Re: [tor-dev] Call for help on testing core tor releases

2016-10-13 Thread teor
you can do, the better! If you can't build tor from source, you can still help by giving us feedback on the Tor Browser alpha series, or the Tor Expert Bundles on Windows. T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:e

Re: [tor-dev] performance of CREATE/CREATED handshake

2016-10-12 Thread teor
> ___ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90

Re: [tor-dev] Revisiting prop224 client authorization

2016-10-11 Thread teor
way > for apps like Ricochet to get access to the fetch key). Why do we need both a fetch key and a client auth key? Isn't proving that you have a fetch key and a client auth key redundant? > d) It might be worthwhile padding the encrypted part of INTRODUCE1 to obscure > wh

Re: [tor-dev] prop224: Maximum introduction points in a descriptor

2016-10-11 Thread teor
siest change we can make, at least until we merge rendezvous handoff. https://trac.torproject.org/projects/tor/ticket/17254 Tim T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-29 Thread teor
> On 29 Sep 2016, at 08:06, Ivan Markin <t...@riseup.net> wrote: > > teor: >> Submit a patch on the ticket that changes the interval to 5 seconds, and >> see if it gets accepted before the code freeze: >> https://trac.torproject.org/projects/tor/ticket/2008

Re: [tor-dev] Request for comments: patch to mark exit traffic for routing and statistical analysis

2016-09-29 Thread teor
ing the existing code for OutboundBindAddress should help, although it is a complex option, because it can be specified twice, and an IPv4 address is parsed to OutboundBindAddressIPv4_, but an IPv6 address is parsed to OutboundBindAddressIPv6_. It would be best to refactor this parsing c

Re: [tor-dev] Constraining Ephemeral Service Creation in Tor

2016-09-29 Thread teor
cess using OS facilities. If you set an open file limit, this will constrain the number of hidden services. If it doesn't, or tor behaves badly when adding a hidden service with few file descriptors, file a bug against tor. T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D9

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-29 Thread teor
ls since a client is going to use one of the rest. >> Also note the reachability issue I mentioned. >> >> teor: >>> It would be nice to have this change in 0.2.9 for Single Onion >>> Services and I think also for HSs with OnionBalance > > Can we actually have this

Re: [tor-dev] Request for comments: patch to mark exit traffic for routing and statistical analysis

2016-09-25 Thread teor
. Binding to different IP addresses can also be used for filtering and traffic redirection. Does having separate bind addresses for OR and Exit traffic work for your use case? > What do you think of that approach? Does that seem reasonable or would > there be a cleaner approach to achieve th

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-19 Thread teor
or: o Minor bugfixes (relays): - Check that both the ORPort and DirPort (if present) are reachable before publishing a relay descriptor. Otherwise, relays publish a descriptor with DirPort 0 when the DirPort reachability test takes longer than the ORPort reachability test. F

Re: [tor-dev] Please consider allowing /48 for VirtualAddrNetworkIPv6

2016-09-16 Thread teor
roviding proxy server service to a network of computers using a tool like dns-proxy-tor, change the IPv4 network to "10.192.0.0/10" or "172.16.0.0/12" and change the IPv6 network to "[FC00]/7". (Yes, there is a typo in the last IPv6 addre

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-13 Thread teor
in 0.2.9. Instead, we made ntor (the upgraded handshake) mandatory almost everywhere, except hidden service client intro and server rendezvous. (And we made ntor onion keys mandatory for relays as well.) https://trac.torproject.org/projects/tor/ticket/19163 Tim Tim Wilson-Brown (teor) teor234

Re: [tor-dev] Tor path selection upon failure

2016-09-13 Thread teor
th, with a new Exit, HSDir, Intro Point, or Rendezvous Point (within various constraints). In the Exit case, it will try 3 different paths to 3 Exit relays that claim to allow exiting to the port it wants, then return a failure to the application that made the request. Tim Tim Wilson-Brown (teor)

Re: [tor-dev] [Patch] common/util_bug.h

2016-09-13 Thread teor
torproject.org/projects/tor/ticket/20141 Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org signature.asc Description: Message signed with OpenPGP using GPGMail ___

Re: [tor-dev] [tor-relays] Tor path selection upon failure

2016-09-13 Thread teor
___ > tor-relays mailing list > tor-rel...@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk

Re: [tor-dev] Tor Browser downloads and updates graphs

2016-09-12 Thread teor
escent.com/ > > ___ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968

Re: [tor-dev] Bored C programmers? I've got some warnings for you....

2016-09-08 Thread teor
;> actually fix it all before the next 029 alpha comes out, and improve >> our confidence in our unit tests. > > We're down to 17 of these. Thanks for turning these on, they were quite helpful when trying to work out why my improved single onion service unit tests were failing. (

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-07 Thread teor
or postpone it to prop224? It would be nice to have this change in 0.2.9 for Single Onion Services and I think also for HSs with OnionBalance > > [1] https://trac.torproject.org/projects/tor/ticket/20082 > -- > Ivan Markin > ___ >

[tor-dev] Can't bootstrap with one guard?

2016-08-25 Thread teor
if each of my relays is working correctly.) Did we have plans to switch to one guard any time soon? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org signature.asc

Re: [tor-dev] Not enabling IPv6 on check.torproject.org?

2016-08-18 Thread teor
check.torproject.org unreliable. Rather than removing a useful block-evasion feature, maybe we could redesign check.torproject.org to check a few different exit addresses? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:e

Re: [tor-dev] Alternative Implementations of Tor

2016-08-17 Thread teor
"Unable to retrieve the server descriptors: %s" % exc) return bw_to_platform bw_to_platform = get_bw_to_platform() for platform in sorted(bw_to_platform.keys()): print("%s,%i" % (platform, bw_to_platform[platform])) - Tim Tim Wilson-Brown (teor) teor2345 at gmail dot

Re: [tor-dev] How to integrate an external name resolver into Tor

2016-08-02 Thread teor
ther an example resolver that just does simple extension substitution? It would amuse me to be able to visit 3g2upl4pq6kufc4m.chive, or 3g2upl4pq6kufc4m.allium. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk

[tor-dev] prop224: zero bits in addresses

2016-08-02 Thread teor
Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmmp: teor at torproject dot org signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor-dev mailing list

Re: [tor-dev] [network-team] [doodle poll] Meeting to discuss guard proposal draft status

2016-07-18 Thread Tim Wilson-Brown - teor
? (this needs to be part of the filter or prioritisation or both) Some suggestions about how to fix some complex issues. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B OTR 8F39BCAC 9C9DDF9A DF5FAE48 1D7D99D4 3B406880 r

Re: [tor-dev] [network-team] [doodle poll] Meeting to discuss guard proposal draft status

2016-07-18 Thread Tim Wilson-Brown - teor
? (this needs to be part of the filter or prioritisation or both) Some suggestions about how to fix some complex issues. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B OTR 8F39BCAC 9C9DDF9A DF5FAE48 1D7D99D4 3B406880 r

Re: [tor-dev] HSFETCH fails on basic auth services

2016-06-29 Thread Tim Wilson-Brown - teor
ciated. Perhaps HSFETCH only looks in the HS cache, but hidden services don't cache their own descriptors? Perhaps HSFETCH doesn't look at HidServAuth? Perhaps HSFETCH shouldn't try to decrypt the descriptor before delivering it? Perhaps it should? I encourage you to log an issue for each of these

Re: [tor-dev] Usability Improvements for Atlas (was Re: Globe is now retired)

2016-06-29 Thread Tim Wilson-Brown - teor
for small changes before merging. > > Thanks, > Iain. > > [1]: https://trac.torproject.org/projects/tor/ticket/5430 > [2]: https://trac.torproject.org/projects/tor/ticket/6787 > ___ > tor-dev mailing list >

Re: [tor-dev] is the consensus document unpredictable / unique?

2016-06-28 Thread Tim Wilson-Brown - teor
you need to specify it all in one place, and then convince a cryptographer to review it. (I am not a cryptographer.) And then have your implementation reviewed against the spec. How is the card you're using for side-channels? Keys have beed extracted using power usage information, or electromagnetic

Re: [tor-dev] Tor with collective signatures

2016-05-26 Thread Tim Wilson-Brown - teor
nistic, even thought CoSi signing is not, due to network effects - a CoSi signer may sign one request, but go down before signing them all.) A third is for CoSi signatures to be appended to the consensus, just like authority signatures are appended. Then authorities, mirrors, and clients only se

Re: [tor-dev] Memory usage of Tor daemon

2016-05-20 Thread Tim Wilson-Brown - teor
ld drop in the common case, if we really needed to. But do we really need to? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor

Re: [tor-dev] Memory usage of Tor daemon

2016-05-20 Thread Tim Wilson-Brown - teor
, but in the interim, it means an increase in memory usage. Please feel free to let us know if this is a pressing issue for you, and we'll see what we can do. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Descriptio

[tor-dev] GSOC 2017 (was Re: tor-dev Digest, Vol 64, Issue 26)

2016-05-17 Thread Tim Wilson-Brown - teor
so people know what you're replying to. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor-dev mailing list tor-dev

Re: [tor-dev] Directory authority of type bridge?

2016-05-11 Thread Tim Wilson-Brown - teor
> On 11 May 2016, at 12:49, Tim Wilson-Brown - teor <teor2...@gmail.com> wrote: > >> >> On 11 May 2016, at 12:38, Nicholas R. Parker (RIT Student) <nrp7...@rit.edu> >> wrote: >> >> Hey again all, got another one for you. >> When we've star

Re: [tor-dev] Directory authority of type bridge?

2016-05-11 Thread Tim Wilson-Brown - teor
the bridge. UseBridges 0|1 When set, Tor will fetch descriptors for each bridge listed in the "Bridge" config lines, and use these relays as both entry guards and directory guards. (Default: 0) If you need more detail, I'd encourage you to read the other tor manual enti

Re: [tor-dev] Exit relay proportions for test network

2016-05-08 Thread Tim Wilson-Brown - teor
t relay is fine, but it's also worth testing with multiple exit relays to ensure your code doesn't depend on their only being 1 exit. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Description: Message sig

Re: [tor-dev] Testing Network Node Availability

2016-05-08 Thread Tim Wilson-Brown - teor
> On 8 May 2016, at 02:46, Roger Dingledine <a...@mit.edu> wrote: > > On Sun, May 08, 2016 at 02:04:23AM -0400, Tim Wilson-Brown - teor wrote: >>> ??? Each client will have a cache-microdesc-consensus file with 4 >>> relays in it. relay 0, 1 and 2 will

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

2016-05-07 Thread Tim Wilson-Brown - teor
,k+2*v3) > > In this description, round() returns the closest integer and abs() returns the > absolute value. > Note that all computations involved in helprec operate on secret data and must > be protected against timing attacks. round() is underspecified here: does 0.5 round to 0 or

Re: [tor-dev] Testing Network Node Availability

2016-05-06 Thread Tim Wilson-Brown - teor
likely a configuration issue with your network. > I'll try rebase back to an official release today. That might help, we are still fixing bugs in 0.2.8. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Descriptio

Re: [tor-dev] Proposal: Tor with collective signatures

2016-04-30 Thread Tim Wilson-Brown - teor
counted for. If a descriptor is 1.5KB, and you need to download 100 of them, that's an extra 1.5MB at bootstrap time. Microdescriptor consensuses are 1.3MB. So that would mean increasing the additional bandwidth requirements for fallback directory mirrors from 20KB/s to 50KB/s. This excludes the

Re: [tor-dev] Revisiting prop224 time periods and HS descriptor upload/downloads

2016-04-27 Thread Tim Wilson-Brown - teor
and hidden services can have before TLS or Tor-specific crypto fails? Does anyone want to spin up a VM and work this out? In the interim, let's assume the crypto will work, and modify the proposal with a larger clock skew. Tim [0]: https://en.wikipedia.org/wiki/List_of_UTC_time_offsets

Re: [tor-dev] prop224: HSDir caches question with OOM

2016-04-19 Thread Tim Wilson-Brown - teor
> On 20 Apr 2016, at 07:22, David Goulet <dgou...@ev0ke.net> wrote: > > On 18 Apr (13:18:25), George Kadianakis wrote: >> Tim Wilson-Brown - teor <teor2...@gmail.com> writes: >> >>> [ text/plain ] >>> >>>> On 16 Apr 2016,

Re: [tor-dev] putting 'Nuke MyFamily' to vote (#6676)

2016-04-16 Thread Tim Wilson-Brown - teor
I also wonder about the impact on path selection and client security - even an honest operator can have their relays compromised or be compelled to provide information. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Descrip

Re: [tor-dev] prop224: HSDir caches question with OOM

2016-04-15 Thread Tim Wilson-Brown - teor
long as K is small. This carries a slight risk of over-deallocating cache entries. Which is OK at OOM time. I like this one, because it's simple, performant, and doesn't need any extra memory allocations. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzg

Re: [tor-dev] Configuring Single Onion Services

2016-04-11 Thread Tim Wilson-Brown - teor
> On 12 Apr 2016, at 04:22, David Goulet <dgou...@ev0ke.net> wrote: > > On 08 Apr (10:15:19), Tim Wilson-Brown - teor wrote: >> Hi All, >> >> I'm working on proposal 260's Rendezvous Single Onion Services in #17178. >> >> They are faster,

Re: [tor-dev] [tor-relays] Private Tor Research Network

2016-04-08 Thread Tim Wilson-Brown - teor
has more specific requirements for security reasons, this protects the keys from other users on the system. It's hard to give more advice without more specific details. If this advice doesn't help, please copy and paste the configuration options you used, and the errors you got, and then tell us

Re: [tor-dev] Tor debugging

2016-04-07 Thread Tim Wilson-Brown - teor
by running the test binary with the test name. chutney is slow, but it's used for whole-program and whole-network integration tests. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet:ekmygaiu4rzgsk6n signature.asc Description: Message signed with OpenPGP using GPGMail

Re: [tor-dev] Update on 259

2016-04-07 Thread Tim Wilson-Brown - teor
a guide to when we should warn the user. But we never considered failing closed in these circumstances: what if the user just wants circumvention, and not anonymity? https://trac.torproject.org/projects/tor/ticket/17849 Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B ricochet

Re: [tor-dev] Update on 259

2016-04-06 Thread Tim Wilson-Brown - teor
hard to discover during modelling. Using a malicious guard has similar consequences to Tor failing closed, and users switching to a non-tor browser. I'm not sure which is worse. It probably depends on the user. But we should try to avoid both scenarios. Tim Tim Wilson-Brown (teor) teo

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-03-30 Thread Tim Wilson-Brown - teor
> On 27 Mar 2016, at 05:42, s7r <s...@sky-ip.org> wrote: > > Hello, > > teor, asn, see comments inline. > > On 3/24/2016 5:00 PM, Tim Wilson-Brown - teor wrote: > [snip] >>>> The number of directory guards will increase when 0.2.8-stable is &g

Re: [tor-dev] [::]/8 is marked as private network, why?

2016-03-29 Thread Tim Wilson-Brown - teor
e396 but Nick doesn't >> remember why, and I'm hoping someone has an idea (maybe teor, who I've >> CCed here, who documented this in a later commit?). If nobody knows why >> we do this I think we should remove it as likely incorrect. > > ::/8 is Reserved by the IET

Re: [tor-dev] Notes from the prop224 proposal reading group

2016-03-29 Thread Tim Wilson-Brown - teor
That's a fair point. The big question here is, is this worth the >>> complexity >>> that MAINT_INTRO and UPDATE-KEYS-SUBCMD add to the protocol logic? I'm not convinced that this feature is necessary. I think we should remove it, and if it looks like it's needed later,

Re: [tor-dev] Tor 0.2.8 and Fallback Directory Mirrors

2016-03-26 Thread Tim Wilson-Brown - teor
> On 26 Mar 2016, at 21:36, intrigeri <intrig...@boum.org> wrote: > > Hi, > > Tim Wilson-Brown - teor wrote (21 Mar 2016 18:16:46 GMT) : >> If this feature does cause problems, or if your app needs to bootstrap only >> from the >> authorities (Tails tim

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-03-24 Thread Tim Wilson-Brown - teor
> On 25 Mar 2016, at 00:31, George Kadianakis <desnac...@riseup.net> wrote: > > Tim Wilson-Brown - teor <teor2...@gmail.com <mailto:teor2...@gmail.com>> > writes: > >> [ text/plain ] >> >>> On 24 Mar 2016, at 22:55, George Kadianakis &

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-03-24 Thread Tim Wilson-Brown - teor
are the security tradeoffs if we do? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with OpenPGP using GPGMail ___ t

[tor-dev] Urgent fixes for 0.2.8.2-alpha

2016-03-24 Thread Tim Wilson-Brown - teor
directory mirrors (0.2.8.1-alpha / 0.2.4.7-alpha) The release in brackets is when each issue was introduced. I don't know of any other patches (assigned to me) that are urgent enough to hold up the next alpha. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im

Re: [tor-dev] Tor 0.2.8 and Fallback Directory Mirrors

2016-03-22 Thread Tim Wilson-Brown - teor
> On 22 Mar 2016, at 23:30, Nathan Freitas <nat...@freitas.net> wrote: > > On Mon, Mar 21, 2016, at 02:16 PM, Tim Wilson-Brown - teor wrote: >> Just a heads' up that tor 0.2.8 includes a fallback directory mirrors >> feature, where tor clients bootstrap from a s

Re: [tor-dev] Core Tor / Network Team meeting time updates.

2016-03-19 Thread Tim Wilson-Brown - teor
the past six months. I'm not sure 3 or more pairwise meeting times is a good idea, it seems very complex. But I'm concerned about the extra load on Nick and Isabela. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B

Re: [tor-dev] How to build a Router that will only allow Tor users

2016-03-19 Thread Tim Wilson-Brown - teor
ority addresses are kept up to date in both the tor source code and the network consensus. If you're using an old version of tor, some of the addresses may be outdated. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A

Re: [tor-dev] Set up Tor private network

2016-02-25 Thread Tim Wilson-Brown - teor
r, and there is no majority consensus about certain information, or the entire network state.) Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with OpenPGP using GPGMai

Re: [tor-dev] Support for mix integration research

2016-02-22 Thread teor
details on the mix and stuff will sure be provided if needed! Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Help with TOR on UDP/QUIC

2016-02-19 Thread teor
ence-in-depth against intrusion attempts. You might have to redo some of Tor's security proofs if you want to disable the outermost encryption layer. At the very least, you'll have to justify changing from TCP and TLS to QUIC without TLS, which is harder than TCP and TLS to QUIC and TLS. Why

Re: [tor-dev] Help with TOR on UDP/QUIC

2016-02-16 Thread Tim Wilson-Brown - teor
How do Tor engineers test new stuff? I typically use chutney for smoke tests. Others use shadow for simulations: https://gitweb.torproject.org/chutney.git/ <https://gitweb.torproject.org/chutney.git/>https://shadow.github.io/ <https://shadow.github.io/> Tim Tim Wilson-Brown (teor

Re: [tor-dev] Proposal: Rendezvous Single Onion Services

2016-02-11 Thread Tim Wilson-Brown - teor
15 at 01:54:50AM +1100, Tim Wilson-Brown - teor wrote: >> Rendezvous single onion services have a few benefits over single onion >> services: >> >> * A rendezvous single onion service can load-balance over multiple >>rendezvous backends (see proposal

Re: [tor-dev] Propsal 263 Quantum-safe Hybrid handshake for Tor, updated feature request v1.2

2016-02-08 Thread Tim Wilson-Brown - teor
gorithm. So it's really up to debian-legal, who I assume we've asked or will be asking. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with OpenPGP using

Re: [tor-dev] Roadmap - Hidden service next generation (prop224)

2016-02-08 Thread Tim Wilson-Brown - teor
in the pad (which is a "Can Comment" link). I can't seem to edit the pad. Does the link just allow annotation, or full-blown editing? Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signatur

[tor-dev] Onion (Hidden) Service Proposal Discussion

2016-02-08 Thread Tim Wilson-Brown - teor
-08-22.00.log.html> [2]: https://trac.torproject.org/projects/tor/ticket/17178 <https://trac.torproject.org/projects/tor/ticket/17178> Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc De

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-31 Thread Tim Wilson-Brown - teor
> On 15 Jan 2016, at 03:07, Mike Perry <mikepe...@torproject.org> wrote: > > Tim Wilson-Brown - teor: >>> On 13 Jan 2016, at 00:53, Mike Perry <mikepe...@torproject.org >>> <mailto:mikepe...@torproject.org>> wrote: >>> 1. Overview >

Re: [tor-dev] Need to know if this is a bug

2016-01-29 Thread Tim Wilson-Brown - teor
v and tor-talk so people know the question has been answered. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with OpenPGP using GPGMail _

Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-28 Thread Tim Wilson-Brown - teor
> On 28 Jan 2016, at 01:05, Nick Mathewson <ni...@torproject.org> wrote: > > On Tue, Jan 26, 2016 at 9:01 PM, Tim Wilson-Brown - teor > <teor2...@gmail.com <mailto:teor2...@gmail.com>> wrote: >> >> On 26 Jan 2016, at 23:19, David Goulet <dgou...

Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-26 Thread Tim Wilson-Brown - teor
> On 26 Jan 2016, at 23:19, David Goulet <dgou...@ev0ke.net> wrote: > > On 26 Jan (07:00:31), Nick Mathewson wrote: >> On Mon, Jan 25, 2016 at 5:14 AM, David Goulet <dgou...@ev0ke.net> wrote: >>> On 18 Jan (07:13:36), Tim Wilson-Brown - teor wrote: >>

Re: [tor-dev] Introducing Snowflake (webrtc pt)

2016-01-25 Thread Tim Wilson-Brown - teor
Pv6 file /opt/local/share/tor/geoip6. Jan 26 12:25:50.000 [notice] Bootstrapped 0%: Starting Jan 26 12:25:50.000 [notice] Delaying directory fetches: No running bridges Jan 26 12:25:52.000 [notice] Bootstrapped 5%: Connecting to directory server Jan 26 12:25:52.000 [notice] Bootstrapped 10%: Finishing ha

Re: [tor-dev] Introducing Snowflake (webrtc pt)

2016-01-25 Thread Tim Wilson-Brown - teor
99 1 udp 2122260223 192.168…. 48952 typ host generation 0 a=candidate:3800267063 1 tcp 1518280447 192.168…. 0 typ host tcptype active generation 0 a=candidate:759726963 1 udp 1686052607 199... 48952 typ srflx raddr 192.168…. rport 48952 generation 0 a=ice-ufrag:gW3Squmad22xQeoQ a=ice-pwd:OAGHWixl0ZICWg2JYTXOr

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-24 Thread Tim Wilson-Brown - teor
> On 25 Jan 2016, at 03:10, s7r <s...@sky-ip.org> wrote: > > Signed PGP part > Hi teor, > > On 1/24/2016 6:33 AM, Tim Wilson-Brown - teor wrote: > > Please read the tor man page documentation for the option > > Tor2webRendezvousPoin

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread Tim Wilson-Brown - teor
into buckets, like we do for other statistics, but I'm not sure there's much point, as they are never seen outside the hidden service. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread Tim Wilson-Brown - teor
is a client which is configured to use the same rendezvous point(s) for every hidden service connection, it will get banned if it connects to the same hidden service too many times. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread Tim Wilson-Brown - teor
> On 24 Jan 2016, at 13:04, s7r <s...@sky-ip.org> wrote: > > Signed PGP part > > On 1/24/2016 1:51 AM, Tim Wilson-Brown - teor wrote: > > > >> On 24 Jan 2016, at 09:28, s7r <s...@sky-ip.org > >> <mailto:s...@sky-ip.org>> wrote: >

Re: [tor-dev] Notes from 1st Tor proposal reading group [prop241, prop247, prop259]

2016-01-19 Thread Tim Wilson-Brown - teor
ject.org/projects/tor/ticket/17840 See also #17849, where yawning and I discuss logging a warning if clients have very restricted guard choices. https://trac.torproject.org/projects/tor/ticket/17849 Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im

Re: [tor-dev] Entry/Exit node selection

2016-01-18 Thread Tim Wilson-Brown - teor
es ISPs to retain connection information, so choosing a nearby entry to me, and a nearby exit to a website in this country, would be very detrimental to my anonymity. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B

Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.

2016-01-17 Thread Tim Wilson-Brown - teor
ose > with others so moving this one before or after Febuary 2nd would be > great for me. If impossible, I'll read the notes I guess :). This is at half past midnight on a Saturday for me, can we move it to time somewhere in 4pm - 8pm eastern (2100 - 0100 UTC)? Thanks Tim Tim Wilson-Brown (

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-17 Thread Tim Wilson-Brown - teor
> On 15 Jan 2016, at 03:07, Mike Perry <mikepe...@torproject.org> wrote: > > Tim Wilson-Brown - teor: >>> On 13 Jan 2016, at 00:53, Mike Perry <mikepe...@torproject.org >>> <mailto:mikepe...@torproject.org>> wrote: >>> 1. Overview >

Re: [tor-dev] Needs Code Review: Shared Randomness Generation for Tor

2016-01-13 Thread Tim Wilson-Brown - teor
> On 13 Jan 2016, at 20:02, David Goulet <dgou...@ev0ke.net> wrote: > > On 13 Jan (11:34:05), Tim Wilson-Brown - teor wrote: >> >>> On 13 Jan 2016, at 01:46, George Kadianakis <desnac...@riseup.net> wrote: >>> >>> ... >>> For wha

Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points

2016-01-13 Thread Tim Wilson-Brown - teor
irs, but they need an introduction point to be up whenever they contact the hidden service. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with Op

Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)

2016-01-12 Thread Tim Wilson-Brown - teor
s or address families, and * tor may not be able to detect which address(es) it is exiting from, or it may be an expensive or unreliable process. But please feel free to submit a proposal to include exit IP addresses in the consensus - it would help if it included strategies to address these concer

Re: [tor-dev] Needs Code Review: Shared Randomness Generation for Tor

2016-01-12 Thread Tim Wilson-Brown - teor
ess requires? (I understand the standard setting is 24, 12 for the commit, and 12 for the reveal.) Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with O

Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters

2016-01-12 Thread Tim Wilson-Brown - teor
Depending on whether an exit or internal circuit is cannibalised, they can look like: G M E E G M M E And what about hidden service paths (paths that include two middle nodes?) G M M Or, if cannibalised from an exit or internal circuit: G M E M G M M M Again, I think these will just be par

Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit

2016-01-08 Thread Tim Wilson-Brown - teor
a minor social effect if people are seeking flags for their relays. (Nor will it have much effect on policy, except, again, for a minor social effect.) Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F sign

Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network

2016-01-07 Thread Tim Wilson-Brown - teor
This would prevent them > from downloading new consensuses. > > [This proposal would result in the quietest shutdown.] Are we aiming to do this for 0.2.8? I think it would be a good idea, as adding default fallback directories makes it harder to implement some authority-only strategie

Re: [tor-dev] Proposal 264: Putting version numbers on the Tor subprotocols

2016-01-07 Thread Tim Wilson-Brown - teor
n so we > we don't need to do code archeology to determine which number You did that thing where you start a sentence Otherwise looks good, modulo a few typos that don't affect meaning. Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08

Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit

2016-01-06 Thread Tim Wilson-Brown - teor
etwork bandwidth. (Given the small number of Exits flags affected by this change, I'm not sure if this policy is responsible for all the good Exits, or if our exit-checking tools are responsible.) Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR C

Re: [tor-dev] [Win32] test_util.c + test_checkdir.c

2016-01-06 Thread Tim Wilson-Brown - teor
_WIN32 > -#include > -#else > +#ifndef _MSC_VER > #include > #endif > > Since is already included in "or.h", it's not needed here > too. > > -- > --gv > _______ > tor-dev mailing list > tor-dev@lists.tor

Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit

2016-01-05 Thread Tim Wilson-Brown - teor
> On 5 Jan 2016, at 19:33, Tom van der Woerdt <i...@tvdw.eu> wrote: > ... > Op 05/01/16 om 02:15 schreef Tim Wilson-Brown - teor: >> >>> On 5 Jan 2016, at 11:29, Tom van der Woerdt <i...@tvdw.eu >>> <mailto:i...@tvdw.eu>> wrote: >>> ..

Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit

2016-01-04 Thread Tim Wilson-Brown - teor
y used right now? Alternately, we could add other widely used SSL ports in addition to XMMP, and perhaps increase the rule to "at least two SSL ports". Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D

Re: [tor-dev] Go version in Gitian descriptors

2016-01-03 Thread Tim Wilson-Brown - teor
remaining Go 1.x standard library and commands. https://docs.google.com/document/d/1OaatvGhEAq7VseQ9kkavxKNAfepWy2yhPUBs96FGV28/edit?pref=2=1 Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Description: Message signed with OpenPGP us

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Tim Wilson-Brown - teor
ould download the differences between each consensus each hour, rather than downloading a full consensus (~1.5MB). It showed some great results, but still needs a little work before we merge it. https://trac.torproject.org/projects/tor/ticket/13339 <https://trac.torproject.org/projects/tor/ticket/

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Tim Wilson-Brown - teor
rogrammers… (On the other hand, if there's no reference implementation, then that makes it hard to recommend that particular crypto scheme.) Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F signature.asc Desc

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Tim Wilson-Brown - teor
> On 3 Jan 2016, at 14:12, Jesse V <kernelc...@riseup.net> wrote: > > On 01/02/2016 05:42 PM, Tim Wilson-Brown - teor wrote: >> And if we can't use the reference implementation, we have some decent >> programmers… >> (On the other hand, if there's no reference i

Re: [tor-dev] Help me help you : )

2015-12-11 Thread Tim Wilson-Brown - teor
> On 11 Dec 2015, at 22:47, Oskar Wendel <o.wen...@wp.pl> wrote: > > Signed PGP part > Tim Wilson-Brown - teor <teor2...@gmail.com>: > > > Volunteers can do many different tasks: > > https://www.torproject.org/getinvolved/volunteer > > <

Re: [tor-dev] tor 0.2.7.5 make error

2015-12-07 Thread Tim Wilson-Brown - teor
reconf -fiv. 8.x is EOL anyways. What's the version of autoconf / automake? We're trying to work out which autotools versions we support in #17732. https://trac.torproject.org/projects/tor/ticket/17732 <https://trac.torproject.org/projects/tor/ticket/17732> Tim Tim Wilson-Brown (teor) te

Re: [tor-dev] Scaling Tor Metrics, Round 2

2015-12-07 Thread Tim Wilson-Brown - teor
> On 7 Dec 2015, at 19:14, Karsten Loesing <kars...@torproject.org> wrote: > > On 07/12/15 01:07, Spencer wrote: > > Hi, > >> teor: Do David's visualizations already use JavaScript? We could > >> make (another) part of the metrics site use JavaScript.

Re: [tor-dev] Graphs - Estimated Traffic Capacity

2015-12-07 Thread Tim Wilson-Brown - teor
> On 22 Nov 2015, at 02:55, David Goulet <dgou...@ev0ke.net> wrote: > > On 21 Nov (16:26:31), Tim Wilson-Brown - teor wrote: > ... >> It would be great to have some stats for typical path lengths, is there an >> open ticket for this, or should I create one? > &

<    1   2   3   4   5   6   7   >