Re: [tor-dev] Tor Bridges and Snowflakes detection attack

2023-01-09 Thread Christian Pietsch
as additional features are extracted to identify the hidden service. The experimental results show that our identification framework F-ACCUMUL can effectively identify Tor-Snowflake traffic and Tor-Snowflake hidden service traffic DOI: https://doi.org/10.3390/app13010622 Cheers, Christian On Thu

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-06-14 Thread Christian Hofer
> but finding resolvers is probably one of the smaller issues when > compared to getting > everything implemented in firefox/tor browser. Current versions do > not even allow > to set more than one resolver URL. > I see. Are there any tickets or design proposals

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-06-01 Thread Christian Hofer
On Mon, 2020-05-25 at 21:23 +0200, nusenu wrote: > Christian Hofer: > > The thread model is DNS hijacking. Yes, you can prevent DNS > > hijacking > > using DoH if you *trust* the resolver you connect to. However, if > > you > > want to verify authenticity and in

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-25 Thread Christian Hofer
On Sun, 2020-05-24 at 19:01 +0200, nusenu wrote: > Christian Hofer: > > On Sat, 2020-05-16 at 01:37 +0200, nusenu wrote: > > > Alexander Færøy: > > > > I wonder if it would make more sense to have an onion-aware > > > > DNSSEC-enabled resolver *outside

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-24 Thread Christian Hofer
On Sat, 2020-05-16 at 01:37 +0200, nusenu wrote: > Alexander Færøy: > > I wonder if it would make more sense to have an onion-aware > > DNSSEC-enabled resolver *outside* of the Tor binary and have a way > > for > > Tor to query an external tool for DNS lookups. > > I'm also in favor of this appro

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-24 Thread Christian Hofer
On Sat, 2020-05-16 at 01:37 +0200, nusenu wrote: > > I can not really say anything about how this design compares to > > other > > approaches, since I don't know how I can setup meaningful test > > scenarios to compare them. > > Do we really need test setups to discuss protocol designs > and com

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-24 Thread Christian Hofer
On Sat, 2020-05-16 at 01:37 +0200, nusenu wrote: > > Before we go further, can you walk me through the reasons (if you > > had thought > > of it of course) why you didn't use something like libunbound? > > > > There are side effects of adding DNSSEC client support (with our > > own > > implementat

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-16 Thread Christian Hofer
On Fri, 2020-05-15 at 14:30 -0400, Roger Dingledine wrote: > On Fri, May 15, 2020 at 05:39:23PM +0200, Christian Hofer wrote: > > Final remarks. When I started, I didn't expect it to get this big, > > and > > frankly, if I had known before, I might not have even started.

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-15 Thread Christian Hofer
On Fri, 2020-05-15 at 15:29 +, Alexander Færøy wrote: > Hello Christian, > Hi Alex! > On 2020/04/26 19:37, Christian Hofer wrote: > > I have a proposal regarding DNS name resolution. > > > > Ticket: https://trac.torproject.org/projects/tor/ticket/340

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-05-15 Thread Christian Hofer
On Thu, 2020-05-14 at 15:56 -0400, David Goulet wrote: > On 26 Apr (19:37:56), Christian Hofer wrote: > > Hi there, > > Greetings Christian! > Hi David! > > I have a proposal regarding DNS name resolution. > > > > Ticket: https://trac.torproject.org/pr

Re: [tor-dev] Support for full DNS resolution and DNSSEC validation

2020-04-27 Thread Christian Hofer
test environments. For the server part I can provide a DNS server that supports DoT, DoH, and DNSSEC. Regarding stream isolation, see cypherpunks analysis in the ticket. Please let me know if you think this approach is worthwhile. Then I will try to answer the remaining questions. BR Christian On Mon,

[tor-dev] Support for full DNS resolution and DNSSEC validation

2020-04-26 Thread Christian Hofer
functioniality is behind the DNSResolver feature flag, so don't forget to activate it before you start testing. Please let me know what you think. BR Christian ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cg

Re: [tor-dev] archive.is and archive.fo are using CloudFlare. Is the TorBrowser add-on cfc useless now?

2017-02-07 Thread Christian Pietsch
Dear Tor developers, there is a new development in the area of Tor-friendly web archives: On Wed, Jan 18, 2017 at 11:42:45AM +, Yawning Angel wrote: > On Wed, 18 Jan 2017 12:15:05 +0100 > Christian Pietsch wrote: > > Considering that cfc was created in order to evade th

[tor-dev] archive.is and archive.fo are using CloudFlare. Is the TorBrowser add-on cfc useless now?

2017-01-18 Thread Christian Pietsch
used? I hear they are almost done setting up an onion service for the Internet Archive. Cheers, C: On Mon, Apr 18, 2016 at 10:16:31PM +, Yawning Angel wrote: > Source: https://git.schwanenlied.me/yawning/cfc -- Christian Pietsch, volunteering for Digitalcourage e.V., Bielefeld, Germ

Re: [tor-dev] Reg:https-everywhere

2016-09-15 Thread Christian Kujau
On Thu, 15 Sep 2016, AKASH DAS wrote: > Can I ask my doubts regarding https-everywhere and any bugs issue in this > mailing list as I already posted one bug but I didn't get any reply > regarding that error. > So any help would be very helpful to me. Please refer to these support channels for http

[tor-dev] BSD Buildbot on #tor-bots (was: (no subject))

2016-02-04 Thread Christian Sturm
On 02/04/2016 10:07 AM, Christian Sturm wrote: > Hello, > > a while ago I set up a BSD buildbot for tor[1]. It's actually not just > for BSDs, but also for other systems, such as Solaris. I wanted to make > it easier to notice when something breaks on non-popular systems, no

[tor-dev] (no subject)

2016-02-04 Thread Christian Sturm
Hello, a while ago I set up a BSD buildbot for tor[1]. It's actually not just for BSDs, but also for other systems, such as Solaris. I wanted to make it easier to notice when something breaks on non-popular systems, not actively used by the developers. There also is reporting through an IRC bot a

Re: [tor-dev] Special-use-TLD support

2015-09-29 Thread Christian Grothoff
On 09/29/2015 12:19 AM, Jeff Burdges wrote: > On Mon, 2015-09-28 at 16:26 -0400, Roger Dingledine wrote: >> On Mon, Sep 28, 2015 at 03:20:47PM +0200, Jeff Burdges wrote: >>> I proposed that Tor implement NameService rules using UNIX domain >>> sockets, or ports, since that's how GNUNet works, but m

[tor-dev] draft-grothoff-iesg-special-use-p2p-exit-00.xml

2015-06-22 Thread Christian Grothoff
AP and then I won't submit the draft. Happy hacking! Christian http://xml.resource.org/public/rfc/bibxml/reference.RFC.1034.xml";> http://xml.resource.org/public/rfc/bibxml/reference.RFC.1035.xml";> http://xml.resource.org/public/rfc/bibxml/reference.RFC.1928.xml";> h

Re: [tor-dev] The Onion Name System (OnioNS)

2015-05-23 Thread Christian Grothoff
s? > Yes, I will look into it. Your description is helpful, but if you > want to write up a protocol describing what you want on your end, > I'll merge it into my protocol, and then we'll have a protocol that > is compatible with both of our needs.

Re: [tor-dev] The Onion Name System (OnioNS)

2015-05-20 Thread Christian Grothoff
nt out that you define >> it differently than GNS does (and we checked with Zooko about the >> definition at the time). In particular, you assume that the >> adversary has limited computational power and doesn't dominate the >> consensus. For GNS, we assume that PoW is usel

Re: [tor-dev] The Onion Name System (OnioNS)

2015-05-19 Thread Christian Grothoff
and their opinions, not majorities. (see also http://grothoff.org/christian/fps2013wachs.pdf). Thus, you might want to make it clearer in your paper that you 'square' Zooko's triangle under exactly the same conditions as Namecoin: a weaker adversary model / definition of 'secure'

[tor-dev] [PATCH] Fix comparison is always true due to limited range of data type

2015-02-05 Thread Christian Kujau
s my attempt to fix this issue by declaring "dir" as "signed char". It compiles now (4.6.3 and 4.9.1) for powerpc32 and Tor seems to work - but please have a look if this is the Right Thing To Do. Thanks, Christian. Declare "char dir" as signed, otherwise compi

[tor-dev] Collecting data to demonstrate TCP ISN-based port knocking

2014-05-14 Thread Christian Grothoff
scale. You can find sources, binaries and a more elaborate description here: https://gnunet.org/knock_nat_tester Technical details about Knock and a (somewhat outdated) research paper as well as kernel patches are provided here: https://gnunet.org/knock Best, Julian & Christian 0x48426

Re: [tor-dev] Feedback on recent Globe improvements

2014-04-01 Thread Christian
On 01.04.2014 09:56, Karsten Loesing wrote: >> Do you think it would be better to modify the graphs so all of them >> start/end at the same time? (There is a small offset because the first >> and last fields aren't always the same) > > I thought about this, but didn't bring it up yet, because it m

Re: [tor-dev] Feedback on recent Globe improvements

2014-03-31 Thread Christian
On 31.03.2014 19:54, Karsten Loesing wrote: > On 31/03/14 18:38, Christian wrote: >> On 31.03.2014 08:38, Karsten Loesing wrote: >>> On 30/03/14 22:54, Christian wrote: >>>> On 30.03.2014 12:44, Karsten Loesing wrote: >>>>> And finally, you asked

Re: [tor-dev] Feedback on recent Globe improvements

2014-03-31 Thread Christian
On 31.03.2014 08:38, Karsten Loesing wrote: > On 30/03/14 22:54, Christian wrote: >> On 30.03.2014 12:44, Karsten Loesing wrote: >>> Hi Christian, >>> >>> moving our private discussion to the public mailing list. >>> >>> >>>

Re: [tor-dev] Feedback on recent Globe improvements

2014-03-30 Thread Christian
On 30.03.2014 12:44, Karsten Loesing wrote: > Hi Christian, > > moving our private discussion to the public mailing list. > > > You were asking about making graphs from Onionoo's new clients > documents. Here's an example: > > "1_week":{"fir

[tor-dev] globe compass integration

2014-03-04 Thread Christian
for the gsoc? Do you have other ideas on how to improve globe? Thanks, Christian ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Looking up bridges in Globe et al. by fingerprint

2014-02-10 Thread Christian
; response contains a single bridge with the hashed fingerprint being the > SHA-1 that Globe server computed. In this case the part that it > was given was a non-hashed fingerprint. If so, Globe server includes a > warning that users shouldn't put in their original fingerprint and &

[tor-dev] Speeding Up Tor with SPDY

2013-11-18 Thread Christian Grothoff
is unlikely that we'll be doing any further major implementation work on this in the near future. Naturally, the existing code is freely available (and does work, if one is willing to go through the pains to set it up properly). Happy hacking! Christian signature.as

[tor-dev] Registering special-use domain names of peer-to-peer name systems with IETF

2013-11-06 Thread Christian Grothoff
e pTLDs involve Tor, we would be happy for feedback from the Tor developer community. Happy hacking! Christian Internet Engineering Task Force (IETF) C. Grothoff IESG Approval document

Re: [tor-dev] Globe without search term

2013-08-15 Thread Christian
On 14.08.2013 10:38, Karsten Loesing wrote: On 8/13/13 10:43 PM, Christian wrote: On 13.08.2013 09:20, Karsten Loesing wrote: On 8/12/13 10:56 PM, Christian wrote: I've seen that you've included the field parameter to limit the fields that onionoo returns. Do you think it would be

Re: [tor-dev] Globe without search term

2013-08-13 Thread Christian
On 13.08.2013 09:20, Karsten Loesing wrote: On 8/12/13 10:56 PM, Christian wrote: I've seen that you've included the field parameter to limit the fields that onionoo returns. Do you think it would be better to use the field parameter and show a limited amount of data or try to get

Re: [tor-dev] Globe without search term

2013-08-12 Thread Christian
cified globe/atlas page and can directly show visitors information about an relay/bridge. I don't know if it would be useful for anyone. What's your opinion on that? Cheers, Christian ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Your server has not managed to confirm that its ORPort is reachable

2013-05-18 Thread Christian Kujau
he reachability > test to the wrong place). No, the address printed there was the correct one. Thanks, Christian. [0] http://paste.debian.net/5094/ [1] https://lists.torproject.org/pipermail/tor-talk/2012-February/023363.html -- BOFH excuse #251: Processes r

Re: [tor-dev] Your server has not managed to confirm that its ORPort is reachable

2013-05-17 Thread Christian Kujau
Hm, an hour later it succeeded: May 17 20:40:43.000 [warn] Your server (...:9001) has not managed to confirm that its ORPort is reachable. May 17 21:00:43.000 [warn] Your server (...:9001) has not managed to confirm that its ORPort is reachable. May 17 21:20:43.000 [warn] Your server (...:9001)

[tor-dev] Your server has not managed to confirm that its ORPort is reachable

2013-05-17 Thread Christian Kujau
I'm not sure what "/etc/hosts" should have to do with it, but I haven't modified this either. I'm strace'ing the tor process now to see what it's doing but couldn't find anything suspicious so far. Any thoughts? Christian. -- BOFH excuse #139: UBN

Re: [tor-dev] Compiling tor against OpenSSL_1_0_2-stable

2012-11-28 Thread Christian Kujau
As a late follow-up, for the archives... Nick Mathewson wrote on 9/25/12 09:36: > On Mon, Sep 24, 2012 at 4:13 AM, Christian Kujau > wrote: >> while trying to compile the latest git-checkout against openssl-1.0.2, >> I've come across the following issues: > [...]

Re: [tor-dev] RIAA v Verizon: 404

2012-11-26 Thread Christian Kujau
On Mon, 26 Nov 2012 at 17:40, leez wrote: > The lost document was actually this one: > https://www.eff.org/document/dc-circuit-opinion-granting-verizons-motion-quash > > I've added a redirect from the broken link, so either will get you > there now. Thanks for fixing this!

[tor-dev] RIAA v Verizon: 404

2012-11-26 Thread Christian Kujau
address of this document? Is this perhaps the following: https://www.eff.org/sites/default/files/filenode/RIAA_v_Verizon/20030121-riaa-v-verizon-order.pdf I've cc'ed tor-dev, because the link is included in contrib/tor-exit-notice.html for the Tor exit nodes to present. Thanks, Chri

[tor-dev] [patch] fix cparser/firm compiler warnings

2012-10-14 Thread Christian Grothoff
due to inconsistently declared a return type (once declared as 'enum', once as 'int'). Is there a better place for sending patches that do not really require broad discussion? Happy hacking! Christian diff --git a/src/or/dirserv.c b/src/or/dirserv.c index ec4ecfa..3851043 10

[tor-dev] Compiling tor against OpenSSL_1_0_2-stable

2012-09-24 Thread Christian Kujau
which still ships openssl-0.9.8o and I wanted to get rid of this "use a more recent OpenSSL" message during startup :-) Otherwise, today's git-checkout of tor runs just fine when built against openssl-0.9.8 (on powerpc) - yay! Christian. [0] http://rt.op

[tor-dev] [PATCH] tor-exit-notice.html: shorten Cornell URLs

2012-03-17 Thread Christian Kujau
Hi, these ever so long law.cornell.edu URLs are now automatically redirecting to a shorter version - let's use that in our tor-exit-notice.html as well. Christian. diff --git a/contrib/tor-exit-notice.html b/contrib/tor-exit-notice.html index de3be17..8cf5c29 100644 --- a/contrib/tor

Re: [tor-dev] Tor and DNS

2012-01-30 Thread Christian Grothoff
n library to do so, but even there we never parse DNS queries that did not originate from our own system. In summary, I think begin_dns is a good idea, but I'm not sure you need to then talk TCP to the nameserver -- UDP ought to suffice. My 2 cents Happy hacking! Christian __

Re: [tor-dev] Survey on Tor Trac usage and how you manage your tasks

2011-09-06 Thread Christian Fromme
Hi Karsten, On Tue, Sep 6, 2011 at 10:44 AM, Karsten Loesing wrote: > First of all, thanks to the 13 people for taking part in the survey! Thanks for your effort to make Trac life easier for everyone! > [Suggestion: Backup and delete all reports with a component name in > them.  The current li

Re: [tor-dev] Survey on Tor Trac usage and how you manage your tasks

2011-09-01 Thread Christian Fromme
Hi Karsten, things I didn't answer either don't apply to me for some reason, or I don't use them (if they're Trac fields) or I have nothing to say for other reasons. On Mon, Aug 22, 2011 at 2:29 PM, Karsten Loesing wrote: > 1 Using Trac features > > 1.1 Which of the reports (stored ticket quer