Re: [tor-dev] txtorcon 0.15.1

2016-08-15 Thread David Stainton
oh no! does that mean txtorcon will eventually be removed from debian? On Mon, Aug 15, 2016 at 9:28 AM, Iain R. Learmonth wrote: > On Fri, Aug 12, 2016 at 10:21:41PM +0400, meejah wrote: >> "Iain R. Learmonth" writes: >> >> > Will get this packaged over the weekend. (: >> >> Sweet :) > > Got dis

Re: [tor-dev] Is it possible to specify voluntary delays in my Tor client?

2016-01-20 Thread David Stainton
The Differences Between Onion Routing and Mix Networks https://ritter.vg/blog-mix_and_onion_networks.html On Wed, Jan 20, 2016 at 5:42 AM, Virgil Griffith wrote: > I understand that the original Tor model is to set low-latency and > low-jitter as a constraint as to permit things like interactiv

[tor-dev] tor control port filtration with a series of tubes

2015-12-09 Thread David Stainton
or-ctl-sieve - granular bidirectional control port filtration https://github.com/david415/or-ctl-sieve or-ctl-sieve does what it says on the tin and comes with a handy config file that we use with arm (tor-arm): https://github.com/david415/or-ctl-sieve/blob/master/tor-arm-filter.json I wrote t

[tor-dev] onion moshing

2015-12-09 Thread David Stainton
I was inspired by onioncat to write a twisted python implementation. Onionvpn doesn't have as many features as onioncat. I've successfully tested that onionvpn and onioncat can talk to each other and play nice. Both onionvpn and onioncat implement a virtual public network. Anyone can send packe

Re: [tor-dev] A layered transport

2015-10-26 Thread David Stainton
wait... what? What is this front tier? Why would we want to use cryptographic protocols for bridges that violate the end to end principal? On Mon, Oct 26, 2015 at 8:44 AM, Da Feng wrote: > Hi: >I've discovered that the GFW normally doesn't block https > protocols. We can use a https front ti

Re: [tor-dev] Onion Services and NAT Punching

2015-09-30 Thread David Stainton
Hi All, Hi Tim! > Do you know a use case which needs Single Onion Services and NAT punching? chyaa! NAT has ruined the Internet, violates the end to end principal and make it more difficult to develop decentralized systems. *deep sigh*... Obviously, centralized systems design contributes to human

Re: [tor-dev] Partitioning Attacks on Prop250 (Re: Draft Proposal: Random Number Generation During Tor Voting)

2015-09-09 Thread David Stainton
Yes and if we see more than 1 commitment value from the same authority then it makes sense to revote with the remaining n-1 directory authorities so that the attacker doesn't get a choice of the 9 vote result versus the 8 vote result... but instead the attacker can chose between the 9 vote result a

Re: [tor-dev] [Twisted-Python] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy

2015-08-13 Thread David Stainton
Dear Aaon Gallagher, Thanks for the helpful observation. i'm going to make the correction soon and then we'll be underscore free. On Wed, Aug 12, 2015 at 7:06 AM, Aaron Gallagher <_...@habnab.it> wrote: > David Stainton writes: > >> If I get rid of this last terrible

[tor-dev] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy

2015-08-11 Thread David Stainton
Sincerely, David Stainton ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-23 Thread David Stainton
> Why are we avoiding allowing users to make this choice because of the > above reasons? If a user wants to run a relay or a bridge, we should > make it easy. We don't answer the above questions when it is hard - > are we really off the hook there? It just seems ridiculous. Obviously NAT has destr

Re: [tor-dev] Tor + Apache Traffic Server w/ SOCKS - works now!

2015-05-05 Thread David Stainton
i don't see any benefit from running yet another c program on my computer... why not run something like Yawning's or-ctl-filter between your tor and tbb? at least it's written in a safer language and does useful things like filter OR commands: https://github.com/Yawning/or-ctl-filter anyone who k

Re: [tor-dev] Should popularity-hiding be a security property of hidden services?

2015-04-03 Thread David Stainton
Hi George, I read your post. I am a hidden service operator... and I feel strongly that hiding popularity is in fact an anonymity property... and security property. I also wonder if it's even possible to fully hide popularity. I suggest we try to hide popularity at least until we understand more a

Re: [tor-dev] Performance and Security Improvements for Tor: A Survey

2015-03-13 Thread David Stainton
Dear Ian, Thanks for publishing this! I am now a huge fan of your work... This is excellent! Cheers, David On Fri, Mar 13, 2015 at 4:25 PM, Paul Syverson wrote: > Only glanced through it, but it looks amazingly comprehensive for a 32 > page paper (plus references). I haven't read it yet, but

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-28 Thread David Stainton
> > FWIW this is already how Debian (and presumably other distros') tor packages > work: tor runs as a dedicated user. Already it is possible to grant other > users > access to the control port (from which they can already create and remove > hidden services). The reason why HS applications that c

Re: [tor-dev] Using Traceroute for AS-Path prediction

2015-02-26 Thread David Stainton
ntation or reading their paper: http://research.cs.washington.edu/networking/astronomy/reverse-traceroute.html Sincerely, David Stainton On Thu, Feb 26, 2015 at 4:33 PM, Simon Koch wrote: > I am a student at the saarland university and currently workin on my > bachelor thesis concerning AS

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread David Stainton
> As an app developer this strikes me as the right approach. But having > said that, I wouldn't actually need this feature because Briar already > uses __OwningControllerProcess to shut down Tor if the control > connection is closed. I imagine the same would apply to any app that > manages its own

Re: [tor-dev] [ooni-dev] Let's come up with the roadmap for the future of OONI

2015-02-10 Thread David Stainton
n used for targeted surveillance by various groups around the world... and they are even selling ready made devices that automate these attacks. Would Tor Project/OONI be interested in helping to raise awareness of these issues? Sincerely, David Stainton On Tue, Feb 10, 2015 at 2:50 PM, Arturo

Re: [tor-dev] Stormy - request for feedback

2014-11-28 Thread David Stainton
>> So I am thinking that an other way to do it could be to write a few >> ansible modules (or modules for your favorite configuration management >> tool) for the various tasks currently done by the script (installing >> nginx, installing a blog software, setup a hidden service, configure >> the fir

Re: [tor-dev] How to distribute Tor with other software

2014-11-20 Thread David Stainton
Greetings, olde thread resurrection: Earlier Meejah pointed out that the tor control port can be used to create tor hidden services. Now that tor trac ticket #11291 (https://trac.torproject.org/projects/tor/ticket/11291) is resolved this will actually be usable? There are deployment issues

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-28 Thread David Stainton
correction... I meant #11291. On Wed, Oct 29, 2014 at 1:04 AM, David Stainton wrote: > Any Twisted application written in a network endpoint agnostic manner > may be used with the txtorcon hidden service endpoint... > For instance serving files from a Tor hidden service can be

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-28 Thread David Stainton
Any Twisted application written in a network endpoint agnostic manner may be used with the txtorcon hidden service endpoint... For instance serving files from a Tor hidden service can be done with Meejah's one-liner: pip install txtorcon && twistd -n web --port "onion:80" --path ~/public_html Howe

Re: [tor-dev] DNSSEC

2014-09-01 Thread David Stainton
Dear merc1...@f-m.fm, Is DNSSEC is not evil? To me it seems like the 1984 of domain name systems... Please take a good look at the political implications of DNSSEC. I personally do not understand why this Tor Project spec includes mention of DNSSEC: https://gitweb.torproject.org/torspec.git/blob

Re: [tor-dev] Revised Relay Descriptor Fields proposal

2014-07-04 Thread David Stainton
y capitalist bitcoin profiteering agenda. """ Sincerely, David Stainton On Fri, Jul 04, 2014 at 10:22:59AM +0200, Virgil Griffith wrote: > Filename: ExtraRelayDescriptorFields.txt > Title: Adding new X- fields to relay descriptor > Author: Virgil Griffith, Nick Mathewson &g

Re: [tor-dev] Proposal for improving social incentives for relay operators

2014-06-11 Thread David Stainton
The "torcoin" idea is SUSPICIOUS (and makes me think of a thousand conspiracy theories). What is "torcoin"? How can I most effectively and systematically completely destroy this idea? The good news is that we don't need it, it's not endorsed by the Tor Project... and it'll never work. The non-finan

Re: [tor-dev] RFC: obfs4 (Name not final)

2014-05-21 Thread David Stainton
> obfs4 is ScrambleSuit with djb crypto. Instead of obfs3 style > UniformDH and CTR-AES256/HMAC-SHA256, obfs4 uses a combination of > Curve25519, Elligator2, HMAC-SHA256, XSalsa20/Poly1305 and > SipHash-2-4. Elligator... cool! > * Development was done with go1.2.x, older versions of the

Re: [tor-dev] How to distribute Tor with other software

2014-05-21 Thread David Stainton
> You could use one of the controller libraries (stem if you want > synchronous, txtorcon if async/Twisted) to do this; they don't have to > modify the torrc directly, just manipulate configuration via GETCONF and > SETCONF. For Tails, this probably won't work unless you're root until > #11291 is f

[tor-dev] Cute Otter == Tahoe-LAFS + Tor?

2014-05-15 Thread David Stainton
Hi, What is going on with that cute otter hidden service publishing project? What do people think about having it use the Tahoe-LAFS Onion Grid and lafs-rpg instead of telling users to run their own webservers? Tahoe-LAFS could help to greatly increase the security and censorship resistance of the

Re: [tor-dev] obfsproxy dns transport

2014-02-23 Thread David Stainton
We technically don't need to use a tun device for the dns transport... but if a tun device is used for the tor dns transport then we get the reliability layer without having to write it ourselves. It doesn't matter that tun devices are lossy and udp is unreliable; we just spray packets. Obfspro

Re: [tor-dev] obfsproxy dns transport

2014-02-23 Thread David Stainton
Hello David and George and other people who are interested in there being even more obfuscation transports for tor, I appreciate the thought of making a frankenstein butchering of obfsproxy code which transports tor over dns... and speaks socks and tor control port... and works to PT spec... bu

Re: [tor-dev] obfsproxy dns transport

2014-02-22 Thread David Stainton
I was thinking that a generalized mechanism for using vpns as obfsproxy transports would help solve for a dns transport... since a dns transport is going to use a tun device. Perhaps obfsproxy/network/launch_transport.py can be changed so that it has a vpn role... where it sets up the tun device an

Re: [tor-dev] Future pluggable/lib obfus transport?

2014-02-20 Thread David Stainton
I don't understand the question. Obfsproxy can be used in external mode or with tor in managed mode. In external mode it can be used to obfuscate other types of traffic like ssh etc. There is no automatic negotiation of obfuscation PTs. On Thu, Feb 20, 2014 at 2:51 AM, grarpamp wrote: >> The sho

Re: [tor-dev] Coordination of censorship analysis tool

2014-02-08 Thread David Stainton
Greetings! I am very interested in helping out with this project in my free time (in addition to the other Tor related projects that I am already trying to work on in my free time)... I am already somewhat familiar with Twisted and the OONI api: I'm currently working on a NFQueue traceroute test f

Re: [tor-dev] Am I looking at the right spec for pluggable transports?

2014-01-29 Thread David Stainton
I think a good place to start would be to use the obfsproxy python api... but of course you could create a PT without this api. Here the unofficial tor PT wiki page: https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports Here you can look at example code of various PTs. Some use th

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread David Stainton
Yeah I guess if the PT doesn't draw attention and the bridge IP is not known then one's Tor traffic may be somewhat obscured. What about bananaphone? Do you mean the bananaphone PT? It is trivially detectable... more so than say... a transport like obfs3 who's output looks like pseudo random noise

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread David Stainton
In that case would it then look like zero in $(organizational unit of harvard) using tor and one in $(organizational unit of harvard) using scramble suit? I like the idea of the tor pluggable transport combiner... wherein we could wrap a pseudo-random appearing obfuscation protocol (such as obfs3,

Re: [tor-dev] Slight obfsproxy API change (#10342)

2013-12-12 Thread David Stainton
Excellent! I was thinking of making this change but lately I haven't had much time. Merging that patch specified in the 1st ticket comment? That looks good. I'd be happy to update the bananaphone transport to use the new api! Cheers, David On Wed, Dec 11, 2013 at 10:33 PM, George Kadianakis w

Re: [tor-dev] bananaphone obfsproxy module

2013-11-25 Thread David Stainton
be used to register managed-mode cli arg parser... which populates class attributes of the transport. What do you think? David On Thu, Nov 14, 2013 at 1:23 PM, George Kadianakis wrote: > David Stainton writes: > >> Yeah obfs2 works perfectly... in managed mode passing the shared

Re: [tor-dev] obfsproxy buffering

2013-11-18 Thread David Stainton
yeah... you are right! Thanks for the clarification. I've been meaning to read the Stegotorus paper soon. Cheers! David On Mon, Nov 18, 2013 at 9:24 AM, Zack Weinberg wrote: > On Mon, Nov 18, 2013 at 10:47 AM, David Stainton > wrote: >>> Super-simple framing protocols

Re: [tor-dev] obfsproxy buffering

2013-11-18 Thread David Stainton
>> It seems like the solution is to write a super simple "framing >> protocol"... which is to say that I can first send a frame length; and >> on the receiving end simply read until frame length worth of data is >> consumed... and then apply the crypto_stream cipher on that frame with >> the correc

Re: [tor-dev] obfsproxy buffering

2013-11-18 Thread David Stainton
> Super-simple framing protocols often fall victim to attacks in which the > adversary messes with the length in the frame header. See, for example, > "Plaintext Recovery Attacks Against SSH": > http://www.isg.rhul.ac.uk/~kp/SandPfinal.pdf > > So be careful here. > >- Ian Over Tor it won't be

[tor-dev] obfsproxy buffering

2013-11-17 Thread David Stainton
Hi, I noticed that because the obfsproxy api can sometimes buffer and resend smaller chunks of data. My simple use of Nacl stream_crypto to wrap each incoming data buffers will not work... that is because the client and server must keep synchronized nonce counters for the decrypt/encrypt to work..

Re: [tor-dev] bananaphone obfsproxy module

2013-11-14 Thread David Stainton
bananaphone and that works now that I fixed the BananaphoneTransport setup method. Onward! David On Thu, Nov 14, 2013 at 1:12 AM, George Kadianakis wrote: > David Stainton writes: > >> OK I tested obfsproxy obfs2 in managed mode with tor and it works... >> But I guess that do

Re: [tor-dev] bananaphone obfsproxy module

2013-11-13 Thread David Stainton
On Wed, Nov 13, 2013 at 7:39 AM, George Kadianakis wrote: > David Stainton writes: > >>> Please do it in your bananaphone branch if that's more convenient to >>> you. >>> >>> (If you want to be more adventurous, you can even make a new branch on >>

Re: [tor-dev] bananaphone obfsproxy module

2013-11-11 Thread David Stainton
> Please do it in your bananaphone branch if that's more convenient to > you. > > (If you want to be more adventurous, you can even make a new branch on > top of the current upstream master with your setup() function and the > obfs2 changes. I will merge that faster than the bananaphone changes.)

Re: [tor-dev] bananaphone obfsproxy module

2013-11-11 Thread David Stainton
> Looks fine! > > BTW, does it work for you? Did you try the server-side using the > ServerTransportOptions torrc option (tor >= 0.2.5.1-alpha)? I have only tested it using the external mode. I've gotten obfsproxy + bananaphone to run with tor in managed mode; using the ServerTransportOptions...

Re: [tor-dev] bananaphone obfsproxy module

2013-11-10 Thread David Stainton
nakis wrote: > David Stainton writes: > >> Hi, >> >> Yeah... I should add a doc string to the BaseTransport __init__ >> explaining that it runs upon connect. >> >> OK yesterday I implemented transport class method called setup()... >> The Bananap

Re: [tor-dev] bananaphone obfsproxy module

2013-11-07 Thread David Stainton
yeah that's perfect. I'll do that. On Thu, Nov 7, 2013 at 4:35 AM, George Kadianakis wrote: It wouldn't surprise me if the obfsproxy API is suboptimal or broken in some ways. If you find a problem, please let me know. >> >> I need a way for the BananaphoneTransport to build the markov m

Re: [tor-dev] bananaphone obfsproxy module

2013-11-06 Thread David Stainton
>> It wouldn't surprise me if the obfsproxy API is suboptimal or broken >> in some ways. If you find a problem, please let me know. I need a way for the BananaphoneTransport to build the markov model before the initial client connect... but right now it looks like __init__ is called upon connect.

Re: [tor-dev] bananaphone obfsproxy module

2013-10-31 Thread David Stainton
st=x.x.x.x:80 client 127.0.0.1:8022 Produces output at a 1:2. Cheers, David On Tue, Oct 29, 2013 at 10:48 PM, David Stainton wrote: > Howdy, > > Thanks. Your obfsproxy is a nice piece of work. > > Bananaphone + Obfs2 sounds cool! > Modular transport chains make a lot of sense..

Re: [tor-dev] bananaphone obfsproxy module

2013-10-29 Thread David Stainton
Howdy, Thanks. Your obfsproxy is a nice piece of work. Bananaphone + Obfs2 sounds cool! Modular transport chains make a lot of sense... I like modular transports... recently for fun I wrote a VPN in Python Twisted [https://github.com/david415/hushVPN] using twisted consumers and producers. My ide