Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-11 Thread A. Johnson
> HS -> Guard_1 -> Guard_2 -> Guard_3 -> RP. > > The idea is that Guard_1 is a single node that you choose and keep for > O(6 months, or as long as possible), but Guard_2 actually comes from a > set of 3-6 or so nodes that you keep for O(weeks), and Guard_3 you > rotate something like O(hours). .

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-11 Thread Mike Perry
A. Johnson: > >> The idea would be that Guard_3 would rotate on the order of hours, > >> Guard_2 would come from a set that is rotated on the order of days > >> (based on the expected duration for the adversary to become > >> Guard_3), and Guard_1 would rotate on the order of months (based on > >>

Re: [tor-dev] Hidden Service authorization UI

2014-11-11 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/11/14 12:50, George Kadianakis wrote: > I suspect that HS authorization is very rare in the current > network, and if we believe it's a useful tool, it might be > worthwhile to make it more useable by people. For what it's worth, the reason I

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-11 Thread A. Johnson
>> The idea would be that Guard_3 would rotate on the order of hours, >> Guard_2 would come from a set that is rotated on the order of days >> (based on the expected duration for the adversary to become Guard_3), and >> Guard_1 would rotate on the order of months (based on the expected >> duration

[tor-dev] tor packet handling

2014-11-11 Thread Mohiuddin Ebna Kawsar
Hi, I want to develop extension(intrusion detection) for tor. for that i have to extract TCP and IP header from packet. I need to know where and how tor handle packet(TCP/IP). is it in buffer.c / connection.c ? Regards Kawsar ___ tor-dev mailing list to