Re: [tor-dev] PQ crypto updates

2017-08-19 Thread Yawning Angel
wasn't thought to be quantum resistant in anyway shape or form, and providing quantum resistance wasn't part of the design goals of the primitive, or really why it was being considered at one point for use in Tor. Regards, -- Yawning Angel pgpKHB9bVRRUJ.pgp Description: OpenPGP di

Re: [tor-dev] PQ crypto updates

2017-08-20 Thread Yawning Angel
261 is dead in the water. Assuming people want the new cell crypto to be both fragile and to resist tagging attacks, Farfalle may be a better choice, assuming there's a Keccak-p parameterization such that it gives adequate performance. Regards, -- Yawning Angel pgp8RMxKugm9s.pgp Description:

Re: [tor-dev] Pluggable Transports 2.0 Specification, Draft 2

2017-06-21 Thread Yawning Angel
ity. I still don't understand what was so hard about implementing the old API, on anything but iOS. The "2.0" spec still doesn't have any provisions for using AF_LOCAL instead of the loopback interface, go figure. It's not as if I bring it up every time this topic comes up or anything

Re: [tor-dev] Pluggable Transports 2.0 Specification, Draft 2

2017-06-20 Thread Yawning Angel
maybe the other people who drafted the original document don't care as much as I do. I find the attribution in the acknowledgments section entirely inadequate. I explicitly credited all previous authors when I last rewrote the specification for a reason. Regards, -- Yawning Angel pgpgdLflv6ASe.

Re: [tor-dev] Names for your onions

2017-06-25 Thread Yawning Angel
/cB8ymDZreINJhk7BI > Qk6UM3PcutB7neTH3FR7DkVtSi23AOfOmlf0kNTSRZuMMB4gZO3KfZXGRWq1+FJ3 > [snip] Why are you sending PGP encrypted e-mail to a public mailing list. -- Yawning Angel pgpqOKwG4UPWF.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://

Re: [tor-dev] PQ crypto updates

2017-09-18 Thread Yawning Angel
; is > because only clients and exits do the SHA1 step.) I wonder how many of the relays have support for hardware assisted SHA. (nb: I don't have access to ARMv8, Ryzen or a sufficiently new Intel system, so I don't know how good the implementations are) Regards, -- Yawning Angel [0]: And

Re: [tor-dev] PQ crypto updates

2017-08-23 Thread Yawning Angel
On Tue, 22 Aug 2017 20:47:06 +0200 Peter Schwabe <pe...@cryptojedi.org> wrote: > Yawning Angel <yawn...@schwanenlied.me> wrote: > > Hi Yawning, hi all, > > > Ultimately none of this matters because Prop. 261 is dead in the > > water. Assuming people want th

Re: [tor-dev] Proposal 286: Controller APIs for hibernation access on mobile

2017-11-30 Thread Yawning Angel
uld need to tear down/respawn PTs, or someone needs to design an out of band IPC mechanism between tor and PTs that can signal hibernation status. The current approach to this problem involves toggling `DisableNetwork`. See: https://trac.torproject.org/projects/tor/ticket/13213 Regard

Re: [tor-dev] Proposal 284: Hidden Service v3 Control Port

2017-11-09 Thread Yawning Angel
ld be something like: > > $ tail -c+33 hs_ed25519_secret_key | base64 -w 0 > > Considering the current situation with the encoded file on disk of > the key, I think this is kind of the simplest approach? Yeah. Just the Base64ed private key (excluding that header

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-06-17 Thread Yawning Angel
on such things, rather than being forced to re-implement large parts of Tor Browser. Regards, -- Yawning Angel [0]: https://lists.torproject.org/pipermail/tbb-dev/2018-January/000743.html pgp4CNrRmOJJf.pgp Description: OpenPGP digital signature ___

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-06-17 Thread Yawning Angel
a to allow LEA/governments to exploit Tor > Browser users easily? Because I don't think maintaining the sandboxed > version is that much work and it is a great protection for many users. LOL. > So please, make Sandboxed Tor Browser an official thing. Fuck you, pay me. Regards, --

Re: [tor-dev] permission denied when running snowflake-client with debian-tor user

2018-06-11 Thread Yawning Angel
ify files elsewhere on the system. > > Example: > > TOR_PT_STATE_LOCATION=/var/lib/tor/pt_state/ Regards, -- Yawning Angel pgpmVyAiuBs22.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproje

Re: [tor-dev] Prop-279 for Onion Alternative Name Representations (Re: Error-Correcting Onions with Bech32)

2017-12-31 Thread Yawning Angel
at kind of allows development. Regards, -- Yawning Angel pgpEeie9zpgdb.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] No Control Socket when DisableNetwork 1

2018-01-20 Thread Yawning Angel
I still recommend a bit of a wait for tor to open the AF_UNIX socket. While it usually is nearly instantaneous on modern systems, I had intermittent problems with "the socket isn't there" related to trying too fast. Regards, -- Yawning Angel pgpQp7PSFkF

Re: [tor-dev] Pluggable transports research

2018-01-24 Thread Yawning Angel
: Pitfalls of Covert Channel Censorship Circumvention". https://www-users.cs.umn.edu/~hoppernj/ccs13-cya.pdf Regards, -- Yawning Angel pgpzXR9N4Leyb.pgp Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torpr

Re: [tor-dev] Prop-279 for Onion Alternative Name Representations (Re: Error-Correcting Onions with Bech32)

2018-01-01 Thread Yawning Angel
On Mon, 1 Jan 2018 08:45:57 + nullius <null...@nym.zone> wrote: > On 2017-12-31 at 10:48:52 +, Yawning Angel > <yawn...@schwanenlied.me> wrote: > >This is pointless because internationalized domain names are > >standardized around Punycode encoding (Unicode&l

Re: [tor-dev] WTF-PAD and the future

2018-08-03 Thread Yawning Angel
AGPL3 network interaction requirement, though there is an exception for bridges distributed via BridgeDB and those shipped with Tor Browser. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list t

Re: [tor-dev] No Control Socket when DisableNetwork 1

2018-01-20 Thread Yawning Angel
eal with this is via using `ControlPortWriteToFile` since the file gets created after the control port listener is created. You could also use something like inotify on Linux, but that's non-portable. Regards, -- Yawning Angel pgpbZpZhxZdpl.pgp Description: OpenPGP digital signature __

[tor-dev] Release: obfs4proxy-0.0.8

2019-01-20 Thread Yawning Angel
to gitlab. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] RFC: Using `utls` in meek_lite.

2019-01-21 Thread Yawning Angel
tag. Questions, comments, feedback appreciated, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] RFC: Using `utls` in meek_lite.

2019-01-21 Thread Yawning Angel
ompatibility a good amount. That said HelloChrome_Auto and HelloIOS_Auto both work fine against the Azure bridge, so it might not be worth the effort. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev m

Re: [tor-dev] using obfs4 to tunnel to a SOCKS proxy server

2019-01-23 Thread Yawning Angel
ader (depending on how you want to treat TLS). Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] RFC: Using `utls` in meek_lite.

2019-01-23 Thread Yawning Angel
see much reason to over engineer it. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] RFC: Using `utls` in meek_lite.

2019-01-23 Thread Yawning Angel
arantee that the connection used to create the inner `http.RoundTripper` instance will be passed to the correct thread. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev

[tor-dev] Release: obfs4proxy-0.0.9

2019-02-05 Thread Yawning Angel
(meek_lite). - More fixes to HTTP Basic auth. - (meek_lite) Pin the certificate chain public keys for the default Tor Browser Azure bridge (meek_lite). Regards, -- Yawning Angel [0]: obfs4proxy WILL NOT build with the upstream version of the library, and the Firefox fingerprint will not function

[tor-dev] Release: obfs4proxy-0.0.10

2019-04-11 Thread Yawning Angel
/obfs4proxy/obfs4proxy-0.0.10.tar.xz https://people.torproject.org/~yawning/releases/obfs4proxy/obfs4proxy-0.0.10.tar.xz.asc Changes in version 0.0.10 - 2019-04-12: - Disable behavior distinctive to crypto/tls when using utls. - Bump the version of the utls fork. Regards, -- Yawning Angel

[tor-dev] Release: obfs4proxy-0.0.11

2019-06-20 Thread Yawning Angel
. - Bump the version of the utls fork. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Release: obfs4proxy-0.0.10

2019-05-04 Thread Yawning Angel
too. As of 0.0.10 it no longer does. Odd. None of that code, both in obfs4proxy and goptlib, has changed for years. I'll look at it when I have a moment. Regards, -- Yawning Angel signature.asc Description: OpenPGP digital signature ___ tor-dev ma

<    1   2   3