Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Sebastian Hahn
On Feb 1, 2012, at 2:48 AM, Watson Ladd wrote: > On Tue, Jan 31, 2012 at 2:57 PM, Nick Mathewson wrote: >> Another possibility is this: >> >> Browser's resolver -> Tor Client (as DNSPort): "Resolve >> www.example.com, give me an A, and give me DNSSec stuff too." >> Tor Client-> Tor net-> Tor Exi

Re: [tor-dev] Improving the tests

2012-01-31 Thread Damian Johnson
Hi Esteban. Another option, if you're interested in python integration testing and hacking on a project that's currently active, is stem. It's a controller library that also provides integration testing for tor. For more information see... https://gitweb.torproject.org/stem.git https://trac.torpro

Re: [tor-dev] Parallel Crypto - Library dep.

2012-01-31 Thread David Goulet
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12-01-31 03:08 PM, Watson Ladd wrote: > On Tue, Jan 31, 2012 at 1:46 PM, David Goulet wrote: > Hi everyone, > > To help the tor project, I'll contribute some of my spare time to improve > multithreading for the Tor code base. >> Color me confused:

Re: [tor-dev] Parallel Crypto - Library dep.

2012-01-31 Thread David Goulet
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12-01-31 03:42 PM, Nick Mathewson wrote: > On Tue, Jan 31, 2012 at 2:46 PM, David Goulet wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Hi everyone, >> >> To help the tor project, I'll contribute some of my spare time to improve >

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Watson Ladd
On Tue, Jan 31, 2012 at 2:57 PM, Nick Mathewson wrote: > On Tue, Jan 31, 2012 at 3:35 PM, Roger Dingledine wrote: >> On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote: >>> On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote: >>> > So it looks like Tor would get two new libraries

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Ondrej Mikle
On 01/31/2012 09:35 PM, Roger Dingledine wrote: > > I totally agree that writing our own dnssec code would be absurd. > > But I'm confused here about why we're adding dns support to Tor itself. > Are we doing it to be able to proxy more requests from applications to > dns servers? Or are we doing

Re: [tor-dev] Tor and DNS

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 6:20 PM, Jacob Appelbaum wrote: > On 01/31/2012 06:42 AM, Nick Mathewson wrote: >> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote: >>> >>> I think that seems OK. I think the first step is a proposal, >> >> Anybody volunteering for this, or should I throw it on my  

Re: [tor-dev] Tor and DNS

2012-01-31 Thread Jacob Appelbaum
On 01/31/2012 06:42 AM, Nick Mathewson wrote: > On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote: >> >> I think that seems OK. I think the first step is a proposal, > > Anybody volunteering for this, or should I throw it on my pile? I think it might make sense for you, me and Ondrej to wr

Re: [tor-dev] Improving the tests

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 4:21 PM, Esteban Manchado Velázquez wrote: > Hey guys, > > I wanted to try and help a bit, but I'm not exactly a C wizard or know much > about networking code. However, I am an experienced developer, do understand > C and have quite a bit of experience with automated testin

Re: [tor-dev] Tor and DNS

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 4:22 PM, Ondrej Mikle wrote: > On 01/31/2012 03:42 PM, Nick Mathewson wrote: >> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote: >>> >>> I think that seems OK. I think the first step is a proposal, >> >> Anybody volunteering for this, or should I throw it on my  pil

[tor-dev] Improving the tests

2012-01-31 Thread Esteban Manchado Velázquez
Hey guys, I wanted to try and help a bit, but I'm not exactly a C wizard or know much about networking code. However, I am an experienced developer, do understand C and have quite a bit of experience with automated testing. Luckily, according to https://www.torproject.org/getinvolved/volu

Re: [tor-dev] Tor and DNS

2012-01-31 Thread Ondrej Mikle
On 01/31/2012 03:42 PM, Nick Mathewson wrote: > On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote: >> >> I think that seems OK. I think the first step is a proposal, > > Anybody volunteering for this, or should I throw it on my pile? I volunteer for writing the proposal. Ondrej __

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 3:35 PM, Roger Dingledine wrote: > On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote: >> On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote: >> > So it looks like Tor would get two new libraries linked in, and exit >> > relays would inherit whatever secur

Re: [tor-dev] Parallel Crypto - Library dep.

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 2:46 PM, David Goulet wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi everyone, > > To help the tor project, I'll contribute some of my spare time to improve > multithreading for the Tor code base. > > I've speak a bit with Nick M. and it seems the crypto li

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Roger Dingledine
On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote: > On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote: > > So it looks like Tor would get two new libraries linked in, and exit > > relays would inherit whatever security/stability issues libunbound has > > since clients can basic

Re: [tor-dev] Parallel Crypto - Library dep.

2012-01-31 Thread Watson Ladd
On Tue, Jan 31, 2012 at 1:46 PM, David Goulet wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi everyone, > > To help the tor project, I'll contribute some of my spare time to improve > multithreading for the Tor code base. Color me confused: This is for taking advantage of multiproc

[tor-dev] Parallel Crypto - Library dep.

2012-01-31 Thread David Goulet
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi everyone, To help the tor project, I'll contribute some of my spare time to improve multithreading for the Tor code base. I've speak a bit with Nick M. and it seems the crypto lib is an important part to begin with. The wiki page (https://trac.tor

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Ondrej Mikle
On 01/31/2012 05:17 PM, Watson Ladd wrote: > I've got a more basic question: does the OP get enough information to > validate the DNSSEC data, or does it have to trust the OR? I don't > quite know enough to tell from the above. I forgot to mention: validation on the client side is not finished in

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Watson Ladd
On Thu, Jan 26, 2012 at 3:42 PM, Ondrej Mikle wrote: > Hi, > > I decided to give it a shot in implementing full DNS/DNSSEC resolution support > for Tor, here's the branch: > > https://github.com/hiviah/tor > > ATM the biggest limitation is that reply DNS packet must fit in a single cell > (i.e. ma

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Nick Mathewson
On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote: > So it looks like Tor would get two new libraries linked in, and exit > relays would inherit whatever security/stability issues libunbound has > since clients can basically hand them packets that they have to parse > and deal with. FWIW, I

Re: [tor-dev] Tor and DNS

2012-01-31 Thread Nick Mathewson
On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote: > > I think that seems OK. I think the first step is a proposal, Anybody volunteering for this, or should I throw it on my pile? ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists