, at 16:33, Tom Ritter t...@ritter.vg wrote: On 28 September 2014 07:00, Sebastian Hahn sebast...@torproject.org wrote: This analysis doesn't make much sense, I'm afraid. We use compression on the wire, so repeating flags as human-readable strings has a much lower overhead than

Re: [tor-dev] Proposal 220 (revised): Migrate server identity keys to Ed25519

2014-08-17 Thread Sebastian Hahn
Hi Nick, On 25 Feb 2014, at 17:18, Nick Mathewson ni...@torproject.org wrote: To mirror the way that authority identity keys work, we'll fully support keeping Ed25519 identity keys offline; they'll be used to sign long-ish term signing keys, which in turn will do all of the heavy

Re: [tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-08-13 Thread Sebastian Hahn
On 18 Apr 2014, at 21:56, Nick Mathewson ni...@alum.mit.edu wrote: Thanks! I've added this as proposal 235. Code review down to 0.2.3.x has shown that the naming-related code hasn't changed much at all, and no issues were found which would mean a Named-flag free consensus would cause any

Re: [tor-dev] [GSoC] Consensus diffs - Fifth report

2014-08-02 Thread Sebastian Hahn
On 02 Aug 2014, at 21:25, Daniel Martí mv...@mvdan.cc wrote: This is the fifth status report of my Google Summer of Code project, which is to implement consensus diffs for Tor. My mentors - Sebastian and Nick - and myself usually hold meetings on IRC on wednesday at 16h UTC. 14h UTC.

Re: [tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-04-18 Thread Sebastian Hahn
On 18 Apr 2014, at 15:02, Karsten Loesing kars...@torproject.org wrote: If I understand the proposal correctly, operators will still be able to name their relay or bridge, and people can still find it in Atlas or Globe by this nickname. If so, great! Yes, this is in no way related to the

[tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-04-10 Thread Sebastian Hahn
Filename: xxx-kill-named-flag.txt Title: Stop assigning (and eventually supporting) the Named flag Authors: Sebastian Hahnn Created: 10 April 2014 Target: 0.2.5 Status: Draft 1. Intro and motivation Currently, Tor supports the

Re: [tor-dev] TorBEL migration

2013-04-29 Thread Sebastian Hahn
On Apr 30, 2013, at 3:17 AM, Sreenatha Bhatlapenumarthi sreenatha@gmail.com wrote: Hi, My name is Sreenatha Bhatlapenumarthi. I'd like to migrate TorBEL from TorCtl to Stem as a part of GSoC'13 project this summer. Hi Sreenatha, great to hear from you! Damian pointed out that there

Re: [tor-dev] Parallel release series for directory authorities?

2012-09-04 Thread Sebastian Hahn
On Sep 1, 2012, at 1:02 AM, Roger Dingledine wrote: On Sat, Sep 01, 2012 at 12:36:51AM +0200, Linus Nordberg wrote: Just a thought. A few of the directory authorities, I think at least three, as well as the bridge authority run packages/ports only, not builds from source. We'd have to

Re: [tor-dev] Win32/MSVC: tinytest.c problems

2012-05-05 Thread Sebastian Hahn
On May 5, 2012, at 3:30 PM, Gisle Vanem wrote: There are 2 problems with the use of 'stricmp()' (line 295) in tinytest.c. 1. As it is now, I'm getting an undefined reference to 'stricmp' when linking tinytest.exe and using '-nodefault:oldnames' in the link-flags. Can we please remove

Re: [tor-dev] [PATCH] tor-exit-notice.html: shorten Cornell URLs

2012-03-17 Thread Sebastian Hahn
On Mar 17, 2012, at 8:37 AM, Christian Kujau wrote: Hi, these ever so long law.cornell.edu URLs are now automatically redirecting to a shorter version - let's use that in our tor-exit-notice.html as well. Christian. Hi, and thanks for the patch. I've filed a trac ticket[0] for this

Re: [tor-dev] Proposal 193: Safe cookie authentication

2012-03-16 Thread Sebastian Hahn
On Feb 10, 2012, at 12:02 AM, Robert Ransom wrote: The sole exception to ‘non-safe cookie authentication must die’ is when a controller knows that it is connected to a server process with equal or greater access to the same filesystem it has access to. In practice, this means ‘only if you're

Re: [tor-dev] Using Tor w/o GeoIP

2012-01-22 Thread Sebastian Hahn
On Jan 20, 2012, at 1:48 AM, Nathan Freitas wrote: Is it the geoip database only required if you are specifying Exit/Entrances nodes by country code? I am thinking about not fully unpacking it into Android storage, unless the user activates those option in Orbot. This will save quite a bit

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-11-27 Thread Sebastian Hahn
On Nov 25, 2011, at 9:58 PM, Sebastian Hahn wrote: On Nov 25, 2011, at 9:27 PM, Sebastian Hahn wrote: I have since become convinced that it would be better to get this implemented quickly, even if it doesn't have a generic prevent this param from being set mechanism. I would thus like

[tor-dev] git-rw moved hosts - new ssh host key

2011-10-30 Thread Sebastian Hahn
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey there people who have repositories hosted on tpo hardware, weasel migrated cupani to our shiny new VM server. Along with this came a change of ssh host key, so please be ready to modify your known_hosts file accordingly when you next push. The

Re: [tor-dev] Sanitizing and publishing our web server logs

2011-09-02 Thread Sebastian Hahn
On Sep 2, 2011, at 2:46 PM, Karsten Loesing wrote: Hi Andrew, On 9/2/11 2:18 AM, Andrew Lewman wrote: On Thursday, August 25, 2011 04:08:00 Karsten Loesing wrote: we have been discussing sanitizing and publishing our web server logs for quite a while now. The idea is to remove all

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-05-02 Thread Sebastian Hahn
On Mar 2, 2011, at 8:06 AM, Nick Mathewson wrote: On Tue, Feb 22, 2011 at 1:34 AM, Sebastian Hahn hahn@web.de wrote: Design: When the consensus is generated, the directory authorities ensure that a param is only included in the list of params if at least half of the total number