Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
On 11/24/2016 2:24 AM, Jesse V wrote: > On 11/23/2016 07:04 PM, Yawning Angel wrote: >> Our fix: "Add another command, that does essentially the same thing, >> because people picked the wrong options, then later deal with the >> fallout from people getting used to the temporary command, and crying

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Jesse V
On 11/23/2016 07:04 PM, Yawning Angel wrote: > Our fix: "Add another command, that does essentially the same thing, > because people picked the wrong options, then later deal with the > fallout from people getting used to the temporary command, and crying > when it's deprecated." > > I say "they s

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Yawning Angel
On Thu, 24 Nov 2016 11:13:06 +1100 teor wrote: > > On 24 Nov. 2016, at 11:04, Yawning Angel > > wrote: > > > > On Thu, 24 Nov 2016 01:43:15 +0200 > > s7r wrote: > >> I agree that this would be "the technical way" to do it, but real > >> world usability kind of prevents us to do it this way.

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 11:04, Yawning Angel wrote: > > On Thu, 24 Nov 2016 01:43:15 +0200 > s7r wrote: >> I agree that this would be "the technical way" to do it, but real >> world usability kind of prevents us to do it this way. The spec for >> ADD_ONION indeed does not say that v2 hidden servi

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 10:56, s7r wrote: > > > teor wrote: >> >>> >>> Very good. We can add a new torrc option for ed25519 key based >>> authentication for clients (v3) so the current >>> HiddenServiceAuthorizeClient (v2) will not break old torrc's until >>> everyone upgrades. >>> >>> However

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: > No-one is proposing we abolish ADD_ONION with v2 services straight away. > > What we will do is make BEST mean v3, rather than v2. > RSA1024 will continue to mean v2, as it always has. > > ADD_ONION has always had an explicit BEST option, if clients don't want > the BEST type of key

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Yawning Angel
On Thu, 24 Nov 2016 01:43:15 +0200 s7r wrote: > I agree that this would be "the technical way" to do it, but real > world usability kind of prevents us to do it this way. The spec for > ADD_ONION indeed does not say that v2 hidden services will be > supported forever and it clearly SHOULD NOT, but

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: > >> >> Very good. We can add a new torrc option for ed25519 key based >> authentication for clients (v3) so the current >> HiddenServiceAuthorizeClient (v2) will not break old torrc's until >> everyone upgrades. >> >> However, we could just add an auth-type value after >> HiddenServi

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 10:43, s7r wrote: > > > teor wrote: How does ADD_ONION fit in? >>> >>> It's forward compatible by design, since you have to specify a key type >>> when you handle key management, and Tor gets to do whatever it wants if >>> you ask it to generate a key with the

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: >>> >>> How does ADD_ONION fit in? >> >> It's forward compatible by design, since you have to specify a key type >> when you handle key management, and Tor gets to do whatever it wants if >> you ask it to generate a key with the `BEST` algorithm. >> >> Assuming people who use it aren't

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Yawning Angel
On Thu, 24 Nov 2016 01:18:46 +0200 s7r wrote: > Yes, this looks good to me as well. As for ADD_ONION, I think we > should give the people that use it automatically for other apps a > change until they upgrade to be compatible with v3, so for the > transition period as long as v2 is supported (but

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 10:18, s7r wrote: > > Hello David, > > David Goulet wrote: >> Hi everyone! >> >> We are soon at the stage of implementing the service part of proposal 224 >> (next gen. hidden service.). Parent ticket is #20657 but I'll be discussing >> here ticket #18054. >> >> In a nut

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 09:00, Yawning Angel wrote: > > On Wed, 23 Nov 2016 03:12:22 +0400 > meejah wrote: > >> David Goulet writes: >> >>> 1) Once v3 is released, from that point on _no_ v2 service will be >>> allowed to be created by "tor" itself. It will always be possible >>> to do it by h

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
Hello David, David Goulet wrote: > Hi everyone! > > We are soon at the stage of implementing the service part of proposal 224 > (next gen. hidden service.). Parent ticket is #20657 but I'll be discussing > here ticket #18054. > > In a nutshell, we need to figure out the interface for the torrc f

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Yawning Angel
On Wed, 23 Nov 2016 03:12:22 +0400 meejah wrote: > David Goulet writes: > > > 1) Once v3 is released, from that point on _no_ v2 service will be > > allowed to be created by "tor" itself. It will always be possible > > to do it by hand by creating an RSA key and putting it in the > > service di

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread teor
> On 24 Nov. 2016, at 06:09, Jesse V wrote: > > On 11/23/2016 09:39 AM, David Goulet wrote: >> I agree with you on the fact that ADD_ONION is nice and also crucial to >> hidden >> service as well. That will be addressed with the control port implementation >> of next generation. It's still an u

Re: [tor-dev] Distributed RNG Research

2016-11-23 Thread Jesse V
On 11/18/2016 10:30 AM, ban...@openmailbox.org wrote: > New research on Distributed RNGs is published: "Scalable Bias-Resistant > Distributed Randomness" > > eprint.iacr.org/2016/1067 Nice! There's also https://eprint.iacr.org/2015/1015.pdf, which shows that you can extract at least 32 bits of en

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Jesse V
On 11/23/2016 09:39 AM, David Goulet wrote: > I agree with you on the fact that ADD_ONION is nice and also crucial to hidden > service as well. That will be addressed with the control port implementation > of next generation. It's still an undecided part of the engineering work which > is how we ar

[tor-dev] Onionoo 3.1-1.0.0

2016-11-23 Thread iwakeh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi there! More than five years of development [0] led to the very first release of Onionoo, which is now available here: https://dist.torproject.org/onionoo/3.1-1.0.0/ For those who haven't heard of Onionoo: Onionoo [0] is a web-based pro

Re: [tor-dev] sketch: An alternative prop224 authentication mechanism based on curve25519

2016-11-23 Thread George Kadianakis
Nick Mathewson writes: > [ text/plain ] > Hi! I thought I'd write this up while it was fresh in my mind. It > could be used as an alternative method to the current proposed client > authentication mechanism. We could implement both, or just this, or > just the other. > > My description here wi

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread David Goulet
On 23 Nov (03:12:22), meejah wrote: > David Goulet writes: > > > 1) Once v3 is released, from that point on _no_ v2 service will be allowed > > to > >be created by "tor" itself. It will always be possible to do it by hand > > by > >creating an RSA key and putting it in the service direc