Re: [tor-dev] Prop279 and DNS

2017-04-03 Thread Jesse V
On 04/03/2017 05:01 PM, Jeremy Rand wrote: > Maybe this topic has already been brought up, but in case it hasn't, > I'll do so. I notice that Prop279 (onion naming API) defines its own > API rather than using DNS. I guess that this is because of security > concerns about the centralization of the

[tor-dev] The behavior of ClientRejectInternalAddresses

2017-03-26 Thread Jesse V
Hi everyone, I would like some clarification on ClientRejectInternalAddresses. The manual says: > "If true, Tor does not try to fulfill requests to connect to an internal address (like 127.0.0.1 or 192.168.0.1) unless a exit node is specifically requested (for example, via a .exit hostname, or a c

Re: [tor-dev] GSoC 17 | Name System API for Tor Onion Services

2017-03-25 Thread Jesse V
On 03/21/2017 10:54 AM, Pickfire wrote: > I am Ivan Tham. Currently studying in Computer Science in APIIT Malaysia. I am > interested particapate in Google Summer of Code 2017 under tor organization. I > am interested to see Proposal 224 coming along but I would really like to see > [Proposal 272][

Re: [tor-dev] Remaining 4 bits in prop224 addresses

2016-12-06 Thread Jesse V
On 12/06/2016 11:27 AM, David Goulet wrote: > We had little discussion but some of us agree for sure on having bits for the > version number. That will tell a tor client to fetch the right descriptor > instead of trying all version that have the same type of public key (.onion > address). We curren

Re: [tor-dev] Remaining 4 bits in prop224 addresses

2016-12-06 Thread Jesse V
On 12/06/2016 11:24 AM, George Kadianakis wrote: > I'd be interested in both a version field and a checksum to be part of > the encoding of the onion address. I also don't mind extending the > encoding by a character or two if that will make it more useful (there > is little difference between 54 a

[tor-dev] Remaining 4 bits in prop224 addresses

2016-12-06 Thread Jesse V
Hello all, I've been closely following the other Proposal 224 threads regarding the next-generation of onion services. I'm glad to see that we have a timeline and plan for migrating the network. One unresolved point is what to do with the remaining 4 bits in the longer addresses. Section 1.2 in th

Re: [tor-dev] Shor's Algorithm meets Lattices

2016-11-26 Thread Jesse V
On 11/26/2016 07:50 AM, ban...@openmailbox.org wrote: > > While an error in the calculations has been pointed out and the paper > will be withdrawn, this isn't reassuring since a revised version where > this still holds is probable. Where was this discussed or announced? I'm curious what the issu

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Jesse V
On 11/23/2016 07:04 PM, Yawning Angel wrote: > Our fix: "Add another command, that does essentially the same thing, > because people picked the wrong options, then later deal with the > fallout from people getting used to the temporary command, and crying > when it's deprecated." > > I say "they s

Re: [tor-dev] Distributed RNG Research

2016-11-23 Thread Jesse V
On 11/18/2016 10:30 AM, ban...@openmailbox.org wrote: > New research on Distributed RNGs is published: "Scalable Bias-Resistant > Distributed Randomness" > > eprint.iacr.org/2016/1067 Nice! There's also https://eprint.iacr.org/2015/1015.pdf, which shows that you can extract at least 32 bits of en

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread Jesse V
On 11/23/2016 09:39 AM, David Goulet wrote: > I agree with you on the fact that ADD_ONION is nice and also crucial to hidden > service as well. That will be addressed with the control port implementation > of next generation. It's still an undecided part of the engineering work which > is how we ar

Re: [tor-dev] Joining Tor Project's software infrastructure

2016-11-14 Thread Jesse V
On 11/14/2016 07:58 AM, Iain R. Learmonth wrote: > If the software is stable, and reproducibly built, I would aim for placing > it into the Debian archives. I maintain ooniprobe on deb.torproject.org, but > primarily for Ubuntu users and I would prefer that Debian users are using > the version from

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-11 Thread Jesse V
On 10/11/2016 12:53 AM, Jeremy Rand wrote: > It's also worth noting that it's been hard enough to get IETF to accept > .bit (that effort stalled) -- adding a bunch of other TLD's would > probably annoy IETF significantly (and destroy whatever good will exists > at IETF right now), and I fully under

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-08 Thread Jesse V
On 10/08/2016 08:50 AM, 61wxg...@vfemail.net wrote: > How about specifying whether the Namecoin domain should point to .onion > or clearnet in the domain? We can require that TLDs for such service > must end in either: > > o o: The name points to a .onion name. > > o i: The name points to an IP

Re: [tor-dev] Joining Tor Project's software infrastructure

2016-10-04 Thread Jesse V
On 10/04/2016 03:54 PM, George Kadianakis wrote: > Hello Jesse, > > glad to hear you are still working on the OnioNS project, and happy to > hear that the paper got accepted in PoPETS. We have great plans for > hidden service naming layers, and it's great to see more people working > on this topic

Re: [tor-dev] Thesis using QUIC in Tor

2016-09-30 Thread Jesse V
On 09/30/2016 07:02 AM, Ali Clark wrote: > For my master's thesis this summer I looked into the performance impact from > using QUIC instead of TCP/TLS as the relay transport. Results from the > experiments look quite promising. > > For more details and the thesis, please see my blog post: > https

Re: [tor-dev] prop224: Ditching key blinding for shorter onion addresses

2016-09-28 Thread Jesse V
On 09/27/2016 11:15 AM, Jeff Burdges wrote: > There were a couple reasons I stopped the work on integrating > GNS with Tor, which Christian asked me to do : First, I did not like > that users could confirm that a particular subdomain exists if they know > the base domain's public key. Second, I d

Re: [tor-dev] Paper on how DNS affects Tor's anonymity

2016-09-28 Thread Jesse V
On 09/28/2016 11:35 AM, Philipp Winter wrote: > My colleagues and I published a (not yet peer-reviewed) research paper > on how DNS affects Tor's anonymity. The key parts of our work are: > > - We measure the DNS setup of exit relays over time, showing that at > times Google got to see almost 4

Re: [tor-dev] Naming Systems wiki page

2016-09-27 Thread Jesse V
he client will then randomly select address1.onion or address2.onion and will round-robin until one of them connects. It's a very simple scheme. Right now it looks like this: https://github.com/Jesse-V/OnioNS-common/blob/8217c47bce76d87d056f1bab671c44e13f1e9d69/src/records/Record.cpp#L58 Oni

Re: [tor-dev] Naming Systems wiki page

2016-09-27 Thread Jesse V
er criticism so I have removed it. Since you're checking factual accuracy of the items in the wiki, you can find the OnioNS pre-print here: https://github.com/Jesse-V/OnioNS-literature/raw/master/conference/conference.pdf > PS: Happy to see that OnioNS is still being worked on -- I th

Re: [tor-dev] Naming Systems wiki page

2016-09-27 Thread Jesse V
On 09/27/2016 02:39 AM, Jeremy Rand wrote: > Relatedly -- I had some trouble summarizing some of the items in the > Namecoin section because the security, privacy, and scalability > properties of Namecoin are somewhat different depending on whether the > user is using a full node (downloads the ent

[tor-dev] Joining Tor Project's software infrastructure

2016-09-26 Thread Jesse V
roper release, my overall goal is to improve the maturity, trust, usability of the OnioNS software. Please let me know how I can accomplish the above tasks. Recent commits: https://github.com/Jesse-V/OnioNS-common/tree/json-rpc https://github.com/Jesse-V/OnioNS-server/tree/json-rpc https://github.

Re: [tor-dev] How to query HS hostname from control port

2016-09-09 Thread Jesse V
On 09/09/2016 10:15 PM, dawuud wrote: > right. it shouldn't be necessary at all to modify the torrc... for most > features. You need to modify the torrc in order to enable the ControlPort. https://github.com/Jesse-V/OnioNS-server/tree/json-rpc#setup >> > and an authenticatio

Re: [tor-dev] Hmac

2016-09-09 Thread Jesse V
her resources on it. I would start with the Wikipedia article on HMAC and go from there. If you really want to dig into the topic, look into Argon2. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torp

Re: [tor-dev] How to query HS hostname from control port

2016-09-09 Thread Jesse V
tion is improved because it separates responsibility. In Linux, the tor binary runs under a separate user and sets up permissions to protect sensitive data. My OnioNS software can run as a separate user as well. This way, data is isolated to its respective software and I'm not mixing everythin

[tor-dev] Dirauth setting for PathsNeededToBuildCircuits

2016-09-08 Thread Jesse V
documented in tor-spec, and I don't see much about it online, but maybe I missed something. What is the typical value? I see that 0.95 is the cutoff, but how high will prevent a client from bootstrapping? -- Jesse V signature.asc Description: OpenPGP digital signature

Re: [tor-dev] How to query HS hostname from control port

2016-09-08 Thread Jesse V
ned RSA private key. It's easy enough to add that same key back into Tor whenever I want. There are several main advantages with this route, including isolating my software's data from Tor's and requiring fewer modifications to torrc. It just seems cleaner in general. -- Jesse

Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread Jesse V
ubmit a patch as they have a tool for that. Otherwise, I am not certain how they accept git patches. Per convention, please reply below the original message instead of above it. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-

Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread Jesse V
sider enabling the "Block all unencrypted requests" option, but then don't be surprised when your favorite news site no longer loads. The situation is really improving thanks to Let's Encrypt. :) -- Jesse V signature.asc Description: OpenPGP digital signature _

Re: [tor-dev] How to query HS hostname from control port

2016-09-05 Thread Jesse V
ecure manner and they can each run as a separate user. > (p.s. I can't reach http://onions55e7yam27n.onion/) Nothing is online at the moment. I'll make a separate post once everything is ready. -- Jesse V signature.asc Description: OpenPGP digital signature ___

Re: [tor-dev] How to query HS hostname from control port

2016-09-04 Thread Jesse V
r software needs to know the HS address so that it can distribute it to other nodes in the OnioNS network. My to-do list is quickly diminishing but I did run into this snag and I wasn't able to fix it. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] How to query HS hostname from control port

2016-09-04 Thread Jesse V
pect that the option is under GETINFO instead. However, the documentation mostly describes how to query information about other onion services. I need to know about my service though, if that's possible. Please advise. -- Jesse V I look forward to seeing everyone again in July at Minneapolis

Re: [tor-dev] How to integrate an external name resolver into Tor

2016-08-03 Thread Jesse V
G) or whatever else the resolver says. Tim, to answer your question, here is my Python script that does the circuit interception and lookup rewrite: https://github.com/Jesse-V/OnioNS-client/blob/master/src/assets/onions-stem.py The network is down so the code won't fully run, but I'm pos

Re: [tor-dev] Is it possible to leak huge load of data over onions?

2016-04-04 Thread Jesse V
could encrypt it with LUKS/dmcrypt, then send a SHA-256 sum and the decryption key over SecureDrop. https://what-if.xkcd.com/31/ -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.tor

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-04-03 Thread Jesse V
16/229 and the full paper can be found here: https://eprint.iacr.org/2016/229.pdf -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-04-03 Thread Jesse V
wasn't able to confirm where the ~200ms number came from. Thanks for throwing out specific numbers on Ring-LWE, I wasn't aware that it was so fast. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-de

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-04-02 Thread Jesse V
ably fast, it uses the smallest bandwidth, and it offers perfect forward secrecy. It seems to me that SIDH actually has more potential for making it into Tor than any other post-quantum cryptosystem. -- Jesse V signature.asc Description: OpenPGP digital signature ___

Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)

2016-01-11 Thread Jesse V
f a traffic analysis setup, who knows. As have probably concluded from your table, Tor directory authorities allow up to two Tor nodes per IP address. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@

Re: [tor-dev] Summary of meek's costs, December 2015

2016-01-11 Thread Jesse V
stance? I'm just thinking about the implications if there were donations for meek. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Summary of meek's costs, December 2015

2016-01-11 Thread Jesse V
m inside a censored country, it's possible that users try the various bridge options using the built-in bridges (which are likely blocked) before discovering that meek works, so they use that. I wonder how we could encourage users to use other transports that are likely faster, then use meek as a l

Re: [tor-dev] Summary of meek's costs, December 2015

2016-01-11 Thread Jesse V
m inside a censored country, it's possible that users try the various bridge options using the built-in bridges (which are likely blocked) before discovering that meek works, so they use that. I wonder how we could encourage users to use other transports that are likely faster, then use meek as a l

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Jesse V
f the respective post-quantum cryptosystem. That being said, I'd like to thank Schanck, Whyte, and Zhang for their work, their paper, and their reference implementation. -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Jesse V
ost-quantum cryptography, and I'm sure most of the authors like to provide a reference implementation of their idea. For next time, please bottom-post and be sure to replace the subject line to reflect the thread's name. You only have to replace the subject line if you receive posts in a dige

Re: [tor-dev] IDE for Tor?

2015-12-15 Thread Jesse V
__ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > -- Jesse V signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] running a BWauth

2015-11-03 Thread Jesse V
aining disk space. I don't know if I missed a cleanup step somewhere or if the issue was fixed since then, but it's something to be aware of. -- Jesse V. On 11/03/2015 07:29 PM, Tom Ritter wrote: > A 10GB network connection is not a requirement, 1GB would be fine, > 500MB would al

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-28 Thread Jesse V
the majority requirement as that is the assumption made during consensus generation, but I think your argument for the new conflict resolution make sense. I'm excited that the implementation is nearly complete and I look forward to seeing it in Tor infrastructure! Jesse V. On 10/28/2015 10:26 AM,

Re: [tor-dev] Second release of OnioNS beta

2015-09-30 Thread Jesse V
ent | grep RPATH RPATH/usr/lib/onions-common $ I'm pretty sure that the issue affected all flavours of Linux, so I pushed out a quick update to the PPA and to Github. Hopefully it shouldn't be a problem anymore. Jesse V. On 09/30/2015 05:25 PM, Jesse V wrote: > Af

Re: [tor-dev] Second release of OnioNS beta

2015-09-30 Thread Jesse V
sure. The issue doesn't occur on my computer, but if it also applies to Ubuntu or Mint, please let me know. It's always possible to compile from source and run the software from the build directory, but I would really like to identify the scope of this issue and then properly fix it.

[tor-dev] Second release of OnioNS beta

2015-09-29 Thread Jesse V
r" is live and new registrations should be available client-side about 20 seconds after upload. As usual, the code, pre-built binaries, and instructions are available in the four OnioNS repositories at https://github.com/Jesse-V?tab=repositories Please star them if they work well for you. M

[tor-dev] 7th and last status report for OnioNS

2015-08-28 Thread Jesse V
ware over there, please talk to me about that. * I have full intentions of continuing to maintain the OnioNS project. Please keep an eye on https://github.com/Jesse-V?tab=repositories and I will post here when I push out releases. I'm very close to the next beta test. * Once the OnioNS softw

[tor-dev] 6th status report for OnioNS

2015-08-20 Thread Jesse V
the offline identity key. As we come closer to the end of the Summer of Privacy timeline, I'm going to concentrate on addressing the bugs that s7r identified, finish implementing some security protocol, and try to move to a fully decentralized setup. Jesse V. signature.asc Descript

Re: [tor-dev] Hash Visualizations to Protect Against Onion Phishing

2015-08-20 Thread Jesse V
> Jacek Wielemborek writes: > >> George Kadianakis pisze: >>> Some real UX research needs to be done here, before we decide something >>> terrible. >> >> Just curious, has anybody seen any cognitive studies on the SSH >> randomart visualisation? I always found them impossible to remember. >> Per

Re: [tor-dev] First release of OnioNS for beta testing

2015-08-10 Thread Jesse V
tem script, thus this approach is fully compatible with Tor bridges. Jesse V. > Subject: > Re: [tor-dev] First release of OnioNS for beta testing > From: > Xinwen Fu > Date: > 08/08/2015 04:25 AM > > To: > "tor-dev@lists.torproject.org" > > > Fantas

[tor-dev] First release of OnioNS for beta testing

2015-08-07 Thread Jesse V
d ARM systems. If possible, please use the repository. Please see the READMEs in the following repositories for more information, including installation, initialization, and configuration procedures. Manpages are also included for your convenience. https://github.com/Jesse-V/OnioNS-common

[tor-dev] 5th status report for OnioNS

2015-08-03 Thread Jesse V
tten commit-reveal-consensus proposal. As he stated in his introduction, I certainly need that in order to integrate OnioNS with the Tor network. Jesse V. signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torpro

[tor-dev] 4th status report for OnioNS

2015-07-17 Thread Jesse V
from launching automatically with the Tor Browser. (George, this bug was why I had to launch Stem manually when I showed the software to you.) The error thrown for this bug was large and unhelpful, but the fix was amusingly simple: https://github.com/Jesse-V/OnioNS-client/commit

[tor-dev] 3rd status report for OnioNS

2015-07-09 Thread Jesse V
prototype that everyone can beta test. The packaging and integration into the Tor Browser should make this very straightforward, but I need to have all the configurations in place and a few more bugs worked out before then. Jesse V. -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22