Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-20 Thread meejah
I've barely had time to poke at this much, but it's really neat. I was actually originally going to call "txtorcon" simply "txtor" but figured I'd leave that name in case anyone wrote an actual Tor implementation as a Twisted protocol -- which I guess you've now done :) [...and you're welcome to t

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-20 Thread Nik
Hi Damian, Thanks for the reply! > Your codebase mentions that you had trouble with the ExitPolicy's > can_exit_to() when you omit an address. Could you please provide an > example of a policy you were having trouble with and the expected > behavior? From the docs and code it sounds like if you o

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-20 Thread Damian Johnson
Hi Nik, very nice work! We love seeing alternative tor implementations since it gives us the chance to test if specs are up to snuff (Orchid is the only other one that comes to mind, but that has been inactive since 2013 [1]). Personally I've been curious if we can shift core tor to Python, Ruby, o

Re: [tor-dev] high latency hidden services

2015-01-20 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 09/01/15 14:40, Yawning Angel wrote: > I believe most of BuFLO's shortcomings documented in Cai, X., > Nithyanand, R., Johnson R., "New Approaches to Website > Fingerprinting Defenses" 5.A. apply to the currently proposed > defense, though some

Re: [tor-dev] high latency hidden services

2015-01-20 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/01/15 11:25, Mike Perry wrote: > You might also like the "Adaptive Padding" defense: > http://freehaven.net/anonbib/cache/ShWa-Timing06.pdf. It > implements pretty much what you describe here. It is one of my > current low-resource favorites.