Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-10 Thread A. Johnson
>> And yes again. In this model, an ultra-mega-secret HS should use a >> long chain of guards. Of course, at some point, it is easier to do a >> congestion attack to identify the first guard being used by the HS. >> That is still a win, though, in that such an attack takes more >> technical skill

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-10 Thread Mike Perry
A. Johnson: > > It seems to me that we want to defend against (at least) two > > different attacks here: > > > > Sybil attack: > ... > > Coercion attack: > > Yes, I also am currently thinking about the problem in this way. > > > Unfortunately, it doesn't really make sense to add two '5 day > >

Re: [tor-dev] Pluggable-transport implementations of your website fingerprinting defenses

2014-11-10 Thread David Fifield
On Sun, Nov 09, 2014 at 08:23:33PM -0500, Xiang Cai wrote: > I started to work on csbuflo code a long time ago, and I wasn’t using any > version control software back then, so I don’t have file commit history > either… > Sorry about that. > > However, I only modified several core files based on o

Re: [tor-dev] Hidden Service authorization UI

2014-11-10 Thread Nathan Freitas
On Sun, Nov 9, 2014, at 07:50 AM, George Kadianakis wrote: > Hidden Service authorization is a pretty obscure feature of HSes, that > can be quite useful for small-to-medium HSes. ... > For example, it would be interesting if TBB would allow people to > input a password/pubkey upon visiting a prot

Re: [tor-dev] HSDir Auth and onion descriptor scraping - actual stats

2014-11-10 Thread Gareth Owen
OK. curiosity got the better of me. I took a random sample of 20,368 HS descriptors and just 131 were authenticated - that's about 0.6%. The code I used is here: https://github.com/drgowen/tor-research-framework/blob/master/src/main/java/tor/examples/HSIsAuthed.java Best Gareth PS - I only took

Re: [tor-dev] HSDir Auth and onion descriptor scraping

2014-11-10 Thread George Kadianakis
Gareth Owen writes: > Grarpamp > > I'm only not publishing it because of privacy concerns - ultimately some HS > operators might not wish to have their existence publically known.. I > would be open to supplying it to bona fide and verifiable tor project > members if it is for a legitimate resea

Re: [tor-dev] Hidden Service authorization UI

2014-11-10 Thread Gareth Owen
It is verifiable. In authenticated hidden services, the introduction points are first encrypted and then base64 encoded. So a simple test is: When base64 decoded, is the MSB bit set on any bytes ? If yes, then it's probably authenticated, otherwise not. Note, you can use the Tor research framew

Re: [tor-dev] HSDir Auth and onion descriptor scraping

2014-11-10 Thread Gareth Owen
Grarpamp I'm only not publishing it because of privacy concerns - ultimately some HS operators might not wish to have their existence publically known.. I would be open to supplying it to bona fide and verifiable tor project members if it is for a legitimate research purpose. I am collecting ver