Re: [tor-dev] Haskell packages?

2013-06-06 Thread Roger Dingledine
On Thu, Jun 06, 2013 at 10:21:19AM +0400, Nikita Karetnikov wrote: I'd like to improve my Haskell skills. Are there any opportunities? I've been told there is at least one project that uses Haskell, which is not maintained. (For example, this page [1] mentions TorDNSEL, which was replaced

Re: [tor-dev] Haskell packages?

2013-06-06 Thread Lunar
Hi Nikita! Nikita Karetnikov: I'd like to improve my Haskell skills. Are there any opportunities? I've been told there is at least one project that uses Haskell, which is not maintained. (For example, this page [1] mentions TorDNSEL, which was replaced by TorBEL.) TorDNSEL is providing

Re: [tor-dev] Haskell packages?

2013-06-06 Thread Nikita Karetnikov
If you wish to make weasel (one of Tor all mighty sysadmins) happy you could update TorDNSEL to the new APIs and make sure that it works on Debian Wheezy. How do you feel about it? Well, I'm interested. But I don't promise anything. Even if my Haskell is rusty, I'd be happy to have a look

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-06 Thread Matthew Finkel
On Mon, May 20, 2013 at 12:11:37AM -0400, Griffin Boyce wrote: Matthew Finkel matthew.fin...@gmail.com wrote: So I think we should make some terms clear (just for the sake of clarity). We have, I guess, three different naming-system ideas floating here: petnames, (distibuted)

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-06-06 Thread Matthew Finkel
On Mon, May 20, 2013 at 12:25:03AM -0400, Tom Ritter wrote: On 17 May 2013 09:23, George Kadianakis desnac...@riseup.net wrote: There are basically two ways to do this: A third comes to mind, somewhat similar to Mike's. If we believe that 1024 RSA is not broken *now* (or at the very

[tor-dev] traversing the source code of tor

2013-06-06 Thread H S
Hi there, We would like to implement some specific protocol in Tor as an implementation project. Our one of pseudo codes that we have to take into account is the one mentioned on the paper under the link http://www.cypherpunks.ca/~iang/pubs/UC-OR.pdf , page 5, figure 2. I would like to know how