Re: [tor-dev] OnionShare bug that's possibly caused by an upstream v3 onion bug

2018-11-25 Thread Ivan Markin
to confirm that I can reproduce the issue without stem (using bulb) [1]. It seems that the underlying issue should be in little-t-tor and not in stem. Or yes, maybe it's not even a bug (though it seems weird to me). [1] https://github.com/nogoegst/onion-abort-issue -- Ivan Markin __

Re: [tor-dev] generate relay fingerprint without tor given the datadir/keys folder?

2017-02-03 Thread Ivan Markin
DER -RSAPublicKey_out | sha1 On GNU/Linux sha1 is probably sha1sum. Happy hacking -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] generate relay fingerprint without tor given the datadir/keys folder?

2017-02-03 Thread Ivan Markin
-$ go get https://github.com/nogoegst/whatonion +$ go get github.com/nogoegst/whatonion Whoops, sorry. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] generate relay fingerprint without tor given the datadir/keys folder?

2017-02-03 Thread Ivan Markin
/to/secret_onion_key Hope it helps, enjoy! -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] [RFC] Directory structure of prop224 onion services

2017-01-31 Thread Ivan Markin
ive?* It's not a big deal really to parse onion address from a 'hostname' file. Especially for an app that wants to know the protocol version (what for?). Personally I belive that there are no(t so many) apps that would mess with onion services without using an onion-rel

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-31 Thread Ivan Markin
o include examples with correct checksums. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-30 Thread Ivan Markin
0669feec96a146551c87109376f01b07ec065de1daa2b12da5fc2d8b8ae516b23d4a2cbe00edc11c87636c2f3d2129 a7wamxpb3krlclnf7qwyxcxfc2zd2srmxyao3qi4q5rwylz5eeu35xqd -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] [RFC] Directory structure of prop224 onion services

2017-01-30 Thread Ivan Markin
On Tue, Jan 31, 2017 at 09:02:35AM +1100, teor wrote: > How does an application tell the difference between a v2 and v3 > directory? > > What's the supported method, that we will continue to support in > future, regardless of key or algorithm changes? I guess by looking at the address and checkin

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-30 Thread Ivan Markin
ss generation. I guess (?) that it supposed to be SHA3-256 but it definitely should be specified here. I think that it just a typo since there is definition of H() above. Thanks, -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproj

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-23 Thread Ivan Markin
hanging order has no effect (maybe should, like in DER?). As a side effect plain-old-onion-addresses can be encoded here (even with a checksum). I'm not sure whether it's reasonable as it seems to me. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] [Proposal] A simple way to make Tor-Browser-Bundle more portable and secure

2016-10-30 Thread Ivan Markin
ason why dynamic linking has been invented was not to decrease > the general executable sizes or to save memory consumption, or to > speed up the exec() -- but to allow changing code during runtime -- > and that's the real purpose of dynamic linking, we shouldn't forget > that

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-29 Thread Ivan Markin
econds, and why it can't possibly be any worse under any > circumstances. Hmm, okay. I've created this ticket and submitted a patch there. :) I just lost the point of this discussion and what steps should be taken next with this delay. -- Ivan Markin _

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-27 Thread Ivan Markin
Hi tor-dev@, Ivan Markin: > IMO an onion service should publish its first descriptor instantly. If > something happens afterwards and one has to fix the descriptor - deal > with it with backoff/delay to prevent DoS on HSDirs. > I think that most of the ephemeral services are not going

Re: [tor-dev] v2 to v3 onion service transition

2016-09-14 Thread Ivan Markin
sh "alias" v2 descriptors without any intropoints and thus making no v2 service. Thoughts, comments? > ... that only informed power user will be able to understand what the > hell is going on (but that we can maybe fix with good documentation, > blog post and good practices guid

Re: [tor-dev] v2 to v3 onion service transition (was: "old style" hidden services after Prop224)

2016-09-13 Thread Ivan Markin
n't know if such transparent connection thing is secure or not. It seems to be as secure as v2 services. Thoughts? -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-13 Thread Ivan Markin
s not anonymous. * Yes, it does break end-to-end principle and makes the Internet less fault-resistant etc, etc. Anyway, the Internet is already broken. Deal with it. ** It definitely needs a proposal. :) Maybe I missed one? Something like xxx-rsa1024-rend-id-migration.txt. [1] https

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-12 Thread Ivan Markin
hat way someone is going make huge mistake(s). If crypto is bad, just put it into museum. So I don't see _any_ reason to manage outdated and less secure system while we have a better option (if we already deployed it). -- Ivan Markin ___ tor-dev ma

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-12 Thread Ivan Markin
So my two cents is to migrate to prop224 as soon as possible and make everyone secure (RSA1024 and SHA1 are bd). * Maybe just hostnames with variable length? [1] https://trac.torproject.org/projects/tor/ticket/15951 -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-08 Thread Ivan Markin
ervices and I think also for HSs with OnionBalance Same here. Most of the stuff that uses ADD_ONION is meant to setup onion services instantly but has to wait 'until descriptor gets published'. 30s is too much. -- Ivan Markin ___ tor-dev ma

[tor-dev] Reducing initial onion descriptor upload delay (down to 0s?)

2016-09-07 Thread Ivan Markin
I think it's safe to drop it back to at > least 5s (3s?) for all services. Or even remove it at all? The questions are: * Can we drop this delay? Why? * Can we set it back to 5s thus avoiding issues that can arise after removing the delay? * Should we do something now or postpon

Re: [tor-dev] [rfc] Usability Improvements for Atlas

2016-08-02 Thread Ivan Markin
Ivan Markin: > Hi, > > I've also recently improved Atlas but it changes major part of the user > experience. So this is a kind of Request For Comments. > > Most of the changes are my vision of how-it-should-all-look-like. The > most notable changes are: > * There is

Re: [tor-dev] Usability Improvements for Atlas (was Re: Globe is now retired)

2016-07-02 Thread Ivan Markin
on/deploy/atlas-new-design/ -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Improving hidden services on mobile phones

2016-07-01 Thread Ivan Markin
stem based on Onion Services, please have a look at Ricochet [1]. I would be absolutely awesome if someone port/implement/improve it on Android! * The problem with XMPP is that there is a central system (server) to which metadata is exposed in order to work. It's bad. :) [1] https://github.com/rico

Re: [tor-dev] is the consensus document unpredictable / unique?

2016-06-26 Thread Ivan Markin
have a PIN-protected card for this to work. * A bit tricky, I know. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] getting reliable time-period without a clock

2016-06-20 Thread Ivan Markin
ically, I'm currently creating such setup right now. I'm transferring signed digests via UART] [1] https://gitweb.torproject.org/torspec.git/tree/proposals/250-commit-reveal-consensus.txt -- Healthy bulbs, Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] adding smartcard support to Tor

2016-06-03 Thread Ivan Markin
re, but I want to create a small MVP ASAP). Oops, should be fixed now. Thanks for noticing. P.S. Please use direct email for such kind of issues to not to litter the list. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.t

Re: [tor-dev] tor on GNU/Windows

2016-05-28 Thread Ivan Markin
ystem for Linux" or WSL. [1] [1] https://en.wikipedia.org/wiki/Windows_Subsystem_for_Linux -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] adding smartcard support to Tor

2016-05-24 Thread Ivan Markin
an easily modify the applet to have more than two signing keys (keep in mind that there are some card limits). [1] https://subgraph.com/sgos/documentation/smartcards/index.en.html -- Have fun, Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject

Re: [tor-dev] Configuring Single Onion Services

2016-04-11 Thread Ivan Markin
but I think making Single Onion Service > operators compile their own tor is unnecessary. Gosh, it would be really inconvenient and nontransparent. And error-prone. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Configuring Single Onion Services

2016-04-11 Thread Ivan Markin
nymousOnionServiceMode 1" should be enough. It looks pretty clear and simple. [NB: a service cannot be Hidden and NonAnonymous at the same time :) ] -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Is it possible to leak huge load of data over onions?

2016-04-03 Thread Ivan Markin
ising fingerprints, chemical traces, serial number of the hard drive (with proprietary firmware!), place of origin and other 'physical' metadata. It's not "just ciphertext" in a vacuum. -- Ivan Markin ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Is it possible to leak huge load of data over onions?

2016-04-03 Thread Ivan Markin
So at what point the source should stop the transmission (size/time/etc)/change location or the guard/ pick new RP? -- [1] http://panamapapers.sueddeutsche.de/articles/56febff0a1bb8d3c3495adf4/ -- Happy hacking, Ivan Markin ___

[tor-dev] Is it possible to leak huge load of data over onions?

2016-04-03 Thread Ivan Markin
So at what point the source should stop the transmission (size/time/etc)/change location or the guard/ pick new RP? -- [1] http://panamapapers.sueddeutsche.de/articles/56febff0a1bb8d3c3495adf4/ -- Happy hacking, Ivan Markin ___

Re: [tor-dev] adding smartcard support to Tor

2015-10-20 Thread Ivan Markin
> device or app) through usb port through armory to swissbit, > that is never secure. No, I will be secure. An adversary could sniff your PIN and sign whatever they want to, true. But revealing the PIN != revealing the key. In this case your identity key is still safe even if your P

Re: [tor-dev] adding smartcard support to Tor

2015-10-18 Thread Ivan Markin
of frontend and then they can be included into a frontend descriptor. [using OB terminology] [*] Also there is still only RSA crypto in the OB. [1] https://trac.torproject.org/projects/tor/ticket/15951 -- Ivan Markin /"\ \ / ASCII Ribbon Campaign Xagainst HTML email & Micr

Re: [tor-dev] adding smartcard support to Tor

2015-10-18 Thread Ivan Markin
y you're protecting actual content to transmit over the net that is already stored in plaintext. You may regard "onion" keys as "TLS symmetric keys" because they are ephemeral and used "just for one purpose". Keep in mind that these keys are disposable and

Re: [tor-dev] adding smartcard support to Tor

2015-10-17 Thread Ivan Markin
t think that decrypting via SC is necessary. If somebody already knows your backend keys then certainly they know any of your data on this machine. Maybe I missed something. [1] https://gitweb.torproject.org/torspec.git/tree/rend-spec.txt#n63 [2] https://gitweb.torproject.org/torspec.git/tree/r

Re: [tor-dev] adding smartcard support to Tor

2015-10-17 Thread Ivan Markin
y encryption so that it never has to see the private > key used to unlock it. You would still need to trust the VM, but the > encrypted container would allow you to establish a chain of custody. It's OK to unlock some encrypted block device/VM with some 'unpluggable' key. B

Re: [tor-dev] adding smartcard support to Tor

2015-10-17 Thread Ivan Markin
d use > your smartcard/dongle/whatever to unlock the VM. The point is that one can't[*] extract a private key from a smartcard and because of that even if machine is compromised your private key stays safe. [*] Not so easy, but possible. -- Ivan Markin /"\ \ / ASCII Ribbon Ca

Re: [tor-dev] adding smartcard support to Tor

2015-10-17 Thread Ivan Markin
d key there is no need to decrypt anything - they already have an access to the content on your instance. Also backend instances' keys are disposable - you can change them seamlessly. P.S. Notice about bandwidth issue when you're decrypting all of the traffic on a smartcard (half-duplex, e

Re: [tor-dev] adding smartcard support to Tor

2015-10-16 Thread Ivan Markin
at provide readablity will provide security then. I think/hope so. [1] https://github.com/mark-in/onionbalance [2] https://github.com/mark-in/openpgpycard [3] http://sourceforge.net/projects/javacardopenpgp/ [4] https://subgraph.com/sgos/documentation/smartcards/index.en.html Hope it helps. --