Re: [tor-dev] Help with rebasing arma's n23-5 tor branch to current master

2013-09-13 Thread Charlie Belmer
Sorry about the truncated log - the full one is gzipped here: http://www.charliebelmer.com/scallion.log.gz I'll do some Chutney testing - I saw what looked like a good tutorial on this list earlier this month so let me give it a shot. Thanks! On Tue, Sep 10, 2013 at 6:17 AM, Karsten Loesing wr

[tor-dev] RFC of proposal draft for "Migration to ed25519 HS identity keys and privacy-preserving directory documents"

2013-09-13 Thread George Kadianakis
Here is another HS proposal draft. This one specifies how to migrate from the current HS protocol to the one specified in proposals "Migrate HS identity keys to Ed25519" and "Stop HS address enumeration by HSDirs": https://lists.torproject.org/pipermail/tor-dev/2013-August/005279.html https://list

Re: [tor-dev] entry guards and linkability

2013-09-13 Thread Leif Ryge
On Wed, Sep 11, 2013 at 11:20:59AM -0400, Nick Mathewson wrote: > On Wed, Sep 11, 2013 at 10:57 AM, Leif Ryge wrote: > > Is the following statement correct? > > > > When a user connects to Tor from multiple locations where the network is > > monitored by the same adversary, their persistent use of

[tor-dev] Hidden Service location referrals in DNS/web

2013-09-13 Thread Jeroen Massar
Hi, I don't know what the current status/discussion for this is, hence this email, a reply to a ticket # or mail thread would be fine too ;) Is there currently a plan or way to state for a site: "you can find us as hidden service X" ? In DNS we could use something like: www NAPTR

Re: [tor-dev] Thoughts on Proposal 203 [Avoiding censorship by impersonating a HTTPS server]

2013-09-13 Thread Jeroen Massar
On 2013-09-12 22:00 , Kevin Butler wrote: [..] > I should have made my assumptions clearer. I am assuming the CA is > compromised in this idea. I have assumed it is easy to make a > counterfeit and valid cert from the root but it is hard(read infeasible) > to generate one with the same fingerprint