Re: [tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-01-06 Thread A. Johnson
> I think that there are some details to work out, but the general > approach you describe sounds reasonable. IMO it doesn't need to be > directory authorities who are StatsAuths, and we could use a "blinded > token once per relay per period" scheme for other stuff too down the > line. I wonder w

Re: [tor-dev] Regarding involving in tor project

2015-01-06 Thread dp docs
Thanks It worked. Durgesh Pandey. On Wed, Jan 7, 2015 at 1:17 AM, JT Allison wrote: > It's because your username ends in 21. Try using something else and you > should be ok. The IRC network was getting spam bots with nicks ending in 21. > > --- > GPG/PGP Fingerprint > E129 722B A512 105C E8BE >

Re: [tor-dev] Regarding involving in tor project

2015-01-06 Thread JT Allison
It's because your username ends in 21. Try using something else and you should be ok. The IRC network was getting spam bots with nicks ending in 21. --- GPG/PGP Fingerprint E129 722B A512 105C E8BE 4705 8046 EA48 2C82 1339 https://arlen.io/key On Jan 6, 2015 2:31 PM, "dp docs" wrote: > Dear Dev

Re: [tor-dev] Regarding involving in tor project

2015-01-06 Thread dp docs
Dear Developers, this may seem you to be a spam but I have this problem constantly from a long time period approximately 15 days. I have mailed twice to this list as well as tried to fix this problem myself by using Google. But I am not being able to remove the problem. Once again I am stating the

[tor-dev] how to simulate TOR network through chutney?

2015-01-06 Thread Mohiuddin Ebna Kawsar
HI, I need to simulate TOR network in minimal case [1 ENTRY,1 RELAY,1 EXIT] node. how can i do that use chutney? how to setup exit node on my localhost and how to make circuit with that exit node? following are my config file with generated (slightly modified) torc files i use basic-min for co

Re: [tor-dev] Proposal xxx: Consensus Hash Chaining

2015-01-06 Thread Sebastian G.
06.01.2015, 18:51 Andrea Shepard: > Here's a proposal Nick Mathewson and I just wrote for ticket #11157. > > [...] > 1. Introduction and overview > > To avoid some categories of attacks against directory authorities and their > keys, it would be handy to have an explicit hash chain in consensuse

Re: [tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-01-06 Thread Nick Mathewson
On Tue, Jan 6, 2015 at 12:14 PM, A. Johnson wrote: > Hello tor-dev, > > While helping design ways to publish statistics about hidden services in a > privacy-preserving > manner, it has become clear to me that certain statistics cannot be safely > reported using the > current method of having ea

Re: [tor-dev] Proposal xxx: Consensus Hash Chaining

2015-01-06 Thread Nick Mathewson
On Tue, Jan 6, 2015 at 12:51 PM, Andrea Shepard wrote: > Here's a proposal Nick Mathewson and I just wrote for ticket #11157. > Thanks for writing this up! Added as proposal 239. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torpr

Re: [tor-dev] test_cmdline_args.py on Windows

2015-01-06 Thread Nick Mathewson
Thanks; applied! On Mon, Jan 5, 2015 at 1:08 PM, Justin Findlay wrote: > On 01/05/2015 09:26 AM, Gisle Vanem wrote: >> Gisle Vanem wrote: >> >>> I only get 2 errors in that script. The others like: >>>self.assertTrue(out_verif.endswith("Configuration was valid\n")) >>> >>> needs another patch

Re: [tor-dev] Easy research tasks

2015-01-06 Thread Vignesh Prabhu
Hi, Nick Mathewson: > Some of the project ideas towards the bottom of > https://www.torproject.org/getinvolved/volunteer are easy, and some > have research. Maybe there's something there? > > (Check before embarking on anything complicated there; that list > hasn't got a thorough cleaning in a wh

[tor-dev] Proposal xxx: Consensus Hash Chaining

2015-01-06 Thread Andrea Shepard
Here's a proposal Nick Mathewson and I just wrote for ticket #11157. --- Begin proposal body --- Filename: xxx-consensus-hash-chaining.txt Title: Consensus Hash Chaining Author: Nick Mathewson, Andrea Shepard Created: 06-Jan-2015 Status: Draft 1. Introduction and overview To avoid some categorie

[tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-01-06 Thread A. Johnson
Hello tor-dev, While helping design ways to publish statistics about hidden services in a privacy-preserving manner, it has become clear to me that certain statistics cannot be safely reported using the current method of having each relay collect and report measurements. I am going to describe

Re: [tor-dev] Easy research tasks

2015-01-06 Thread Nicholas Hopper
On Tue, Jan 6, 2015 at 9:14 AM, spriver wrote: > Hi, > thanks for your reply. > What about this one: "Repeat Murdoch and Danezis's attack from Oakland 05 on > the current Tor network" > Is it still relevant? Should I dig into this task? You should have a look at http://www.cs.okstate.edu/~chantin

Re: [tor-dev] Easy research tasks

2015-01-06 Thread spriver
Hi, thanks for your reply. What about this one: "Repeat Murdoch and Danezis's attack from Oakland 05 on the current Tor network" Is it still relevant? Should I dig into this task? Cheers, spriver Am 2015-01-02 15:34, schrieb Nick Mathewson: On Fri, Jan 2, 2015 at 6:31 AM, spriver wrote: Hey