, feedback appreciated.
--
Yawning Angel
Lightweight Obfuscated Datagram Protocol (LODP)
Yawning Angel yawning at schwanenlied dot me
(XXX: Preliminary Draft. If anyone implements this, I will laugh at them,
because there are probably problems, and parts (all?) of it may suck. In
particular
on windows. For
the U*IX targets, trickle does most of what we would want.
--
Yawning Angel
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
on it).
The code is available at: https://github.com/Yawning/liballium
It still needs more documentation, but all of the use cases are covered
by a reasonably well commented example (examples/ptcfg_example.c).
Questions, comments, feedback all appreciated.
--
Yawning Angel
() form should be used when one or more of
the arguments is a 64-bit argument to ensure that argument
alignment is correct.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
pain to the build process.
Thanks in advance,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
581bb2ac42be529b7bb5f8617a3c362ac38e47f9
commit 218c86b501f897a6c6b6e0bd14bde9ada5488b5d
commit 594caa7f36ae9f5a465324eda983b70c6289fcfb - master
Please let me know if it's still broken/if I've missed anything.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing
in advance for the inconvenience, and thanks for the changes
and your patience.
--
Yawning Angel
diff --git a/src/schwanenlied/pt/obfs2/client.cc b/src/schwanenlied/pt/obfs2/client.cc
index 57daff4..0b567cc 100644
--- a/src/schwanenlied/pt/obfs2/client.cc
+++ b/src/schwanenlied/pt/obfs2/client.cc
On Fri, 14 Feb 2014 16:43:00 +0100
Fabian Keil freebsd-lis...@fabiankeil.de wrote:
Yawning Angel yawn...@schwanenlied.me wrote:
It's already fixed in 1e25c55ba54 without the patch.
Yay.
On a side note, tip of tree requires updating liballium since I
switched both of liballium
On Mon, 17 Feb 2014 19:34:36 +
Yawning Angel yawn...@schwanenlied.me wrote:
I will address the GCC build issues when I'm done working on that.
The system gcc on 9.1p10 is ancient (4.2.1), and does not support
C++11, so I would have to install gcc from ports.
I haven't installed gcc on my
, and pushed a fix (7f123275d95ed8a95f15c0a75bd4e9ca241bee93).
On my 9.2-RELEASE vm, the tests and obfsclient binary run now, and I
made sure it still builds on the 10.0-RELEASE vm.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
if the Session Ticket handshake fails,
and reopen the outgoing connection and try UniformDH, but I believe that
would require more code than send back a different response code and
let tor decide what to do.
Thanks,
--
Yawning Angel
signature.asc
Description: PGP signature
of relief from Fabian, I tested on
FreeBSD as well this time. The systems used for testing are in the
release notes.
Where: https://github.com/Yawning/obfsclient/releases/tag/v0.0.1-rc1
Thanks in advance,
--
Yawning Angel
signature.asc
Description: PGP signature
to contain
key/value pairs for extra flexibility in the future.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
--- Begin proposal body ---
Filename: xxx-further-socks5-extensions.txt
Title: Further SOCKS5 extensions
Author: Yawning Angel
Created: 25-Feb-2014
Status: Draft
, comments, feedback appreciated!
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
1929 auth entirely by passing
--password Base32 encoded k_B as a command line option.
Regards,
--
Yawning Angel
[0]: https://github.com/Yawning/obfsproxy/tree/socks5-listener
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev
).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Thu, 06 Mar 2014 19:22:16 +0200
irregulator irregula...@riseup.net wrote:
On 03/05/2014 07:58 PM, Yawning Angel wrote:
Hey people thanks for your input,
I'm actually passing password inline while starting obfsproxy
(client-side) like that :
python pyobfsproxy.py --log-min-severity=info
in RFC1928, the server/client MUST drop the connection should be
sufficient? (I'm not sure either)
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
connection
couldn't it?
One final open question, are there any other status codes that people
think should be defined beyond the HS ones and the PT ones?
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev
appID
as a key for this (Eg: appid/tbbSessionID, timbSessionID,
etc). With prefixing the keys, the arg processing code for everything
needs to be appid aware (optional thing should be optional, and easy
to ignore).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Mon, 10 Mar 2014 01:57:11 +
Yawning Angel yawn...@schwanenlied.me wrote:
The moment the OpenVPN people fix their broken SOCKS client to not
offer to negotiate an authentication method that they can't actually
use due to missing parameters, this will work as expected.
https://github.com
the packet size/inter packet timing.
Assuming a basic familiarity with python (bonus points for Twisted),
this would be about an afternoon worth of code (if that), and from
there real development on different padding strategies could be
researched.
Regards,
--
Yawning Angel
signature.asc
release will close the difference further.
Hopefully it is of some use to people.
Special thanks to Fabian Keil for help testing and fixing the various
release candidates.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
signature.asc
Description: PGP signature
9.1).
Thanks!
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
so the pace should be less hectic.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
started working on this, but if that's
the case I will update it as needed.
* pyptlib, done not merged. Waiting on #8402.
* obfsproxy, SOCKS4/5 done, not merged. HTTP CONNECT is a work in
progress, needs the pyptlib changes.
Regards,
--
Yawning Angel
From
,scramblesuit` in the managed use
case as well which I think is cute, if not massively useful.
As an added bonus it is a general solution that's more futureproof.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor
.
* Development was done with go1.2.x, older versions of the runtime are
not supported.
* It would be a terrible idea to use obfs4proxy as anything other than
a client at this point.
Questions, comments, feedback all appreciated.
--
Yawning Angel
PS: I also wrote https://github.com/yawning
as the scary build process can handle
flashproxy and meek. I've been a bit more focused on getting the
protocol design and implementation to a point where I feel generally
good about it.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev
that SIOCOUTQ isn't portable, because checking the send
socket buffer's size is one of the better ways to do this.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
and get the added defenses without (many? any?) code changes.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
(The fact that it
coincidentally happens to be the bridge fingerprint has no effect on
the obfs4 protocol itself).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
for obfs3 (and ScrambleSuit/obfs4 both have
some defenses against those, although not all are enabled as a
performance tradeoff).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
only
supported obfs2, but that's been fixed for a while now.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
(Fixing such things is also on my TODO list).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
.
However, it allows us to modify bridge addresses without releasing a
new TBB.
I don't see that as being a sufficiently compelling reason to give a
third party the ability to enumerate (a unknown fraction of) the PT user
base (while making them rich at the same time).
Regards,
--
Yawning Angel
for
compatibility.)
How to do this in Java depends on which crypto API you are using, look
at oracle.security.crypto.asn1 or org.bouncycastle.asn1. Additionally
this (http://lapo.it/asn1js/) will probably be useful.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
).
If you wish to follow obfs4 deployment the bug associated with this
task is #12130.
Questions, comments, feedback welcome.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
.
* The obfs4proxy and Go licenses are now included in the bundle.
I have verified that the linux64 and windows (thanks to a friend)
bundles appear to be functional. If you wish to follow obfs4
deployment the bug associated with this task is #12130.
Questions, comments, feedback welcome.
--
Yawning
my branch.
I have verified that the linux64 and windows (thanks to a friend)
bundles appear to be functional. If you wish to follow obfs4
deployment the bug associated with this task is #12130.
Questions, comments, feedback welcome.
--
Yawning Angel
signature.asc
Description: PGP signature
specifically at detecting obfs2). I personally think that it should be
deprecated sooner rather than later, but others have disagreed with me
on this.
Hope that helps,
--
Yawning Angel
pgpRkxhRUfSjM.pgp
Description: OpenPGP digital signature
___
tor-dev
,
--
Yawning Angel
pgpGA5tzki8YH.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
plans for obfsng (aka obfs6 depending on how
long it gets stuck in design and deployment) involves 1 KiB keys...
Regards,
--
Yawning Angel
pgp1Omyydtsp8.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
--
Yawning Angel
pgp17oIBtS3qf.pgp
Description: OpenPGP digital signature
, so I went with something lighter (Thus
SipHash). I may go back to the two box design if I do an obfs5, not
sure about that yet.
Regards,
--
Yawning Angel
pgpgvpPIf0y5d.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
countermeasures in section 6 of the paper (So an identical failure to
a modified plaintext/tag is observed).
Regards,
--
Yawning Angel
[0]: http://cr.yp.to/mac/poly1305-20050329.pdf
pgpD4SkRCdRkT.pgp
Description: OpenPGP digital signature
___
tor-dev mailing
On Fri, 28 Nov 2014 17:57:26 +
Michael Rogers mich...@briarproject.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28/11/14 15:50, Yawning Angel wrote:
A one time poly1305 key is calculated for each box, based on 32
bytes of zeroes encrypted with a one time Salsa20 key
intermediary commits between tagged releases? Yes, signing
each commit is possible, and probably even a good idea, but it's not
currently done.
Regards,
--
Yawning Angel
pgpBtpnfUsqCQ.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
On Sun, 30 Nov 2014 19:19:58 -0500
Jason Cooper t...@lakedaemon.net wrote:
On Sun, Nov 30, 2014 at 11:55:31PM +, Yawning Angel wrote:
On Sun, 30 Nov 2014 17:32:05 -0500
Jason Cooper t...@lakedaemon.net wrote:
It is unauthenticated and you probably shouldn't use it if at
all
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
--
Yawning Angel
pgpgttQ9aqVoM.pgp
Description: OpenPGP digital signature
that is intended to be
used in production) in terms of completeness.
Thanks to Marc Juarez (KU Leuven) and Mike Perry for inspiration to
write the CS-BuFLO component of basket.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
ps: Seriously, unless you are a developer
Hello!
Just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
--
Yawning Angel
pgpmwTq6Jwj11.pgp
Description: OpenPGP digital signature
heavyweight the other crypto bits are).
Regards,
--
Yawning Angel
pgpI20qKE8Gnl.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Most of the fixes require major revisions to the wire protocol. As
it appears that there is no versioning, how that will be done is
left as an exercise for the student.
Alternatively, rebase the system on I2P.
Regards,
--
Yawning Angel
pgpGSqhEPfHVU.pgp
Description: OpenPGP digital
information). The patch is still trivial for anyone that's
familiar with the TCP/IP code.
I don't think we should be in the business of maintaining kernel
patches either, so I'm not sure what the right thing to do would be for
non-Darwin *BSD.
Regards,
--
Yawning Angel
pgpus7JlLTwWJ.pgp
), 7000 calls to gettimeofday() is 17.09 ms worth of
calls.
The clock code in tor does need love, so I wouldn't object to cleanup,
but I'm not sure it's in the state where it's causing the massive
performance degradation that you are seeing.
Regards,
--
Yawning Angel
pgpN7QOVVGLMt.pgp
Description
be a good opportunity to switch more things over to monotonic time.
Regards,
--
Yawning Angel
pgpyHZsfFsxzw.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
for reporting this. The bug was fixed in master, and should be
in the next 0.2.6.x-alpha release. The fix suggested was fine but was
tweaked somewhat when applied
See: https://trac.torproject.org/projects/tor/ticket/14764
Regards,
--
Yawning Angel
pgpy4jp7142Fy.pgp
Description: OpenPGP digital
belive stem has seen performance
improvements since I tried using it for this.
https://github.com/torps/torps
Regards,
--
Yawning Angel
pgpr2VyLy2bvp.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
a loopback interface, so cutting out 1xRTT isn't
worth the added code (There's a case to be made for using TFO for
inter-relay traffic, but that's entirely orthogonal to this.).
Regards,
--
Yawning Angel
pgpVhB7cqfu70.pgp
Description: OpenPGP digital signature
so.
Regards,
--
Yawning Angel
pgp040JdSEWuS.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
poorly written
(and not cleaning up all the ephemeral HSes), and (optionally, though
lacking this would be a reduction in features) limiting cross
application HS enumeration, I'd be more inclined to change things.
Regards,
--
Yawning Angel
pgpw3rUD3yJJF.pgp
Description: OpenPGP digital signature
to discuss at the dev-meeting if consensus hasn't been
reached by then.
Regards,
--
Yawning Angel
pgpfWLpkffCJ7.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
a lose consensus is reached here that this is ok, so I'm going
to leave the design as is and write the control-spec.txt patch.
--
Yawning Angel
[0]: The first HS I ever set up was when I finished my first pass
implementation, and got the code to a working state.
pgpBl_7Y6_Y46.pgp
Description
are essentially free, so does this matter?
I have this mindset too.
--
Yawning Angel
pgpUVCOT7N8h3.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
to be systematically evaluating defenses as
part of his research work, so perhaps he can provide more insight into
algorithm selection.
Regards,
--
Yawning Angel
pgpdDB_Sg9Y0F.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
generation entirely the application's problem,
but nickm convinced me otherwise).
Questions, comments, feedback appreciated,
--
Yawning Angel
pgpeQtjfKpLIu.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
. This clearly indicates the argument type and should be future
proof (and also has the side benefit of being easier for me to
validate.
Thoughts?
--
Yawning Angel
pgp7Nxg_N4dT5.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
/projects/tor/wiki/doc/PluggableTransports#PluggableTransportIRCmeetings
--
Yawning Angel
ps: UTC does not do daylight savings. Those of you that have had
clocks change, please double check the time and let me know if we need
to change the time.
pgpDv6z9btUDC.pgp
Description: OpenPGP digital
to be that big of a win, at least on my hardware, and the sort of
performance I'm seeing feels too much of a performance hit to me.
Regards,
--
Yawning Angel
pgpDNb5K2d0Nd.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
On Wed, 11 Mar 2015 02:35:10 +
Yawning Angel yawn...@schwanenlied.me wrote:
The code: https://github.com/Yawning/tor/compare/feature6411
The spec: https://github.com/Yawning/torspec/compare/feature6411
Minor updates to both over the course of yesterday, thanks to all that
gave useful
is truely oneshot and
the user does not wish to preserve it).
* Documentation.
Regards,
--
Yawning Angel
pgpAaj3f82G9d.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin
on tor's master.
* Maybe should use stem/txtorcon instead of bulb[0].
But as a proof of concept and a demonstration of the feature, I think
it gets the point across. Thanks to special for inspiring me to write
this.
Regards,
--
Yawning Angel
[0]: Which is another quick and dirty hack I wrote, so
added support
for that feature to torsocks specifically for them). Other tests may
or may not fail if you chose to go down this path.
Regards,
--
Yawning Angel
pgpf9q_ceZn_j.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
goptlib-0.4 or newer to work around tor bug #15240. Without this
workaround, certain bridges will fail to operate correctly when the
ExtORPort is enabled (the Tor side fix is in tor-0.2.6.5-rc and
newer).
Questions, comments, feedback appreciated,
--
Yawning Angel
, but if not, we may have to add Obfsclient back into Orbot
for supporting x86 devices.
Hmm, maybe I should add obfs4 support to obfsclient. I have code for
all of the crypto I would need to add.
Regards,
--
Yawning Angel
pgpROO5FvVuvJ.pgp
Description: OpenPGP digital signature
is
required).
Patches accepted.
--
Yawning Angel
pgpCrZZmkj5AW.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
/master
--
Yawning Angel
[0]: Honestly, I'll merge trivial things, but I won't bust out my
windows box to test/debug this, and I don't have an OSX box.
pgp4kvHS2QXRf.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
curves (Ed25519, Ed448) which
hopefully will see uptake in the longer run, but ECDHE with the NIST
curves is the current least bad choice.
Regards,
--
Yawning Angel
pgptam3OkluOA.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor
in a single Tor Browser
instance while being relatively safe[1].
Regards,
--
Yawning Angel
[0]: The code assumes it's talking to a system tor instance (it doesn't
launch Tor for you), my control port filter is present so circuit
display is broken intentionally, etc.
[1]: User safety is the #1 goal
form of my shim will support running with any combination of
nothing (Tor Browser just for the privacy benefits, probably
unsafe, I may reconsider this), I2P, and Tor (Though the most useful
configuration is probably I2P + Tor).
Thanks in advance,
--
Yawning Angel
pgp4CFhRjXQuC.pgp
Description
was chosen such that it would be blatantly obvious in
circuit listings as to which torsocks instance things belong to. There
is space in the username field, so appending a hexdecimal large random
number or something is certainly possible and quite trivial.
Regards,
--
Yawning Angel
pgpAXdf3KDOMa.pgp
the vendor's OpenSSL. The only resolution is Too bad,
so sad, install a modern OpenSSL.
See #16034 and #16040 for details.
--
Yawning Angel
pgp01DoAVjA4U.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
/13737
https://trac.torproject.org/projects/tor/ticket/13738
(If you happen to be more interested in making non-HS use cases faster,
then look elsewhere. :P)
Regards,
--
Yawning Angel
[0]: I do have a branch that makes circuit build crypto substantially
faster that I've been poking at so
a higher or lower limit. A
warning is logged periodically (rate limited to avoid log spam/clutter)
if circuits exceed the limit, so adjusting the parameter should be
relatively straight forward.
Regards,
--
Yawning Angel
pgpEKoiBJTmPv.pgp
Description: OpenPGP digital signature
.
It's worth noting that Dust2 (mostly done but not yet deployed) can
reduce payload entropy to match a target distribution, but will have
issues with protocol whitelist based DPI.
Regards,
--
Yawning Angel
pgpFY2al5Ysy5.pgp
Description: OpenPGP digital signature
On Fri, 21 Aug 2015 17:51:20 -0700
Kevin P Dyer kpd...@gmail.com wrote:
On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel
yawn...@schwanenlied.me wrote:
[snip]
The FTE semantic attack they presented isn't the easiest one I know
of (the GET request as defined by the regex
are attacks against either the Tor
network, or limitations of the tor implementation itself[1].
Regards,
--
Yawning Angel
[0]: Distribution still is an important problem that needs to be
solved, and maybe linking it closer to the protocol design is something
that is required. Open research
in the
intervening time period.
Regards,
--
Yawning Angel
pgpkGFnUn8J6o.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
of our paper.
Would be interesting to learn what the data tells us.
I would be interested in seeing the results.
--
Yawning Angel
[0]: Ngnix supports hooking the error handler rather easily, apache
less so.
pgpufIOwlRYHG.pgp
Description: OpenPGP digital signature
mappings.
2. No canonical visualization that can be shared across users.
3. Something Yawning randomly made up before going to bed.
Regards and good night,
--
Yawning Angel
pgpm_xywJhZs5.pgp
Description: OpenPGP digital signature
___
tor-dev mailing
deploy a few user select-able representation modules.
Without doing so, trying to hash out any sorts of design(s) will likely
end badly, and going with write the framework that lets us do UX
testing will let us get a better handle on the problem[0].
Regards,
--
Yawning Angel
[0]: And who knows
On Thu, 20 Aug 2015 11:00:51 -0400
Ian Goldberg i...@cs.uwaterloo.ca wrote:
On Thu, Aug 20, 2015 at 02:41:51PM +, Yawning Angel wrote:
What would be useful here is the number of onion addresses an
average user visits. If it's small, something like this would
probably be sufficient
things in depth).
I'm planning on revisiting this issue at some point, but last I looked
into it, using an assembly optimized Curve25519 implementation was
potentially a 7-10% gain (but is neither from libsodium nor djb NaCl).
https://trac.torproject.org/projects/tor/ticket/8897
--
Yawning Angel
signed tarballs up somewhere sensible.
Since there are no dependencies required beyond a new-ish Go compiler,
this should be utterly trivial to package.
I'll try to do this sooner rather than later, but no promises since IRL
stuff is on fire for the remainder of the week.
Regards,
--
Yawning
with dealing with supporting users
when this fails, I won't do the flashproxy work, but someone else is
more than welcome to do it.
Regards,
--
Yawning Angel
pgplTso9cEf2L.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev
every
single router ever made. And more importantly, compromised routers due
to shitty/out of date uPnP implementations are Not My Problem.
Regards,
--
Yawning Angel
pgpphKdsowO7U.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor
widely supported/deployed uPnP, on consumer routers
at least, should be disabled and treated with extreme suspicion till
proven otherwise.
Regards,
--
Yawning Angel
pgpyEKzNPX65d.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor
).
Regards,
--
Yawning Angel
pgptxSAf8ktjE.pgp
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
1 - 100 of 228 matches
Mail list logo