Re: [tor-dev] Erebus Code Review

2015-09-08 Thread Cristobal
Hi Damian, thanks for your feedback! I'm replying a few things inline. On 05/09/15 17:02, Damian Johnson wrote: > -- > > 155 def _register_event(self, event): > 156 output = { 'message': '', 'type': ''} > 157

Re: [tor-dev] Proposal: Single onion services

2015-09-08 Thread Jeff Burdges
As an aside, we chatted briefly about the naming options for single onion services or whatever at CCC camp. Amongst those present, there was no strong love for any existing naming proposal. An interesting naming idea surfaced however : We do not want people using these anyways unless they know

Re: [tor-dev] fteproxy depends on obfsproxy...

2015-09-08 Thread isis
George Kadianakis transcribed 1.4K bytes: > Kevin P Dyer writes: > > > ...and it shouldn't. > > > > Fortunately, the dependency is isolated to a single file. See [1]. > > > > My understanding is that pyptlib [2] is no longer maintained. > > > > wiley/asn/etc. - What's the proper way to remove thi

Re: [tor-dev] Troubleshooting Tor 0.2.7.1+ ephemeral hidden services

2015-09-08 Thread Micah Lee
On 09/08/2015 05:04 PM, Damian Johnson wrote: > Hi Micah, on first glance looks fine. For what it's worth here's the > example I got working a while back... > > https://stem.torproject.org/tutorials/over_the_river.html#ephemeral-hidden-services > > Cheers! -Damian Doh, I figured out what I did w

Re: [tor-dev] Troubleshooting Tor 0.2.7.1+ ephemeral hidden services

2015-09-08 Thread Damian Johnson
Hi Micah, on first glance looks fine. For what it's worth here's the example I got working a while back... https://stem.torproject.org/tutorials/over_the_river.html#ephemeral-hidden-services Cheers! -Damian On Tue, Sep 8, 2015 at 4:58 PM, Micah Lee wrote: > I'm trying to add support for epheme

[tor-dev] Troubleshooting Tor 0.2.7.1+ ephemeral hidden services

2015-09-08 Thread Micah Lee
I'm trying to add support for ephemeral hidden services to OnionShare. They'll solve a wide variety of problems related to OnionShare using a system Tor instead of Tor browser, and running in environments like Tails or Whonix. I'd rather never write the hidden service info to disk anyway. I notice

[tor-dev] Proposal: Out of Band Circuit HMACs

2015-09-08 Thread Mike Perry
This proposal exists in my torspec remote here: https://gitweb.torproject.org/user/mikeperry/torspec.git/tree/proposals/xxx-oob-hashmac.txt?h=oob_hmac Including it in-line for ease of reply: === Filename: xxx-oob-hmac.txt Title: Out of Band Circuit HMACs Authors: Mike

[tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Sep 9, 14:00 UTC in #tor-project

2015-09-08 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello list, This is an announcement/reminder that there will be an IRC meeting of the Measurement Team on Wednesday, September 9, 2015, 14:00 UTC in #tor-project https://www.timeanddate.com/worldclock/fixedtime.html?iso=20150909T14 Talk to you to

[tor-dev] Is there a way to do the man in the middle on hidden service?

2015-09-08 Thread Liste
Sometime i can find the wrong SSL certificate on my hidden service. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Let's identify which measurement-related tools n eedwork when relays switch from RSA identities to ed25519 identities

2015-09-08 Thread tordev123
From: Damian Johnson To: "tor-dev@lists.torproject.org" Subject: Re: [tor-dev] Let's identify which measurement-related tools needwork when relays switch from RSA identities to ed25519 identities Date: Tue, 8 Sep 2015 09:16:15 -0700 > On a side note it would be nice to have a spec patch before

Re: [tor-dev] Let's identify which measurement-related tools need work when relays switch from RSA identities to ed25519 identities

2015-09-08 Thread Damian Johnson
>> Hi Karsten. Quick question: with the switchover are relay fingerprints >> going away? That is to say, server descriptors no longer have a... >> >> fingerprint D203 4DDF 1275 A234 4F66 9935 A3EF B908 FFC7 AE9A >> >> ... line, and router status entries don't have it on their dir-source? If not, wh

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-09-08 Thread Nick Mathewson
On Tue, Sep 8, 2015 at 7:10 AM, David Goulet wrote: > On 08 Sep (01:04:36), Tim Wilson-Brown - teor wrote: >> >> > On 7 Sep 2015, at 23:36, David Goulet wrote: >> > ... >> > Please review it, mostly format of the state (before the SR document) >> > has changed. As well as a new "conflict" line is

[tor-dev] Let's identify which measurement-related tools need work when relays switch from RSA identities to ed25519 identities

2015-09-08 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi everyone, Sebastian suggested to me in one of our last measurement team 1-1-1 task exchange rounds [0] to think about the following question: Which measurement-related tools need work when relays switch from RSA identities to ed25519 identities?

Re: [tor-dev] Towards a new version of the PT spec...

2015-09-08 Thread Yawning Angel
On Tue, 8 Sep 2015 17:39:58 +1000 Tim Wilson-Brown - teor wrote: > > > On 8 Sep 2015, at 08:45, Yawning Angel > > wrote: > > > > So, we currently have a Pluggable Transport (PT) spec, and it > > kind-of sort-of works (The documentation is a mess that I'm working > > on cleaning up, but it's an

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-09-08 Thread David Goulet
On 08 Sep (01:04:36), Tim Wilson-Brown - teor wrote: > > > On 7 Sep 2015, at 23:36, David Goulet wrote: > > ... > > Please review it, mostly format of the state (before the SR document) > > has changed. As well as a new "conflict" line is added to the vote. > > … > > > > If an authority sees tw

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-09-08 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I disagree. can you describe how exactly? What exactly can be gamed, if we use the protection described by me? It will provide the same security as directory authorities already have for voting about relays. It's true that ultimately anything can be

Re: [tor-dev] Towards a new version of the PT spec...

2015-09-08 Thread Tim Wilson-Brown - teor
> On 8 Sep 2015, at 08:45, Yawning Angel wrote: > > So, we currently have a Pluggable Transport (PT) spec, and it kind-of > sort-of works (The documentation is a mess that I'm working on > cleaning up, but it's an orthogonal issue for how well it works). > > There are a number of problems with