On 09/29/2015 12:19 AM, Jeff Burdges wrote:
> On Mon, 2015-09-28 at 16:26 -0400, Roger Dingledine wrote:
>> On Mon, Sep 28, 2015 at 03:20:47PM +0200, Jeff Burdges wrote:
>>> I proposed that Tor implement NameService rules using UNIX domain
>>> sockets, or ports, since that's how GNUNet works, but m
Dear all,
Following
https://datatracker.ietf.org/doc/draft-grothoff-iesg-special-use-p2p-names/
and the separation of .onion in
https://tools.ietf.org/html/draft-appelbaum-dnsop-onion-tld-01
to satisfy the IETF's desire to have lots of documents, I've now split
off ".exit" as well to create
d
On 05/23/2015 06:26 PM, OnioNS Dev wrote:
> My design also assumes
> that there is no dynamic compromise of Tor routers (there's no
> incentive for an attacker to target Tor routers because of OnioNS)
I can live with explicitly stated design assumptions, but the claim that
there is "no incentive f
On 05/19/2015 07:11 PM, OnioNS Dev wrote:
> On 05/19/2015 03:20 AM, tor-dev-requ...@lists.torproject.org wrote:
>
>> I'm not sure how your proposal significantly improves on NameCoin,
>> except that it is specialized to Tor (and thus doesn't attempt to
>> be as compatible with DNS as Namecoin): fo
Please write an IETF draft asking for ".tor" to be reserved for Tor
under RFC 6761 referencing your documentation. Should take no time if
you base it on Jake's ".onion" draft. Send it to dnsop, they really
love to discuss this topic and alternative DNS protocol ideas right now.
^_^.
Also, GNS is
Hi all,
some of you might remember a project called "Knock", which implements
a variant of port-knocking in the Linux kernel that can be used to
check the authenticity of arbitrary TCP connections and even can do
integrity checking of the TCP payload by using a pre-shared key. Knock
started as a s
Dear all,
Andrey Uzunov's Master's thesis on "Speeding Up Tor with SPDY"
is now available at https://gnunet.org/content/speeding-tor-spdy
My personal conclusions are that SPDY PUSH should not be used with
Tor, and that modest performance gains with SPDY are attainable
for typical websites. Aside
Dear all,
Together with Matthias Wachs and Hellekin Wolf, I'm preparing an IESG
approval request
for the reservation of special-use domain names for P2P networks
according to RFC 6761.
The goal is to reserve .onion, .exit, .i2p, .gnu and .zkey (so that they
don't become
ordinary commercial TLDs at
Hi!
We're trying to compile Tor with cparser and got some warnings and an
error.
src/or/dirserv.c:803:1: error: declaration 'was_router_added_t
dirserv_add_extrainfo(extrainfo_t*, const char**)' is incompatible with
'int dirserv_add_extrainfo(extrainfo_t*, const char**)' (declared at
line 96:12)
On 01/30/2012 07:59 AM, Roger Dingledine wrote:
On Thu, Jan 19, 2012 at 05:13:19PM -0500, Nick Mathewson wrote:
But I think the right design is probably something like allowing
clients to request more DNS info via exit nodes' nameservers, and get
more info back. We should think of ways to do thi
10 matches
Mail list logo