Re: [tor-dev] Your server has not managed to confirm that its ORPort is reachable

2013-05-17 Thread Christian Kujau
Hm, an hour later it succeeded: May 17 20:40:43.000 [warn] Your server (...:9001) has not managed to confirm that its ORPort is reachable. May 17 21:00:43.000 [warn] Your server (...:9001) has not managed to confirm that its ORPort is reachable. May 17 21:20:43.000 [warn] Your server (...:9001)

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread not me
> as you will rightfully point out because of things like windows returning -1 > but probably neglect things like redhat's patched-up version blowing up on > invalid unicode sequences, etc. clarified: windows snprintf() returning -1 on 0-length buffer inputs; lacking nil-termination in some cases

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread not me
> Win64 is the *only* flat-memory-space ABI ever promulgated in > which pointers cannot safely be converted to 'unsigned long' > and back without loss of information. This is a willful > violation of requirements in C89 and is IMNSHO sufficient > justification to refuse to port to this platfor

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread not me
> Look more closely at those libevent headers: this is only the case on > Windows. Yeah, it's at least arguably wrong, but it's not interfering with > anyone else. why on earth anyone thought this was a good idea ever is beyond me. Even if we consider a 32-bit box with an OS that doesn't exist t

[tor-dev] Your server has not managed to confirm that its ORPort is reachable

2013-05-17 Thread Christian Kujau
Hi, I had to reboot my bridge for a (Ubuntu) kernel upgrade but now it cannot confirm that the ORPort is accessible: May 17 20:20:36.000 [notice] Tor 0.2.4.12-alpha (git-a1bb0df9be95ce7a) opening log file. May 17 20:20:36.000 [notice] Not disabling debugger attaching for unprivileged users. Ma

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread Zack Weinberg
On 2013-05-17 11:32 PM, not me wrote: ... using intptr_t as a return value for socket() ... Look more closely at those libevent headers: this is only the case on Windows. Yeah, it's at least arguably wrong, but it's not interfering with anyone else. (This is on my list of things to fix in

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread Zack Weinberg
On 2013-05-17 11:04 PM, Blibbet wrote: On the positive side, it seems like many Win32 projects get about 15% faster (when run on NT64 systems, removing the overhead of the Win32 subsystem) Just one point of information: this is almost certainly due to the larger register set and newer, more e

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread Zack Weinberg
On 2013-05-17 10:07 PM, not me wrote: Hi, It seems fairly self-evident that tor hasn't been build for 64-bit windows and questionable whether it's ever been built in an environment that doesn't utilize mingw. There are literally hundreds of thousands of warnings about integer truncation, at leas

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread not me
> AFAIK, Tor has only been compiled as a Win32 app, never as a Win64 app. More or less what I thought, tyvm. > In the past, most of the time, Tor only builds on Windows with GCC/MinGW. But > recently, >Tor works primarily on Windows via MinGW toolchain, AFAIK still MinGW32. It >has worked a few

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Mike Perry
adrelanos: > George Kadianakis: > > If we move to the higher security of (e.g.) 128-bits, the base32 string > > suddenly becomes 26 characters. Is that still conveniently sized to pass > > around, or should we admit that we failed this goal and we are free to > > crank up the security to 256-bits (

Re: [tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread Blibbet
> It seems fairly self-evident that tor hasn't been build for 64-bit windows and questionable whether it's ever been built in an environment that doesn't utilize mingw. [...] ... AFAIK, Tor has only been compiled as a Win32 app, never as a Win64 app. I realize that many/most/all of the develo

[tor-dev] building from source in a 64-bit windows environment..

2013-05-17 Thread not me
Hi, It seems fairly self-evident that tor hasn't been build for 64-bit windows and questionable whether it's ever been built in an environment that doesn't utilize mingw. There are literally hundreds of thousands of warnings about integer truncation, at least some of which seem somewhat problemati

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread adrelanos
George Kadianakis: > If we move to the higher security of (e.g.) 128-bits, the base32 string > suddenly becomes 26 characters. Is that still conveniently sized to pass > around, or should we admit that we failed this goal and we are free to > crank up the security to 256-bits (output size of sha-25

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread George Kadianakis
> George Kadianakis: >> Thoughts? > > Can you make .onion domains really long and therefor really safe against > brute force? > Oh. That reminded me of a topic I forgot to insert in my original post. An onion address is the truncated (80 bits) hash of the public identity key of a Hidden Service.

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Andrew F
George, I would definitely create an extended transition time frame. 6 months or a year where both keys will work. just make it clear there is a cut off date. And I think Adrelanos's concept is a valid one. Since we may need to do this again, why not put a structure in place that facilitate

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Nick Mathewson
On May 17, 2013 11:29 AM, "David Vorick" wrote: > > Why are so many bits necessary? Isn't 128bits technically safe against brute force? At 256 bits you are pretty much safe from any volume of computational power that one could fathom within this century. It sounds like you might be mixing up publ

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Zack Weinberg
On Fri, May 17, 2013 at 11:29 AM, David Vorick wrote: > Why are so many bits necessary? Isn't 128bits technically safe against brute > force? Not for RSA keys. A 1024-bit RSA key is considered approximately as strong as an 80-bit symmetric key; 2048-bit keys are approximately as strong as a 112-

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Gordon Morehouse
Symmetric cryptography (AES et al) key length - the 128, 256 etc bits you are talking about - is not directly comparable to public/private key cryptography, specifically RSA in this case. 1024 bits was considered a good strong RSA key... in 1995. On Fri, May 17, 2013, at 08:29 AM, David Voric

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread adrelanos
David Vorick: > Why are so many bits necessary? Isn't 128bits technically safe against > brute force? At 256 bits you are pretty much safe from any volume of > computational power that one could fathom within this century. The only > real danger is a new computational model that is nondeterministic

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread David Vorick
Why are so many bits necessary? Isn't 128bits technically safe against brute force? At 256 bits you are pretty much safe from any volume of computational power that one could fathom within this century. The only real danger is a new computational model that is nondeterministic or something crazy li

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread adrelanos
George Kadianakis: > Thoughts? Can you make .onion domains really long and therefor really safe against brute force? Or have an option for maximum key length and a weaker default if common CPU's are still too slow? I mean, if you want to make 2048 bit keys the default because you feel most hidden

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread Jeroen Massar
On 2013-05-17 15:23 , George Kadianakis wrote: [..] > That is, when we change the identity keys of a Hidden Service, its > onion also changes (since the onion is the truncated hash of its > public key). This will be quite problematic for Hidden Services that > have a well-established onion address.

[tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-05-17 Thread George Kadianakis
Greetings, I'm supposed to write a Tor proposal for the migration of the long-term identity keys of Hidden Services. When I began writing the proposal, I realized that some of my choices might not be appreciated by Hidden Service operators, and that starting a discussion thread might be a good ide