[tor-dev] RFC: Lightweight Obfuscated Datagram Protocol (LODP)

2013-08-27 Thread Yawning Angel
, feedback appreciated. -- Yawning Angel Lightweight Obfuscated Datagram Protocol (LODP) Yawning Angel yawning at schwanenlied dot me (XXX: Preliminary Draft. If anyone implements this, I will laugh at them, because there are probably problems, and parts (all?) of it may suck. In particular

Re: [tor-dev] Pluggable Transports and rate limiting

2013-09-10 Thread Yawning Angel
on windows. For the U*IX targets, trickle does most of what we would want. -- Yawning Angel ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Announcing liballium (A C Tor Pluggable Transports Utility Library)

2013-09-30 Thread Yawning Angel
on it). The code is available at: https://github.com/Yawning/liballium It still needs more documentation, but all of the use cases are covered by a reasonably well commented example (examples/ptcfg_example.c). Questions, comments, feedback all appreciated. -- Yawning Angel

Re: [tor-dev] torsocks-v2.0.0-rc3 NetBSD improvements

2013-11-05 Thread Yawning Angel
() form should be used when one or more of the arguments is a 64-bit argument to ensure that argument alignment is correct. Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

[tor-dev] Call for testing/review: obfsclient

2014-02-03 Thread Yawning Angel
pain to the build process. Thanks in advance, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Call for testing/review: obfsclient

2014-02-13 Thread Yawning Angel
581bb2ac42be529b7bb5f8617a3c362ac38e47f9 commit 218c86b501f897a6c6b6e0bd14bde9ada5488b5d commit 594caa7f36ae9f5a465324eda983b70c6289fcfb - master Please let me know if it's still broken/if I've missed anything. -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing

Re: [tor-dev] Call for testing/review: obfsclient

2014-02-14 Thread Yawning Angel
in advance for the inconvenience, and thanks for the changes and your patience. -- Yawning Angel diff --git a/src/schwanenlied/pt/obfs2/client.cc b/src/schwanenlied/pt/obfs2/client.cc index 57daff4..0b567cc 100644 --- a/src/schwanenlied/pt/obfs2/client.cc +++ b/src/schwanenlied/pt/obfs2/client.cc

Re: [tor-dev] Call for testing/review: obfsclient

2014-02-14 Thread Yawning Angel
On Fri, 14 Feb 2014 16:43:00 +0100 Fabian Keil freebsd-lis...@fabiankeil.de wrote: Yawning Angel yawn...@schwanenlied.me wrote: It's already fixed in 1e25c55ba54 without the patch. Yay. On a side note, tip of tree requires updating liballium since I switched both of liballium

Re: [tor-dev] Call for testing/review: obfsclient

2014-02-18 Thread Yawning Angel
On Mon, 17 Feb 2014 19:34:36 + Yawning Angel yawn...@schwanenlied.me wrote: I will address the GCC build issues when I'm done working on that. The system gcc on 9.1p10 is ancient (4.2.1), and does not support C++11, so I would have to install gcc from ports. I haven't installed gcc on my

Re: [tor-dev] Call for testing/review: obfsclient

2014-02-19 Thread Yawning Angel
, and pushed a fix (7f123275d95ed8a95f15c0a75bd4e9ca241bee93). On my 9.2-RELEASE vm, the tests and obfsclient binary run now, and I made sure it still builds on the 10.0-RELEASE vm. Regards, -- Yawning Angel signature.asc Description: PGP signature

Re: [tor-dev] [draft]: Proposal xxx: Pluggable transport SOCKS5 extensions

2014-02-25 Thread Yawning Angel
if the Session Ticket handshake fails, and reopen the outgoing connection and try UniformDH, but I believe that would require more code than send back a different response code and let tor decide what to do. Thanks, -- Yawning Angel signature.asc Description: PGP signature

[tor-dev] Call for testing/review: obfsclient-0.0.1rc1

2014-02-27 Thread Yawning Angel
of relief from Fabian, I tested on FreeBSD as well this time. The systems used for testing are in the release notes. Where: https://github.com/Yawning/obfsclient/releases/tag/v0.0.1-rc1 Thanks in advance, -- Yawning Angel signature.asc Description: PGP signature

Re: [tor-dev] Proposal xxx: Further SOCKS5 extensions (Was Pluggable transport SOCKS5 extensions)

2014-02-28 Thread Yawning Angel
to contain key/value pairs for extra flexibility in the future. Questions, comments, feedback appreciated as always, -- Yawning Angel --- Begin proposal body --- Filename: xxx-further-socks5-extensions.txt Title: Further SOCKS5 extensions Author: Yawning Angel Created: 25-Feb-2014 Status: Draft

Re: [tor-dev] Call for testing/review: obfsclient-0.0.1rc2

2014-03-01 Thread Yawning Angel
, comments, feedback appreciated! -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-05 Thread Yawning Angel
1929 auth entirely by passing --password Base32 encoded k_B as a command line option. Regards, -- Yawning Angel [0]: https://github.com/Yawning/obfsproxy/tree/socks5-listener signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] GSoC - Profile UDP transport protocols

2014-03-06 Thread Yawning Angel
). Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-06 Thread Yawning Angel
On Thu, 06 Mar 2014 19:22:16 +0200 irregulator irregula...@riseup.net wrote: On 03/05/2014 07:58 PM, Yawning Angel wrote: Hey people thanks for your input, I'm actually passing password inline while starting obfsproxy (client-side) like that : python pyobfsproxy.py --log-min-severity=info

Re: [tor-dev] Proposal xxx: Further SOCKS5 extensions (Was Pluggable transport SOCKS5 extensions)

2014-03-07 Thread Yawning Angel
in RFC1928, the server/client MUST drop the connection should be sufficient? (I'm not sure either) Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

Re: [tor-dev] Proposal xxx: Further SOCKS5 extensions (Was Pluggable transport SOCKS5 extensions)

2014-03-07 Thread Yawning Angel
connection couldn't it? One final open question, are there any other status codes that people think should be defined beyond the HS ones and the PT ones? Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] Proposal xxx: Further SOCKS5 extensions (Was Pluggable transport SOCKS5 extensions)

2014-03-08 Thread Yawning Angel
appID as a key for this (Eg: appid/tbbSessionID, timbSessionID, etc). With prefixing the keys, the arg processing code for everything needs to be appid aware (optional thing should be optional, and easy to ignore). Regards, -- Yawning Angel signature.asc Description: PGP signature

Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-09 Thread Yawning Angel
. -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Combining obfsproxy+scramblesuit with OpenVPN

2014-03-09 Thread Yawning Angel
On Mon, 10 Mar 2014 01:57:11 + Yawning Angel yawn...@schwanenlied.me wrote: The moment the OpenVPN people fix their broken SOCKS client to not offer to negotiate an authentication method that they can't actually use due to missing parameters, this will work as expected. https://github.com

Re: [tor-dev] GoSC - Website Fingerprinting project

2014-03-12 Thread Yawning Angel
the packet size/inter packet timing. Assuming a basic familiarity with python (bonus points for Twisted), this would be about an afternoon worth of code (if that), and from there real development on different padding strategies could be researched. Regards, -- Yawning Angel signature.asc

[tor-dev] Call for testing/review: obfsclient-0.0.1

2014-03-15 Thread Yawning Angel
release will close the difference further. Hopefully it is of some use to people. Special thanks to Fabian Keil for help testing and fixing the various release candidates. Questions, comments, feedback appreciated as always, -- Yawning Angel signature.asc Description: PGP signature

Re: [tor-dev] Call for testing/review: obfsclient-0.0.1

2014-03-17 Thread Yawning Angel
9.1). Thanks! -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Call for testing/review: obfsclient-0.0.2

2014-03-28 Thread Yawning Angel
so the pace should be less hectic. Questions, comments, feedback appreciated as always, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman

[tor-dev] ideas/xxx-pluggable-transports-through-proxy.txt

2014-04-11 Thread Yawning Angel
started working on this, but if that's the case I will update it as needed. * pyptlib, done not merged. Waiting on #8402. * obfsproxy, SOCKS4/5 done, not merged. HTTP CONNECT is a work in progress, needs the pyptlib changes. Regards, -- Yawning Angel From

Re: [tor-dev] obfsproxy getting scramblesuit password from file in unmanaged mode

2014-05-20 Thread Yawning Angel
,scramblesuit` in the managed use case as well which I think is cute, if not massively useful. As an added bonus it is a general solution that's more futureproof. Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor

[tor-dev] RFC: obfs4 (Name not final)

2014-05-21 Thread Yawning Angel
. * Development was done with go1.2.x, older versions of the runtime are not supported. * It would be a terrible idea to use obfs4proxy as anything other than a client at this point. Questions, comments, feedback all appreciated. -- Yawning Angel PS: I also wrote https://github.com/yawning

Re: [tor-dev] RFC: obfs4 (Name not final)

2014-05-21 Thread Yawning Angel
as the scary build process can handle flashproxy and meek. I've been a bit more focused on getting the protocol design and implementation to a point where I feel generally good about it. -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev

Re: [tor-dev] wfpadtools: comments about primitives

2014-05-30 Thread Yawning Angel
that SIOCOUTQ isn't portable, because checking the send socket buffer's size is one of the better ways to do this. Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

Re: [tor-dev] wfpadtools: comments about primitives

2014-05-30 Thread Yawning Angel
and get the added defenses without (many? any?) code changes. Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] obfs4 and ntor (question wrt node_id)

2014-06-02 Thread Yawning Angel
(The fact that it coincidentally happens to be the bridge fingerprint has no effect on the obfs4 protocol itself). Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
for obfs3 (and ScrambleSuit/obfs4 both have some defenses against those, although not all are enabled as a performance tradeoff). Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
only supported obfs2, but that's been fixed for a while now. Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-25 Thread Yawning Angel
(Fixing such things is also on my TODO list). Regards, -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] (meek|flashproxy)+(obfs3|fte|scramblesuit|...)

2014-07-26 Thread Yawning Angel
. However, it allows us to modify bridge addresses without releasing a new TBB. I don't see that as being a sufficiently compelling reason to give a third party the ability to enumerate (a unknown fraction of) the PT user base (while making them rich at the same time). Regards, -- Yawning Angel

Re: [tor-dev] PKCS#1 ASN.1 Public Key Encoding

2014-08-17 Thread Yawning Angel
for compatibility.) How to do this in Java depends on which crypto API you are using, look at oracle.security.crypto.asn1 or org.bouncycastle.asn1. Additionally this (http://lapo.it/asn1js/) will probably be useful. Regards, -- Yawning Angel signature.asc Description: PGP signature

[tor-dev] obfs4 test bundles

2014-08-20 Thread Yawning Angel
). If you wish to follow obfs4 deployment the bug associated with this task is #12130. Questions, comments, feedback welcome. -- Yawning Angel signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https

Re: [tor-dev] obfs4 test bundles

2014-08-28 Thread Yawning Angel
. * The obfs4proxy and Go licenses are now included in the bundle. I have verified that the linux64 and windows (thanks to a friend) bundles appear to be functional. If you wish to follow obfs4 deployment the bug associated with this task is #12130. Questions, comments, feedback welcome. -- Yawning

Re: [tor-dev] obfs4 test bundles

2014-09-26 Thread Yawning Angel
my branch. I have verified that the linux64 and windows (thanks to a friend) bundles appear to be functional. If you wish to follow obfs4 deployment the bug associated with this task is #12130. Questions, comments, feedback welcome. -- Yawning Angel signature.asc Description: PGP signature

Re: [tor-dev] Vidalia Relay Bundle(win) Tor version, obfs4proxy package in deb.tp.o

2014-10-26 Thread Yawning Angel
specifically at detecting obfs2). I personally think that it should be deprecated sooner rather than later, but others have disagreed with me on this. Hope that helps, -- Yawning Angel pgpRkxhRUfSjM.pgp Description: OpenPGP digital signature ___ tor-dev

Re: [tor-dev] Understanding Tor and SOCKS

2014-10-26 Thread Yawning Angel
, -- Yawning Angel pgpGA5tzki8YH.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Hidden Service authorization UI

2014-11-09 Thread Yawning Angel
plans for obfsng (aka obfs6 depending on how long it gets stuck in design and deployment) involves 1 KiB keys... Regards, -- Yawning Angel pgp1Omyydtsp8.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 19th of November 2014)

2014-11-18 Thread Yawning Angel
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! -- Yawning Angel pgp17oIBtS3qf.pgp Description: OpenPGP digital signature

Re: [tor-dev] obfs4 questions

2014-11-28 Thread Yawning Angel
, so I went with something lighter (Thus SipHash). I may go back to the two box design if I do an obfs5, not sure about that yet. Regards, -- Yawning Angel pgpgvpPIf0y5d.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] obfs4 questions

2014-11-28 Thread Yawning Angel
countermeasures in section 6 of the paper (So an identical failure to a modified plaintext/tag is observed). Regards, -- Yawning Angel [0]: http://cr.yp.to/mac/poly1305-20050329.pdf pgpD4SkRCdRkT.pgp Description: OpenPGP digital signature ___ tor-dev mailing

Re: [tor-dev] obfs4 questions

2014-11-28 Thread Yawning Angel
On Fri, 28 Nov 2014 17:57:26 + Michael Rogers mich...@briarproject.org wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 28/11/14 15:50, Yawning Angel wrote: A one time poly1305 key is calculated for each box, based on 32 bytes of zeroes encrypted with a one time Salsa20 key

Re: [tor-dev] Git hosting changes, git:// support discontinued

2014-11-30 Thread Yawning Angel
intermediary commits between tagged releases? Yes, signing each commit is possible, and probably even a good idea, but it's not currently done. Regards, -- Yawning Angel pgpBtpnfUsqCQ.pgp Description: OpenPGP digital signature ___ tor-dev mailing list

Re: [tor-dev] Git hosting changes, git:// support discontinued

2014-11-30 Thread Yawning Angel
On Sun, 30 Nov 2014 19:19:58 -0500 Jason Cooper t...@lakedaemon.net wrote: On Sun, Nov 30, 2014 at 11:55:31PM +, Yawning Angel wrote: On Sun, 30 Nov 2014 17:32:05 -0500 Jason Cooper t...@lakedaemon.net wrote: It is unauthenticated and you probably shouldn't use it if at all

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 3rd of December 2014)

2014-12-02 Thread Yawning Angel
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! -- Yawning Angel pgpgttQ9aqVoM.pgp Description: OpenPGP digital signature

[tor-dev] basket: More eggs in the Guard basket.

2014-12-16 Thread Yawning Angel
that is intended to be used in production) in terms of completeness. Thanks to Marc Juarez (KU Leuven) and Mike Perry for inspiration to write the CS-BuFLO component of basket. Questions, comments, feedback appreciated as always, -- Yawning Angel ps: Seriously, unless you are a developer

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 17th of December 2014)

2014-12-16 Thread Yawning Angel
Hello! Just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! -- Yawning Angel pgpmwTq6Jwj11.pgp Description: OpenPGP digital signature

Re: [tor-dev] basket: More eggs in the Guard basket.

2014-12-17 Thread Yawning Angel
heavyweight the other crypto bits are). Regards, -- Yawning Angel pgpI20qKE8Gnl.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread Yawning Angel
Most of the fixes require major revisions to the wire protocol. As it appears that there is no versioning, how that will be done is left as an exercise for the student. Alternatively, rebase the system on I2P. Regards, -- Yawning Angel pgpGSqhEPfHVU.pgp Description: OpenPGP digital

Re: [tor-dev] Tor BSD underperformance (was [Tor-BSD] Recognizing Randomness Exhaustion)

2014-12-31 Thread Yawning Angel
information). The patch is still trivial for anyone that's familiar with the TCP/IP code. I don't think we should be in the business of maintaining kernel patches either, so I'm not sure what the right thing to do would be for non-Darwin *BSD. Regards, -- Yawning Angel pgpus7JlLTwWJ.pgp

Re: [tor-dev] gettimeofday() Syscall Issues

2015-01-02 Thread Yawning Angel
), 7000 calls to gettimeofday() is 17.09 ms worth of calls. The clock code in tor does need love, so I wouldn't object to cleanup, but I'm not sure it's in the state where it's causing the massive performance degradation that you are seeing. Regards, -- Yawning Angel pgpN7QOVVGLMt.pgp Description

Re: [tor-dev] gettimeofday() Syscall Issues

2015-01-02 Thread Yawning Angel
be a good opportunity to switch more things over to monotonic time. Regards, -- Yawning Angel pgpyHZsfFsxzw.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman

Re: [tor-dev] [PATCH] Fix comparison is always true due to limited range of data type

2015-02-06 Thread Yawning Angel
for reporting this. The bug was fixed in master, and should be in the next 0.2.6.x-alpha release. The fix suggested was fine but was tweaked somewhat when applied See: https://trac.torproject.org/projects/tor/ticket/14764 Regards, -- Yawning Angel pgpy4jp7142Fy.pgp Description: OpenPGP digital

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Yawning Angel
belive stem has seen performance improvements since I tried using it for this. https://github.com/torps/torps Regards, -- Yawning Angel pgpr2VyLy2bvp.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org

Re: [tor-dev] [PATCH] torify/torsocks and TCP Fast Open

2015-01-21 Thread Yawning Angel
a loopback interface, so cutting out 1xRTT isn't worth the added code (There's a case to be made for using TFO for inter-relay traffic, but that's entirely orthogonal to this.). Regards, -- Yawning Angel pgpVhB7cqfu70.pgp Description: OpenPGP digital signature

Re: [tor-dev] Obfsproxy Address Translation

2015-01-16 Thread Yawning Angel
so. Regards, -- Yawning Angel pgp040JdSEWuS.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
poorly written (and not cleaning up all the ephemeral HSes), and (optionally, though lacking this would be a reduction in features) limiting cross application HS enumeration, I'd be more inclined to change things. Regards, -- Yawning Angel pgpw3rUD3yJJF.pgp Description: OpenPGP digital signature

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
to discuss at the dev-meeting if consensus hasn't been reached by then. Regards, -- Yawning Angel pgpfWLpkffCJ7.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread Yawning Angel
a lose consensus is reached here that this is ok, so I'm going to leave the design as is and write the control-spec.txt patch. -- Yawning Angel [0]: The first HS I ever set up was when I finished my first pass implementation, and got the code to a working state. pgpBl_7Y6_Y46.pgp Description

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
are essentially free, so does this matter? I have this mindset too. -- Yawning Angel pgpUVCOT7N8h3.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] high latency hidden services

2015-01-09 Thread Yawning Angel
to be systematically evaluating defenses as part of his research work, so perhaps he can provide more insight into algorithm selection. Regards, -- Yawning Angel pgpdDB_Sg9Y0F.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

[tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-13 Thread Yawning Angel
generation entirely the application's problem, but nickm convinced me otherwise). Questions, comments, feedback appreciated, -- Yawning Angel pgpeQtjfKpLIu.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-14 Thread Yawning Angel
. This clearly indicates the argument type and should be future proof (and also has the side benefit of being easier for me to validate. Thoughts? -- Yawning Angel pgp7Nxg_N4dT5.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

[tor-dev] Pluggable transports meeting tomorrow (16:00 UTC Wednesday 18th of March 2015)

2015-03-17 Thread Yawning Angel
/projects/tor/wiki/doc/PluggableTransports#PluggableTransportIRCmeetings -- Yawning Angel ps: UTC does not do daylight savings. Those of you that have had clocks change, please double check the time and let me know if we need to change the time. pgpDv6z9btUDC.pgp Description: OpenPGP digital

[tor-dev] Wide block cipher experiment.

2015-03-19 Thread Yawning Angel
to be that big of a win, at least on my hardware, and the sort of performance I'm seeing feels too much of a performance hit to me. Regards, -- Yawning Angel pgpDNb5K2d0Nd.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-03-11 Thread Yawning Angel
On Wed, 11 Mar 2015 02:35:10 + Yawning Angel yawn...@schwanenlied.me wrote: The code: https://github.com/Yawning/tor/compare/feature6411 The spec: https://github.com/Yawning/torspec/compare/feature6411 Minor updates to both over the course of yesterday, thanks to all that gave useful

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-25 Thread Yawning Angel
is truely oneshot and the user does not wish to preserve it). * Documentation. Regards, -- Yawning Angel pgpAaj3f82G9d.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-03-23 Thread Yawning Angel
on tor's master. * Maybe should use stem/txtorcon instead of bulb[0]. But as a proof of concept and a demonstration of the feature, I think it gets the point across. Thanks to special for inspiring me to write this. Regards, -- Yawning Angel [0]: Which is another quick and dirty hack I wrote, so

Re: [tor-dev] tor's make test fails when run on tails

2015-04-27 Thread Yawning Angel
added support for that feature to torsocks specifically for them). Other tests may or may not fail if you chose to go down this path. Regards, -- Yawning Angel pgpf9q_ceZn_j.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

[tor-dev] Release: obfs4proxy-0.0.5

2015-04-15 Thread Yawning Angel
goptlib-0.4 or newer to work around tor bug #15240. Without this workaround, certain bridges will fail to operate correctly when the ExtORPort is enabled (the Tor side fix is in tor-0.2.6.5-rc and newer). Questions, comments, feedback appreciated, -- Yawning Angel

Re: [tor-dev] Fwd: Orbot v15 RC3... now with x86/ATOM-power!

2015-04-13 Thread Yawning Angel
, but if not, we may have to add Obfsclient back into Orbot for supporting x86 devices. Hmm, maybe I should add obfs4 support to obfsclient. I have code for all of the crypto I would need to add. Regards, -- Yawning Angel pgpROO5FvVuvJ.pgp Description: OpenPGP digital signature

Re: [tor-dev] Are DAC_OVERRIDE CHOWN capabilities required for ControlSocket?

2015-04-12 Thread Yawning Angel
is required). Patches accepted. -- Yawning Angel pgpCrZZmkj5AW.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Dumb or-ctl-filter tricks (Was: [tor-talk] SOCKS proxy to sit between user and Tor?)

2015-06-03 Thread Yawning Angel
/master -- Yawning Angel [0]: Honestly, I'll merge trivial things, but I won't bust out my windows box to test/debug this, and I don't have an OSX box. pgp4kvHS2QXRf.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] How bad is not having 'enable-ec_nistp_64_gcc_128' really? (OpenBSD)

2015-06-22 Thread Yawning Angel
curves (Ed25519, Ed448) which hopefully will see uptake in the longer run, but ECDHE with the NIST curves is the current least bad choice. Regards, -- Yawning Angel pgptam3OkluOA.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor

Re: [tor-dev] Tor Browser IsolateSOCKSAuth behavior questions.

2015-06-01 Thread Yawning Angel
in a single Tor Browser instance while being relatively safe[1]. Regards, -- Yawning Angel [0]: The code assumes it's talking to a system tor instance (it doesn't launch Tor for you), my control port filter is present so circuit display is broken intentionally, etc. [1]: User safety is the #1 goal

[tor-dev] Tor Browser IsolateSOCKSAuth behavior questions.

2015-05-31 Thread Yawning Angel
form of my shim will support running with any combination of nothing (Tor Browser just for the privacy benefits, probably unsafe, I may reconsider this), I2P, and Tor (Though the most useful configuration is probably I2P + Tor). Thanks in advance, -- Yawning Angel pgp4CFhRjXQuC.pgp Description

Re: [tor-dev] [RELEASE] Torsocks 2.1.0

2015-05-28 Thread Yawning Angel
was chosen such that it would be blatantly obvious in circuit listings as to which torsocks instance things belong to. There is space in the username field, so appending a hexdecimal large random number or something is certainly possible and quite trivial. Regards, -- Yawning Angel pgpAXdf3KDOMa.pgp

Re: [tor-dev] Quick logjam/Tor analysis.

2015-06-02 Thread Yawning Angel
the vendor's OpenSSL. The only resolution is Too bad, so sad, install a modern OpenSSL. See #16034 and #16040 for details. -- Yawning Angel pgp01DoAVjA4U.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org

Re: [tor-dev] Performance testing using chutney (was Re: Env variables for chutney)

2015-07-05 Thread Yawning Angel
/13737 https://trac.torproject.org/projects/tor/ticket/13738 (If you happen to be more interested in making non-HS use cases faster, then look elsewhere. :P) Regards, -- Yawning Angel [0]: I do have a branch that makes circuit build crypto substantially faster that I've been poking at so

Re: [tor-dev] [PATCH] Defences against the recent hidden service DoS attacks

2015-05-21 Thread Yawning Angel
a higher or lower limit. A warning is logged periodically (rate limited to avoid log spam/clutter) if circuits exceed the limit, so adjusting the parameter should be relatively straight forward. Regards, -- Yawning Angel pgpEKoiBJTmPv.pgp Description: OpenPGP digital signature

Re: [tor-dev] Seeing through Network-Protocol Obfuscation

2015-08-19 Thread Yawning Angel
. It's worth noting that Dust2 (mostly done but not yet deployed) can reduce payload entropy to match a target distribution, but will have issues with protocol whitelist based DPI. Regards, -- Yawning Angel pgpFY2al5Ysy5.pgp Description: OpenPGP digital signature

Re: [tor-dev] Seeing through Network-Protocol Obfuscation

2015-08-22 Thread Yawning Angel
On Fri, 21 Aug 2015 17:51:20 -0700 Kevin P Dyer kpd...@gmail.com wrote: On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel yawn...@schwanenlied.me wrote: [snip] The FTE semantic attack they presented isn't the easiest one I know of (the GET request as defined by the regex

Re: [tor-dev] Seeing through Network-Protocol Obfuscation

2015-08-22 Thread Yawning Angel
are attacks against either the Tor network, or limitations of the tor implementation itself[1]. Regards, -- Yawning Angel [0]: Distribution still is an important problem that needs to be solved, and maybe linking it closer to the protocol design is something that is required. Open research

Re: [tor-dev] Number of directory connections

2015-08-21 Thread Yawning Angel
in the intervening time period. Regards, -- Yawning Angel pgpkGFnUn8J6o.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Seeing through Network-Protocol Obfuscation

2015-08-22 Thread Yawning Angel
of our paper. Would be interesting to learn what the data tells us. I would be interested in seeing the results. -- Yawning Angel [0]: Ngnix supports hooking the error handler rather easily, apache less so. pgpufIOwlRYHG.pgp Description: OpenPGP digital signature

Re: [tor-dev] Hash Visualizations to Protect Against Onion Phishing

2015-08-20 Thread Yawning Angel
mappings. 2. No canonical visualization that can be shared across users. 3. Something Yawning randomly made up before going to bed. Regards and good night, -- Yawning Angel pgpm_xywJhZs5.pgp Description: OpenPGP digital signature ___ tor-dev mailing

Re: [tor-dev] Hash Visualizations to Protect Against Onion Phishing

2015-08-20 Thread Yawning Angel
deploy a few user select-able representation modules. Without doing so, trying to hash out any sorts of design(s) will likely end badly, and going with write the framework that lets us do UX testing will let us get a better handle on the problem[0]. Regards, -- Yawning Angel [0]: And who knows

Re: [tor-dev] Hash Visualizations to Protect Against Onion Phishing

2015-08-20 Thread Yawning Angel
On Thu, 20 Aug 2015 11:00:51 -0400 Ian Goldberg i...@cs.uwaterloo.ca wrote: On Thu, Aug 20, 2015 at 02:41:51PM +, Yawning Angel wrote: What would be useful here is the number of onion addresses an average user visits. If it's small, something like this would probably be sufficient

Re: [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?

2015-08-04 Thread Yawning Angel
things in depth). I'm planning on revisiting this issue at some point, but last I looked into it, using an assembly optimized Curve25519 implementation was potentially a 7-10% gain (but is neither from libsodium nor djb NaCl). https://trac.torproject.org/projects/tor/ticket/8897 -- Yawning Angel

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-08-05 Thread Yawning Angel
signed tarballs up somewhere sensible. Since there are no dependencies required beyond a new-ish Go compiler, this should be utterly trivial to package. I'll try to do this sooner rather than later, but no promises since IRL stuff is on fire for the remainder of the week. Regards, -- Yawning

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-23 Thread Yawning Angel
with dealing with supporting users when this fails, I won't do the flashproxy work, but someone else is more than welcome to do it. Regards, -- Yawning Angel pgplTso9cEf2L.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-23 Thread Yawning Angel
every single router ever made. And more importantly, compromised routers due to shitty/out of date uPnP implementations are Not My Problem. Regards, -- Yawning Angel pgpphKdsowO7U.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-23 Thread Yawning Angel
widely supported/deployed uPnP, on consumer routers at least, should be disabled and treated with extreme suspicion till proven otherwise. Regards, -- Yawning Angel pgpyEKzNPX65d.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-21 Thread Yawning Angel
). Regards, -- Yawning Angel pgptxSAf8ktjE.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

  1   2   3   >