Re: [tor-dev] Proposal for PoW DoS defenses during introduction (was Re: Proposal 305: ESTABLISH_INTRO Cell DoS Defense Extension)

2019-06-13 Thread Aaron Lye
George Kadianakis: >>     2.Client computes POW. >>     Do{ >> Generates random 8 bytes key (ClientKey). >> Generates hash(sha512/256 or sha3??) of >> hash(IPKey + ClientKey) >> } while (hash does not start with "abcde") >> > > That looks like a naive PoW scheme. It would perhaps be preferable t

Re: [tor-dev] PrivCount and Prio IRC Meeting

2018-11-20 Thread Aaron Johnson
mpute aggregates simply by adding inputs. My overall opinion about Prio is that could be very useful to collect per-client statistics, such as from Tor Browser, but that doing so would require an upgraded version secure against malicious servers. Best, Aaron > On Nov 19, 2018, at 7:19 PM, teo

[tor-dev] Bandwidth Scanner

2018-03-19 Thread Aaron Gibson
sing the github tools to facilitate code reviews and testing, and has OK testing coverage and documentation. --Aaron [1] https://trac.torproject.org/projects/tor/wiki/org/meetings/2018Rome/Notes/BandwidthAuthorityRequirements [2] https://github.com/thetorproject/b

Re: [tor-dev] Proposal Waterfilling

2018-03-07 Thread Aaron Johnson
that you estimated $37.20/Gbps/month instead of $3.72/Gbps/month. This still seems low by an order of magnitude. Thus, my argument stands: waterfilling would appear to decrease the cost to an adversary of getting guard probability compared to Tor’s current weighting scheme. Best, Aaron

Re: [tor-dev] Proposal Waterfilling

2018-03-07 Thread Aaron Johnson
t among likely attackers). In the absence of detailed attacker information, a good design principle might be for clients to choose “diverse” relays, where diversity should take into account country, operator, operating system, AS, IXP connectivity, among other things. Best, Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal Waterfilling

2018-03-05 Thread Aaron Johnson
worse against network-level adversaries. Thus, it doesn’t seem to me that waterfilling protects Tor’s users against their likely adversaries, and in fact is likely to make things less secure in a few important cases. Best, Aaron > On Jan 31, 2018, at 5:01 PM, teor wrote: > > > On 1

Re: [tor-dev] Proposal 288: Privacy-Preserving Statistics with Privcount in Tor (Shamir version)

2017-12-14 Thread Aaron Johnson
circuits through that exit). How that could be done with adequate efficiency isn’t clear to me, though (it seems like a research question). Best, Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal 288: Privacy-Preserving Statistics with Privcount in Tor (Shamir version)

2017-12-14 Thread Aaron Johnson
plied by the client in Prio). There are reasonably efficient protocols for doing so, including SDPZ and TinyOT [1]. Best, Aaron [0] Ivan Damgard and Valerio Pastro and Nigel P. Smart and Sarah Zakarias, "Multiparty Computation from Somewhat Homomorphic Encryption", CRYP

Re: [tor-dev] PrivCount - Draft of secret-sharing specification

2017-09-28 Thread Aaron Johnson
p 3: Specify how the coefficients are determined. Best, Aaron > On Sep 27, 2017, at 11:20 PM, Carolin Zöbelein > wrote: > > Hi, > >> Hi, >> >> This looks like a great overview of the Shamir secret-sharing >> protocol. >> >> We talked about instanti

Re: [tor-dev] Proposal xyz : Count Unique IP addresses in an anonymous way

2017-04-02 Thread Aaron Johnson
ivacy provided by PCSA. However, it may well be an improvement on what Tor is doing currently :-) Best, Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Anonymous Local Count Statistics Using PCSA - GSoC

2017-04-02 Thread Aaron Johnson
counter. It is not clear to me that it is better to suffer the inaccuracy of the PCSA sketching plus that of the added noise when one could simply rely on adding differentially-private noise, especially when the latter provides a precise notion of privacy where the former does not. Best, Aaron [0

Re: [tor-dev] Anonymous Local Count Statistics Using PCSA - GSoC

2017-04-02 Thread Aaron Johnson
” tab on <https://metrics.torproject.org/userstats-relay-country.html>. Best, Aaron > On Apr 2, 2017, at 8:51 AM, Veer Kalantri wrote: > > about which stats are you talking Aaron? > > > On Sun, Apr 2, 2017 at 5:45 PM, Aaron Johnson <mailto:aaron.m.john...@nrl.

Re: [tor-dev] Anonymous Local Count Statistics Using PCSA - GSoC

2017-04-02 Thread Aaron Johnson
essarily correspond to a different IP because of NAT, and so counting connections may actually be more accurate. Best, Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Anonymous Local Count Statistics Using PCSA - GSoC

2017-04-01 Thread Aaron Johnson
ty of adding such local noise depends on on how inaccurate this would make the results. You may wish to contact Karsten Loesing of the Tor Metrics team to verify my understanding. Best, Aaron > On Apr 1, 2017, at 7:19 AM, Florian Tschorsch > wrote: > > > Hi Samir, > > this

Re: [tor-dev] Proposal 273: Exit relay pinning for web services

2016-10-15 Thread Aaron Johnson
relays that observe the same guard being used in a short period of time, indicating activity by the same client. Best, Aaron > On Oct 11, 2016, at 7:58 PM, Henry de Valence wrote: > > Hi, > On Wed, Oct 05, 2016 at 04:09:15PM -0400, Philipp Winter wrote: >> 0. Overview >&g

Re: [tor-dev] Tor Browser downloads and updates graphs

2016-09-21 Thread Aaron Johnson
fferent method than GET or HEAD. I can't see how a > user meant the remaining parts to be private. I’m happy to see that you’re removing 404s! Some things that occurred to me are avoided by doing this (e.g. inadvertent sensitive client requests). > > We shall specify the sanitiz

Re: [tor-dev] Tor Browser downloads and updates graphs

2016-09-20 Thread Aaron Johnson
, and it definitely helps that some sanitization was applied :-) Best, Aaron signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Tor Browser downloads and updates graphs

2016-09-17 Thread Aaron Johnson
ind releasing these stats. Are they raw numbers? Rounded? More generally, how are the web logs sanitized? I’m interested in how safe these statistics are to release and how they might be changed to be even more privacy-preserving. Thanks, Aaron signature.asc Description: Message signed with

Re: [tor-dev] Support for mix integration research

2016-02-23 Thread Aaron Johnson
descriptors are very small, and so it seems to me that mixing could be applied here to defeat deanonymization. 2. Read the alpha-mixing paper [2], which first described how high-latency and low-latency traffic might be mixed together. Good luck! Aaron [0] <https://freedom-to-tinker.com/b

Re: [tor-dev] ResearchEthics

2015-10-19 Thread Aaron Johnson
group? Aaron > On Oct 8, 2015, at 10:33 AM, Aaron Johnson > wrote: > >> The idea of that list is to provide specific activities for which the costs >> are judged not to outweigh the benefits. > > Sorry, that should have been "for which the costs are judged *to* o

Re: [tor-dev] ResearchEthics

2015-10-08 Thread Aaron Johnson
he Tor community without effort to change minds beforehand, and that Tor network operators may already be blacklisting relays that are observed participating in such activity. I think that will be a very helpful kind of communication between Tor and researchers that doesn’t exist tod

Re: [tor-dev] ResearchEthics

2015-10-08 Thread Aaron Johnson
ithout having to deal with crawlers or other snooping parties. I actually think a list with specific examples is far more useful than a set of abstract criteria that can easily be interpreted to be consistent with the goals of the interpreter. Best, Aaron

Re: [tor-dev] Onion Services and NAT Punching

2015-10-04 Thread Aaron Johnson
competitor to hidden services. And given that SOSes share 3-hop client circuits with exit circuits, perhaps we should try and make those two cases indistinguishable. It doesn’t seem impossible, although it probably requires adding some dummy steps to exit connections. Best, Aaron

Re: [tor-dev] ResearchEthics

2015-10-04 Thread Aaron Johnson
l if anybody is doing this. That doesn’t mean that Tor can’t request that it never be done. And “legitimate” researchers will absolutely follow community standards. First, because most of them aren’t jerks. Second, because conference program committees and journal editorial

[tor-dev] Guidelines and processes for ethical Tor research

2015-10-02 Thread Aaron Johnson
e wiki: <https://trac.torproject.org/projects/tor/wiki/doc/ResearchEthics>. Please send any comments. Best, Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal 247 (Hidden Service Vanguards) Overhaul

2015-10-02 Thread Aaron Johnson
times are more likely to be observed). So the probability that there are exactly t days until rotation of the observed node should be proportional to \sum_{i=t}^N Pr[X=i]. After normalization to make this a probability, the expression is (\sum_{i=t}^N Pr[X=i]) / (\sum_{i=1}^N Pr[X=i]*i). Best,

Re: [tor-dev] Simplifying load balancing by removing Guard+Exit?

2015-09-28 Thread Aaron Johnson
ht as guards for the last month (I didn’t look back farther). Every consensus in September 2015 has had Wgd=0 and Wed=1. So effectively the network has been treating those relays as exits only. Best, Aaron signature.asc Description: Message signed with OpenPGP u

Re: [tor-dev] Proposal: Single onion services

2015-09-18 Thread Aaron Johnson
ingle onion services. However, SOSes could still hide what the server does by including the authentication cookie, and that seems valuable. Isn’t authentication already an option in onion services, though? Cheers, Aaron > On Sep 6, 2015, at 3:21 AM, David Goulet wrote: > > On 05 Sep (

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-20 Thread Aaron Johnson
ving or adding a relay adjusts the onion service locations by an amount that is at most the fraction that is that relay’s total bandwidth fraction. To ensure coverage for clients with older consensuses, the relay can maintain HSDir+IPs at the locat

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-20 Thread Aaron Johnson
s much of that activity as larger relays. The uniform division of the hash ring has always seemed like an incorrect design choice, and it is one that we have an opportunity to fix. Best, Aaron signature.asc Description: Message signed with OpenPGP using GPGMail __

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-17 Thread Aaron Johnson
unfortunately educated guessing at this point. Best, Aaron > On Jul 17, 2015, at 8:11 PM, s7r wrote: > > Signed PGP part > On 7/18/2015 12:49 AM, A. Johnson wrote: > > > > Not having the third guards be selected by every second guard makes > > sense when you consider that

Re: [tor-dev] Bi-directional families in Onionoo and consensus weight as measure of relayed bandwidth

2015-07-02 Thread Aaron Gibson
On 2015-07-02 08:12, Karsten Loesing wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Moving this discussion here from another list with Virgil's permission. On 02/07/15 08:42, Virgil Griffith wrote: Big issues right now are: * Bugs (?) in Onionoo --- Onionoo doesn't sanitize its data. Fo

Re: [tor-dev] Draft of proposal "Direct Onion Services: Fast-but-not-hidden services"

2015-04-20 Thread Aaron D. Jaggard
> On Apr 20, 2015, at 1:40 PM, Paul Syverson wrote: > > On Mon, Apr 20, 2015 at 01:05:16PM -0400, A. Johnson wrote: >>> This is another reason why [modifier] onion service is >>> problematic; it will almost certainly get shortened in use, just >>> as location-hidden service did. >> >> The obv

Re: [tor-dev] Next OONI weekly meetings

2014-11-19 Thread Aaron Gibson
all and the next meeting will be on Monday 24th of November. My preference is also Monday. --Aaron Have fun! ~ Arturo ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Design for an exit relay scanner: feedback appreciated

2013-10-22 Thread Aaron
mplate that provides a basic example of a Tor network test in ooni. There's plenty of room for improvement, comments and patches are very welcome. --Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Attentive Otter: Usability issues with existing OTR clients

2013-10-17 Thread Aaron
On Thu, Oct 17, 2013 at 1:03 AM, Mike Perry wrote: > Here's the major usability pain points I've run in to with various OTR > clients over the years. Feel free to chime in with any additional issues > you've noticed. > > > 1. The multiple client problem: If you have two devices online > simultaneo

Re: [tor-dev] Design for an exit relay scanner: feedback appreciated

2013-10-10 Thread Aaron
On Thu, Oct 10, 2013 at 9:57 AM, Philipp Winter wrote: > On Thu, Oct 10, 2013 at 07:23:11AM +0000, Aaron wrote: > > I have been working on adding a "Tor Network Test Template" to > ooni-probe; > > the basic concept is to extend the Tor controller library we use &g

Re: [tor-dev] Design for an exit relay scanner: feedback appreciated

2013-10-10 Thread Aaron
twork interference tests can be easily adapted to running on the Tor network. Future ideas include adding signing support to ooni reports so that reliable reporters can build trust, and automatically parsing submitted reports to generate BadExit after a threshold of reporters is reached. Hope

Re: [tor-dev] Improving the HTTP interface of BridgeDB: bridges.torproject.org

2013-03-11 Thread Aaron
TorCheck repo (https://github.com/aagbsn/TorCheck) which outlines the sort of templating and i18 work that should make supporting BridgeDB's front end easier. --Aaron > > All the best, > SiNA > > Andrew Lewman: >> On Mon, 11 Mar 2013 11:08:36 +0530 >> Sathyanarayana

Re: [tor-dev] Improving the HTTP interface of BridgeDB: bridges.torproject.org

2013-03-11 Thread Aaron
bridges we hand out. I believe we have about 5-10x as many "normal" bridges as "obfs" bridges, so I would be hesitant to have all the users of normal bridges abruptly switch over to the limited set of obfs bridges at this point... But I do agree that every bridge should also be

Re: [tor-dev] Switch from Obfsproxy to Pyobfspoxy

2013-02-21 Thread Aaron
we do intend to have OONI working on android, I'm not aware of any progress in this area yet. Isis mentioned that she had taken a look with abel and had some notes on the topic. While poking around the interwebs I stumbled across kivy.org. Has anyone taken a look at it? s

Re: [tor-dev] https://gitweb.torproject.org/check.git

2012-08-26 Thread Aaron
is a new check.tp.o that will replace it: https://github.com/aagbsn/check https://check.extc.org/ (self-signed cert) --Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] bridge's lifetime

2012-07-31 Thread Aaron
P addresses (e.g. owns a botnet) can get more bridges. This is exactly the scenario for which ReCaptcha was deployed. Does that make sense? --Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Why change the bridges.torproject.org website to avoid to get bridges by script?

2012-07-26 Thread Aaron
o longer work? How long do bridges work for you, typically? Any feedback you can give is helpful! --Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Reachability testing brainstorming. (OONI, metrics, pluggable-transports)

2012-07-20 Thread Aaron
On Fri, Jul 20, 2012 at 3:08 PM, Aaron wrote: > BridgeDB was extended to filter bridges that are blocked in a > specified country from its response. BridgeDB needs a list of what is > blocked, and where, for this to work. > > We want to answer the question "What is blocked,

[tor-dev] Reachability testing brainstorming. (OONI, metrics, pluggable-transports)

2012-07-20 Thread Aaron
ive scanning? 6. For passive censorship detection, are there other indicators other than relay/bridge usage-by-country over time? 7. Should relays report per-country usage by address/transport? What are the upsides? Downsides? Thanks in advance! --Aaron ___

Re: [tor-dev] [OONI] Designing the OONI Backend (OONIB). RESTful API vs rsynch

2012-07-15 Thread Aaron
On Sun, Jul 15, 2012 at 12:56 PM, Arturo Filastò wrote: > * No resume support (this can be implemented on top of HTTP, we could > even implement the rsyc algorithm > on top of HTTP). Are you sure HTTP doesn't support resume? What does wget -c do? > Thoughts? > > - Art. > > [1] https://github.com

Re: [tor-dev] Extending BridgeDB to reallocate bridges from a blocked country to others that do not block.

2012-02-01 Thread Aaron
On Mon, Jan 30, 2012 at 1:14 AM, Roger Dingledine wrote: > On Sun, Jan 15, 2012 at 09:34:49AM -0800, Aaron wrote: >>  This proposal outlines the required changes for BridgeDB to reallocate >> bridges >>  from a blocked country to others that do not block. > > I guess

[tor-dev] Extending BridgeDB to reallocate bridges from a blocked country to others that do not block.

2012-01-15 Thread Aaron
oposes two different approaches -- any feedback or questions are very welcome! --Aaron Filename: xxx-bridgedb-reallocates-bridges.txt Title: BridgeDB Reallocates Bridges Author: Aaron Gibson Created: 15 Jan 2015 Status: Draft Introduction: This proposal outlines the required changes for B

[tor-dev] BridgeDB IPv6 Support (!)

2011-12-16 Thread Aaron
are very welcome. Thanks! --Aaron ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Draft Proposal for BridgeDB IPv6 Support

2011-12-16 Thread Aaron
On Sat, Dec 10, 2011 at 12:19 PM, Ralf-Philipp Weinmann wrote: > > On Dec 10, 2011, at 4:07 PM, Robert Ransom wrote: > >> On 2011-12-06, Aaron wrote: >> >>>        How does IPv6 affect address datamining of https distribution? >>>          A

Re: [tor-dev] Draft Proposal for BridgeDB IPv6 Support

2011-12-06 Thread Aaron
Thanks for your feedback! On Tue, Dec 6, 2011 at 1:45 AM, Linus Nordberg wrote: > Aaron wrote > Mon, 5 Dec 2011 16:38:49 -0800: > > |       IPv6 Addresses are stored as strings, the same way as IPv4 addresses. > |       #XXX: is this better than using the ipaddr.IPAddress class

[tor-dev] Draft Proposal for BridgeDB IPv6 Support

2011-12-05 Thread Aaron
Attached is a draft document describing proposed changes to BridgeDB to accommodate the new or-address spec (186-multiple-orports.txt) and IPv6 bridges. I am especially interested in comments on sections tagged #XXX. Thanks! --Aaron Filename: xxx-bridgedb-learns-ipv6.txt Title: BridgeDB Learns

Re: [tor-dev] New Paper: Cloud-based Onion Routing

2011-07-13 Thread Aaron
ctory servers also vulnerable to censorship? Q2: Regarding token redemption: Does an ASP relay contact the ASP token bank through COR? Could the token verification history be used to reveal which paths were constructed? --Aaron On Wed, Jul 13, 2011 at 11:47 AM, Nick Jones wrote: > Hi All, &