Re: [tor-dev] Proposal: Authenticating sendme cells to mitigate bandwidth attacks

2018-02-12 Thread teor
Hi, Comments inline: > On 13 Feb 2018, at 12:26, Roger Dingledine wrote: > > Filename: xxx-authenticated-sendmes.txt > Title: Authenticating sendme cells to mitigate bandwidth attacks > Author: Rob Jansen, Roger Dingledine > Created: 2016-12-01 > Status: open > > … > > 2.7 Long >3-hop Circuit

[tor-dev] Proposal: Authenticating sendme cells to mitigate bandwidth attacks

2018-02-12 Thread Roger Dingledine
Filename: xxx-authenticated-sendmes.txt Title: Authenticating sendme cells to mitigate bandwidth attacks Author: Rob Jansen, Roger Dingledine Created: 2016-12-01 Status: open 1. Overview and Motivation In Rob's "Sniper attack", a malicious Tor client builds a circuit, fetches a large file f

Re: [tor-dev] [prop-meeting] [prop#285] "Directory documents should be standardized as UTF-8"

2018-02-12 Thread teor
> On 13 Feb 2018, at 10:55, isis agora lovecruft wrote: > > A couple outcomes of this: > > 1. What passes for "canonicalised" "utf-8" in C will be different to >what passes for "canonicalised" "utf-8" in Rust. In C, the >following will not be allowed (whereas they are allowed in Rust):

Re: [tor-dev] [prop-meeting] [prop#285] "Directory documents should be standardized as UTF-8"

2018-02-12 Thread isis agora lovecruft
Hi! The notes from this meeting are online. [0] Thanks to everyone who attended! Extra thanks to teor for conducting the meeting since I was stupidly 8 minutes late due to impatiently watching a kettle boil after eating very spicy cioppino and then *extremely* needing a glass of iced tea immediat

[tor-dev] Enhancement for Tor 0.3.4.x

2018-02-12 Thread David Goulet
Hello everone! As an effort to better organize our 0.3.4.x release for which the merge window opens in 3 days (Feb 15th, 2018), we need to identify the enhancement(s) that we want so we can better prioritize the development during the merge window timeframe (3 months). Each feature should have it

Re: [tor-dev] monitoring significant drops of flags in dirauth votes

2018-02-12 Thread Damian Johnson
> I assume this has not been deployed - 50% or maybe 40% are fine I guess. > To come up with good threshold values > one would need to look at historic data for the past few months. Nope, it is deployed (if by 'deployed' you mean DocTor is presently performing this check). From David's reply about

Re: [tor-dev] monitoring significant drops of flags in dirauth votes

2018-02-12 Thread nusenu
Damian Johnson: >> thanks for implementing the new check so fast. > > No problem! Thanks for suggesting it. > >> This is also very useful but slightly different from what I had in mind, >> because it would not trigger if dirauths upgrade from A to B in the >> same hour and most exits, guards or h

Re: [tor-dev] moria1 had 756 HSDir flags in its vote but, the consensus had 2583

2018-02-12 Thread nusenu
>>> NOTICE: moria1 had 756 HSDir flags in its vote but >>> the consensus had 2583 >> >> I tried to find something related to this in the 0.3.3.x changelogs >> because moria1 (the affected dirauth) is the only one running tor alpha >> but I didn't find anything related to a change in what is requir

Re: [tor-dev] monitoring significant drops of flags in dirauth votes

2018-02-12 Thread David Goulet
On 11 Feb (21:21:00), nusenu wrote: > > Thanks nusenu! Nice idea, added it to DocTor... > > thanks for implementing the new check so fast. > > > https://gitweb.torproject.org/doctor.git/commit/?id=8945013 > > > > It gives a notice if flags issued by an authority are 50% different > > from the c