[tor-dev] GSoC final progress update (Stegotorus)

2014-08-17 Thread Noah Rahman
The following tickets were largely achieved (last is in process of debugging) - adding config file (see branch https://github.com/TheTorProject/stegotorus/tree/f--modus-operandi) - adding elligator handshake ( https://github.com/TheTorProject/stegotorus/tree/f--circuit-handshake) [0] - moving

Re: [tor-dev] Decentralized VOIP over Tor

2014-08-17 Thread terryz
I looked at Ostel. Can Ostel be routed over Tor or is there another way to get anonymity using Ostel? I said decentralized VOIP because no central servers would be managing the communications. Any Tor node could possibly be a VOIP server. The network data would have to be continually

[tor-dev] Orbot Orfox - GSoC bi-weekly report 6

2014-08-17 Thread Amogh Pradeep
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Status Report 6 August 17th, 2014. So the past couple of weeks have been a little more hectic than usual, but these are the things that I got to work on: 1) Continuing work on fixing leak: On the Mozilla side, I had a long discussion with snorp and

Re: [tor-dev] On picking Introduction Points in Next Generation Hidden Services

2014-08-17 Thread George Kadianakis
Matthew Finkel matthew.fin...@gmail.com writes: On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote: One missing piece of rend-spec-ng.txt [0] is a section on how HSes should pick their Introduction Points (IPs). There are three main questions here: - How many IPs should an HS

[tor-dev] PKCS#1 ASN.1 Public Key Encoding

2014-08-17 Thread Gareth Owen
Hi all I wonder if someone might be able to help me with the above. I understand, that to generate the digest, the PK must be encoded in PKCS#1 format. And further to this, the public keys in the router descriptors are NOT in PKCS#1 format, but plain ASN.1. I'm trying to generate the

Re: [tor-dev] Decentralized VOIP over Tor

2014-08-17 Thread Lunar
ter...@safe-mail.net: I said decentralized VOIP because no central servers would be managing the communications. Any Tor node could possibly be a VOIP server. Tor is a transport network. Relays only transport data, they do not offer services other than what's needed for Tor clients to work. --

Re: [tor-dev] PKCS#1 ASN.1 Public Key Encoding

2014-08-17 Thread Yawning Angel
On Sun, 17 Aug 2014 16:19:56 +0100 Gareth Owen gareth.o...@port.ac.uk wrote: I'm trying to generate the fingerprint given just the pubilc key in Java and after almost a whole day I'm about to give up. Does anyone have a sample PKCS#1 encoded public key that is used immediately before SHA-1

Re: [tor-dev] PKCS#1 ASN.1 Public Key Encoding

2014-08-17 Thread Gareth Owen
Yawning Thanks very much - you've saved me another few days down the wrong path! It seems I was taking the onion-key not the signing key. Would never have caught that this far down the rabbit hole without your response! Now to work out why Tor is detecting a different identity to the SSL cert

[tor-dev] [GSoC] Consensus diffs - Sixth report

2014-08-17 Thread Daniel Martí
Hello everyone, This is the sixth and last status report of my Google Summer of Code project, which is to implement consensus diffs for Tor. Two weeks ago I had two main tasks left for the project to get to a minimal functioning state. The first was to figure out a clean way to cache old

Re: [tor-dev] Proposal 220 (revised): Migrate server identity keys to Ed25519

2014-08-17 Thread Sebastian Hahn
Hi Nick, On 25 Feb 2014, at 17:18, Nick Mathewson ni...@torproject.org wrote: To mirror the way that authority identity keys work, we'll fully support keeping Ed25519 identity keys offline; they'll be used to sign long-ish term signing keys, which in turn will do all of the heavy