Re: [tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread moosehadley
> On May 9, 2016, at 5:54 PM, David Fifield wrote: > > Well, an "HTTPS proxy" doesn't have to be a TLS interception device. > When I think "HTTPS proxy", I think of an ordinary HTTP proxy using the > CONNECT method to support TLS. In that case, the proxy does not get to > see plaintext, which in

Re: [tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread David Fifield
On Mon, May 09, 2016 at 09:23:20PM +, William Waites wrote: > > Blake Hadley writes: > > > > The environment requires an HTTPS proxy to reach the World Web Web. > > > > Do HTTP proxies inherently create a situation similar to MITM? > > Yes, that is exactly what they do. If your web browser i

Re: [tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread William Waites
Blake Hadley writes: > > The environment requires an HTTPS proxy to reach the World Web Web. > > Do HTTP proxies inherently create a situation similar to MITM? Yes, that is exactly what they do. If your web browser isn't nagging you all the time with "hey this certificate is untrusted" then a si

Re: [tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread Blake Hadley
> The environment you're were in was mounting a MITM attack to break TLS, > or has compromised your box, because the only component of the URL that > is visible otherwise is the host in the SNI field. > > In such an environment, gettor in general isn't unblockable because > there is no privacy/secu

Re: [tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread Yawning Angel
On Mon, 9 May 2016 15:09:37 -0400 Blake Hadley wrote: > Hey everyone, > > [How it's currently done] > > Distributed by get...@torproject.com, the URL makes it pretty clear > what you're downloading. > Dropbox: > https://www.dropbox.com/s/mz9ug2rzvj85791/torbrowser-install-5.5.5_en-US.exe?dl

[tor-dev] [Proposal] Obfuscating the Tor Browser Bundle initial download

2016-05-09 Thread Blake Hadley
Hey everyone, [How it's currently done] Distributed by get...@torproject.com, the URL makes it pretty clear what you're downloading. Dropbox: https://www.dropbox.com/s/mz9ug2rzvj85791/torbrowser-install-5.5.5_en-US.exe?dl=1 Google Drive: https://docs.google.com/uc?id=0B76pDbk5No54VHowTEpr

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

2016-05-09 Thread Zhenfei Zhang
Sorry, my bad. Please ignore my previous email. I just noticed that here A is not the public polynomial \hat{a} in the R-LWE setting, but the concatenation of a seed that generates \hat{a}, and client's side of secret \hat{b} = \hat{a} s+e Zhenfei On Mon, May 9, 2016 at 2:04 PM, Zhenfei Zhang wr

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

2016-05-09 Thread Zhenfei Zhang
Hi all, If I understand it properly, in the proposal the client need to send the whole matrix A during the first initiation message. I draw this conclusion from the datagram: | a, A := NEWHOPE_KEYGEN(SEED) | | CLIENT_HDATA := ID || Z || X || A | |

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

2016-05-09 Thread isis
eik...@sigaint.org transcribed 0.6K bytes: > isis wrote: > > eik...@sigaint.org transcribed 1.1K bytes: > >> Typos: > > > > Thanks! Fixed: > > > > https://gitweb.torproject.org/user/isis/torspec.git/commit/?h=draft/newhope&id=5c115905 > > You skipped 2: > > - public keys already being in includ

Re: [tor-dev] [proposal] Post-Quantum Secure Hybrid Handshake Based on NewHope

2016-05-09 Thread isis
Tim Wilson-Brown - teor transcribed 3.7K bytes: > > > On 7 May 2016, at 05:17, isis wrote: > > > > ... > > > > Let `ID` be a router's identity key taken from the router microdescriptor. > > In the case for relays possessing Ed25519 identity keys (c.f. Tor proposal > > #220), this is a 32-byte s

[tor-dev] [Proposal] A simple way to make Tor-Browser-Bundle more portable and secure

2016-05-09 Thread Daniel Simon
Hello. How it's currently done - The Tor Browser Bundle is dynamically linked against glibc. Security problem - The Tor Browser Bundle has the risk of information about the host system's library ecosystem leaking out onto the network. Portability problem - The Tor Browser Bundle can't be run on