Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 8:42 PM, Nick Mathewson wrote: > On Tue, Nov 27, 2012 at 12:49 AM, Roger Dingledine wrote: [...] >> While I was looking at this design, I thought of a cool attack on >> 0.2.3 users: This is now Ticket #7582 on trac. yrs, -- Nick _

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 10:08 AM, Julian Yon wrote: > On Tue, 27 Nov 2012 00:49:28 -0500 > Roger Dingledine wrote: > >> (Also, if we have no client-side dns cache, further streams requesting >> the same address, e.g. fetching pictures from the website, might try >> the same circuit even if we cou

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Nick Mathewson
On Tue, Nov 27, 2012 at 12:49 AM, Roger Dingledine wrote: > On Sun, Nov 25, 2012 at 07:54:51PM -0500, Nick Mathewson wrote: >> [tl;dr: We should make client-side DNS cacheing off by default.] > > Be careful -- we seem to rely on the client-side dns cache to let us > move on to a new circuit if the

Re: [tor-dev] Proposal: Tor Extended ORPort Authentication

2012-11-27 Thread Nick Mathewson
Added as proposal 217; thanks! ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal: Tor Extended ORPort Authentication

2012-11-27 Thread George Kadianakis
Ugh, forgot the Acknowledgments section in my previous mail. This proposal is identical to the previous one, but with acknowledgments included. Enjoy. Filename: XXX-ext-orport-auth.txt Title: Tor Extended ORPort Authentication Author: George Kadianakis Created: 28-11-2012 Status: Open Target: 0.2.

[tor-dev] Proposal: Tor Extended ORPort Authentication

2012-11-27 Thread George Kadianakis
Greetings, I'm attaching a proposal for adding authentication to the Extended ORPort. The Extended ORPort is a yet unimplemented feature, that allows pluggable transports proxies to communicate with Tor; it's a prerequisite for pluggable transport statistics, rate limiting, and other cool things.

[tor-dev] questions about parallel Tor circuits en masse & adoption drivers

2012-11-27 Thread Simon
Hello, I'm interesting in discussing the development aspects of using Tor as a massively distributed anonymous file server where blocks (e.g. 4KB) of a particular file (e.g. even several GB in size) might be redundantly distributed on very many hidden service nodes (e.g. a unique 4KB block of a fi

[tor-dev] Proposal 216: Improved circuit-creation key exchange

2012-11-27 Thread Nick Mathewson
Hi, all. This is just the ntor proposal draft, as circulated last year, but with a proposal number assigned to it, and a closing section about how to make Tor actually work with it. Filename: 216-ntor-handshake.txt Title: Improved circuit-creation key exchange Author: Nick Mathewson Created: 1

[tor-dev] tor exit node modules in Tor source codes

2012-11-27 Thread esolve esolve
I'm doing research on Tor and I want to modify the tor exit node functions. I downloaded the source codes from this link https://gitweb.torproject.org/tor.git/tree/b13c6becc892d9716d8645f16b5d03bdb0b34651:/src but I can't find the modules/files which are related to tor exit functions(like receive

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Julian Yon
On Tue, 27 Nov 2012 00:49:28 -0500 Roger Dingledine wrote: > (Also, if we have no client-side dns cache, further streams requesting > the same address, e.g. fetching pictures from the website, might try > the same circuit even if we could know that its exit policy would > refuse the stream.) So,