Re: [tor-dev] PRELIMINARY: [PATCH 3/3] Replace 'TorDNSEL.System.Timeout' with 'System.Timeout'.

2013-07-26 Thread Lunar
Nikita Karetnikov: Using `git blame` or `git log -S` or `git log -G` will actually work better than a file by file summary. If you throw in the `-M` option, it'll work accross renames, for examples. OK. But that information will be lost if we decide to change a VCS for some reason.

[tor-dev] [GSOC2013] EvilGenius status report

2013-07-26 Thread Johannes Fürmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi *, In addition to attending the tor meeting in Garching (which was really awsesome, by the way) I really got some work on EvilGenius in the past two weeks. Since Arturo and I outlined the rough structure of the EvilGenius command line interface,

[tor-dev] [GSOC] Status report - Tor capabilities

2013-07-26 Thread Cristian-Matei Toader
Hello tor-dev, For the last week I was on holiday for the graduation ceremony. I did however manage to get some work done, so for the past 2 weeks I have: - worked on adding parameter filters for the syscall filter; this is done using both a static list of parameters, as well as a dynamic list

[tor-dev] Status report - Stream-RTT

2013-07-26 Thread ra
Hi all! During the last weeks I have been very busy working on my GSoC project which is about reducing the RTT of preemptively built circuits. There is now a single script called rttprober[0] that depends on a patched[1] Tor client running a certain configuration[2]. The goal is to measure

Re: [tor-dev] RFC: obfsproxyssh

2013-07-26 Thread David Fifield
On Fri, Jun 28, 2013 at 02:13:18AM -0700, Yawning Angel wrote: obfsproxyssh is a pluggable transport that uses the ssh wire protocol to hide tor traffic. It uses libssh2 and interacts with a real sshd located on the bridge side. Behaviorally it is identical to a user sshing to a host,

Re: [tor-dev] RFC: obfsproxyssh

2013-07-26 Thread Andreas Krey
On Tue, 02 Jul 2013 23:42:20 +, Ximin Luo wrote: ... What sort of PKI are you using to verify the pubkey claimed by either side, to prevent MitM? What for? The authentication happens in the next step, within the OR/bridge protocol. In this case we just have an additional layer of encryption

[tor-dev] [GSOC 2013] Steganography Browser Extension Status Report

2013-07-26 Thread Hareesan
Hi, My work plan for last week was to update the locale information and to finish file uploading parts of extension. For now testing purpose, when a file is being selected the byte format will be popped. With this, the locale information has being updated. With this, I have started working on