Re: [tor-dev] Proposal 207: Directory guards

2012-10-12 Thread Mike Perry
Thus spake Nick Mathewson (ni...@alum.mit.edu): > On Fri, Oct 12, 2012 at 3:17 PM, Mike Perry wrote: > > Thus spake Nick Mathewson (ni...@torproject.org): > >> Discussion: > >> > >>The rule that the set of guards and the set of directory guards need to > >>be disjoint, and the rule that m

Re: [tor-dev] Proposal 207: Directory guards

2012-10-12 Thread Nick Mathewson
On Fri, Oct 12, 2012 at 3:17 PM, Mike Perry wrote: > Thus spake Nick Mathewson (ni...@torproject.org): >> Discussion: >> >>The rule that the set of guards and the set of directory guards need to >>be disjoint, and the rule that multiple directory guards need to be >>providing descripto

Re: [tor-dev] Automating Bridge Reachability Testing (#6414)

2012-10-12 Thread Jacob Appelbaum
Isis: > Hi Karsten! > > Oh sheesh. I did not see it...I will have to figure out why. That is > slightly worrying. > > So, I am rushing to meet the final deadline, but I still think it is > doable. I have mostly finished up my OONI work for the month, and I > planned to spend the remainder of this

Re: [tor-dev] Automating Bridge Reachability Testing (#6414)

2012-10-12 Thread Isis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Karsten! Oh sheesh. I did not see it...I will have to figure out why. That is slightly worrying. So, I am rushing to meet the final deadline, but I still think it is doable. I have mostly finished up my OONI work for the month, and I planned to

Re: [tor-dev] Proposal 207: Directory guards

2012-10-12 Thread Mike Perry
Thus spake Nick Mathewson (ni...@torproject.org): > Filename: 207-directory-guards.txt > Title: Directory guards > > Motivation: > >When we added guard nodes to resist profiling attacks, we made it so >that clients won't build general-purpose circuits through just any >node. But cli

Re: [tor-dev] Even more notes on relay-crypto constructions

2012-10-12 Thread unknown
>On Thu, 11 Oct 2012 19:17:22 + >unknown wrote: > On Tue, 9 Oct 2012 00:28:38 -0400 > Nick Mathewson wrote: > > > So to be concrete, let me suggest a few modes of operation. I believe > > I'm competent to implement these: > > I think (IMHO) Keccak makes many (most?) symmetric encryption m

[tor-dev] txtorcon 0.6

2012-10-12 Thread meejah
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 txtorcon 0.6 is now tagged and released. txtorcon is a Twisted-based Python asynchronous implementation of the Tor control protocol. It includes a state-tracking abstraction, configuration abstraction, Twisted endpoint support for hidden services,