Re: [tor-dev] fteproxy depends on obfsproxy...

2015-09-09 Thread Kevin P Dyer
I think we should (1) make pyptlib easier to use but (2) wait until the new PT spec. is settled upon. Let's pick this back up when the spec. is complete. -Kevin On Tue, Sep 8, 2015 at 5:56 PM, isis wrote: > George Kadianakis transcribed 1.4K bytes: > > Kevin P Dyer writes: &g

Re: [tor-dev] fteproxy depends on obfsproxy...

2015-09-07 Thread Kevin P Dyer
The background: I've been trying to get the fteproxy package into debian. In the code review process, the dependency on obfsproxy was flagged as a not-so-great thing. I agree, and was hoping there's an easy solution... -Kevin On Mon, Sep 7, 2015 at 5:03 PM, Kevin P Dyer wrote:

Re: [tor-dev] fteproxy depends on obfsproxy...

2015-09-07 Thread Kevin P Dyer
Response inline. On Mon, Sep 7, 2015 at 3:29 PM, Yawning Angel wrote: > On Mon, 7 Sep 2015 14:37:07 -0700 > Kevin P Dyer wrote: > > > ...and it shouldn't. > > > > Fortunately, the dependency is isolated to a single file. See [1]. > > > > My un

[tor-dev] fteproxy depends on obfsproxy...

2015-09-07 Thread Kevin P Dyer
...and it shouldn't. Fortunately, the dependency is isolated to a single file. See [1]. My understanding is that pyptlib [2] is no longer maintained. wiley/asn/etc. - What's the proper way to remove this dependency, but make it easy for fteproxy to be a PT? -Kevin [1] https://github.com/kpdyer

Re: [tor-dev] "Seeing through Network-Protocol Obfuscation"

2015-08-22 Thread Kevin P Dyer
On Sat, Aug 22, 2015 at 12:43 AM, Yawning Angel wrote: > On Fri, 21 Aug 2015 17:51:20 -0700 > Kevin P Dyer wrote: > > > On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel > > wrote: > > > > > [snip] > > > > > > The FTE semantic attack they pr

Re: [tor-dev] "Seeing through Network-Protocol Obfuscation"

2015-08-21 Thread Kevin P Dyer
On Wed, Aug 19, 2015 at 11:58 AM, Yawning Angel wrote: > [snip] > > The FTE semantic attack they presented isn't the easiest one I know of > (the GET request as defined by the regex is pathologically malformed). > Very interesting! This is news to me. I'm assuming I did something silly. (Even th

Re: [tor-dev] "Seeing through Network-Protocol Obfuscation"

2015-08-21 Thread Kevin P Dyer
Hey Philipp! Thanks for the interest! I'm one of the authors on the paper. My response is inline. On Wednesday, August 19, 2015, Philipp Winter wrote: > > > > They claim that they are able to detect obfs3, obfs4, FTE, and meek > usin

Re: [tor-dev] Tor Project proposal for GSoC 2015

2015-03-08 Thread Kevin P Dyer
Hi Juro, Thanks for your interest in working on fteproxy this summer! Unfortunately, as Fred highlighted [1], Tor won't be a host organization this year. I'll send you an email directly. We'll figure something out. -Kevin [1] https://lists.torproject.org/pipermail/tor-dev/2015-March/008359.html

Re: [tor-dev] Bridge users by transport is broken

2015-01-12 Thread Kevin P Dyer
---BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 29/12/14 19:57, Karsten Loesing wrote: > > On 29/12/14 19:02, Kevin P Dyer wrote: > >> The "Bridge users by transport" [1] graph on > >> metrics.torproject.org abruptly stops at Dec. 12 for all > &g

[tor-dev] Bridge users by transport is broken

2014-12-29 Thread Kevin P Dyer
The "Bridge users by transport" [1] graph on metrics.torproject.org abruptly stops at Dec. 12 for all transports. Has anyone had an opportunity to troubleshoot this issue? -Kevin [1] https://metrics.torproject.org/userstats-bridge-transport.html?graph=userstats-bridge-transport&start=2014-12-01&

Re: [tor-dev] Gitian Build Issue - Tor Browser

2014-09-17 Thread Kevin P Dyer
Hi SiNA, Can you provide the last few lines of output from var/build.log? -Kevin On Wed, Sep 17, 2014 at 8:03 PM, SiNA Rabbani wrote: > Dear Team, > > I need some help getting gitian-build to work for the Tor Browser. Can > anyone help with this error please? > > ./mkbundle-windows.sh > addi

Re: [tor-dev] Temporary decrease in FTE users in late August?

2014-09-17 Thread Kevin P Dyer
Hi David, I don't believe it has anything to do with bridges being blocked. Here's what I know: There was a few days downtime at the end of August for the first-listed FTE bridge in the Tor Browser. However, not all FTE bridges listed in the Tor Browser were down at that time. It should have been

Re: [tor-dev] (meek|flashproxy)+(obfs3|fte|scramblesuit|...)

2014-07-26 Thread Kevin P Dyer
On Sat, Jul 26, 2014 at 5:30 PM, David Fifield wrote: > On Sat, Jul 26, 2014 at 03:08:38PM +0100, Kevin P Dyer wrote: > > Are there any roadblocks that prevent us from doing the following? > > > > 1. Remove the hard-coded bridge_prefs.js in the TBB. > > 2. Set me

[tor-dev] (meek|flashproxy)+(obfs3|fte|scramblesuit|...)

2014-07-26 Thread Kevin P Dyer
Are there any roadblocks that prevent us from doing the following? 1. Remove the hard-coded bridge_prefs.js in the TBB. 2. Set meek as the default pluggable transport in the TBB. 3. Use meek to acquire an up-to-date bridge_prefs.js from, say, torproject.org. 4. Use the information from the acquire

Re: [tor-dev] What little-t-tor bridge features/issues we should address?

2014-07-14 Thread Kevin P Dyer
I would like to be able to bind to privileged ports when running a PT-enabled bridge in managed mode --- will any changes to little-t-tor be required for this feature? -Kevin On Fri, Jul 11, 2014 at 9:51 AM, George Kadianakis wrote: > Hello Roger and Nick, > > as far as I know, bridge support

Re: [tor-dev] wfpadtools: comments about primitives

2014-05-30 Thread Kevin P Dyer
Hi Marc, Thanks for doing this work, I'm excited to see what you learn this summer. However, I'm a bit confused by statements like: "The idea is to implement a set of primitives that any link padding-based defense would benefit [from]." Can you provide a high-level diagram that explains where yo

[tor-dev] fteproxy 0.2.14 released (resolves ticket #11629)

2014-05-10 Thread Kevin P Dyer
Hi George, I've released version 0.2.14 of fteproxy [1], with corresponding changes [2] to the Tor Browser. This release addresses ticket #11629 [3], thanks to Yawning's patch [6]. My changes [2] to the tor-browser-bundle include the following: - Updated fteproxy to 0.2.14 - Updated obfsproxy to

Re: [tor-dev] Version bump of obfsproxy to 0.2.8 in TB breaks FTE

2014-04-28 Thread Kevin P Dyer
On Mon, Apr 28, 2014 at 11:06 AM, George Kadianakis wrote: > Kevin P Dyer writes: > > > Hi Mike, > > > > It looks like [1] broke FTE [2]. > > > > Can you hold off on pushing any releases public, until we resolve #11629? > > > > George - Can we re

[tor-dev] Version bump of obfsproxy to 0.2.8 in TB breaks FTE

2014-04-28 Thread Kevin P Dyer
Hi Mike, It looks like [1] broke FTE [2]. Can you hold off on pushing any releases public, until we resolve #11629? George - Can we revert obfsproxy back to 0.2.4, to give me time to sort this out? -Kevin [1] https://gitweb.torproject.org/builders/tor-browser-bundle.git/commit/ce30cd3a38621893

Re: [tor-dev] GoSC - Website Fingerprinting project

2014-03-18 Thread Kevin P Dyer
On Tue, Mar 18, 2014 at 7:30 PM, Mike Perry wrote: > [snip] > Related: Do you happen to have any existing classifier code working > already, by any chance? > If It helps, the code [2] from our website fingerprinting paper [1] is public. It includes the edit-distance classifier [3] from [4], which

Re: [tor-dev] Release Candidate: TBB 3.6 + fteproxy 0.2.6

2014-02-13 Thread Kevin P Dyer
n Tue, Feb 04, 2014 at 10:49:59AM -0600, Kevin P Dyer wrote: > > Please see [2] for a patch that integrates fteproxy into dcf's 3.6-beta > branch > > [3] of the TBB. > > > > This integration targets version v0.2.6 of fteproxy [1]. > > > > asn/mikeperry

[tor-dev] Release Candidate: TBB 3.6 + fteproxy 0.2.6

2014-02-04 Thread Kevin P Dyer
Hi all, Please see [2] for a patch that integrates fteproxy into dcf's 3.6-beta branch [3] of the TBB. This integration targets version v0.2.6 of fteproxy [1]. asn/mikeperry - What do you need from me to merge this patch to master? -Kevin [1] https://github.com/kpdyer/fteproxy/releases [2] htt

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread Kevin P Dyer
On Wed, Jan 15, 2014 at 7:16 PM, Jim Rucker wrote: > [snip] > > From my understanding (please correct me if I'm wrong) Tor has a weakness in > that if someone can monitor data going into the relays and going out of the > exit nodes then they can defeat the anonymity of tor by correlating the size

Re: [tor-dev] Small FTE question

2014-01-04 Thread Kevin P Dyer
Hi George, On Sat, Jan 4, 2014 at 7:12 AM, George Kadianakis wrote: >> On Fri, Jan 3, 2014 at 6:20 AM, George Kadianakis >> wrote: >>> Hello Kevin, >>> >>> I saw your recent changes to the FTE codebase. The code looks nice! >>> >>> I then tried to test it, but I got a bit confused by the CLI. I

Re: [tor-dev] Small FTE question

2014-01-03 Thread Kevin P Dyer
On Fri, Jan 3, 2014 at 6:20 AM, George Kadianakis wrote: > Hello Kevin, > > I saw your recent changes to the FTE codebase. The code looks nice! > > I then tried to test it, but I got a bit confused by the CLI. I wanted to > try the good ol' ncat test, where I put FTE in the middle, an ncat > liste

[tor-dev] fteproxy v0.2.2

2013-12-16 Thread Kevin P Dyer
I've response to the good feedback [1] from asn, nickm, and yawning, I've tagged v0.2.2 [2] of fteproxy. This release includes the removal of gmpy as a dependency, additional documentation to explain the significance of language theoretical algorithms, and bounds checking of the input/output of our

[tor-dev] Gitian Build Failure (pt branch only?)

2013-12-12 Thread Kevin P Dyer
Hi Mike/dcf1, Building the pt branch [1] of tor-browser-bundle on Ubuntu 13.04, 64-bit resulted in the following error: <<< ./bin/gbuild:21:in `system!': failed to run on-target setarch i386 bash -x < var/build-script > var/build.log 2>&1 (RuntimeError) from ./bin/gbuild:121:in `build_one_configu

[tor-dev] fteproxy v0.2.1

2013-12-10 Thread Kevin P Dyer
Hi dcf1/asn, Yesterday I tagged release v0.2.1 of fteproxy. In this release I focused on breaking away from heavyweight dependencies: OpenFST and boost. Cross-platform PTTBB binaries are available on the fteproxy website: https://fteproxy.org/download. asn - Please have a look at the code and co

[tor-dev] FTE v0.2 Release Candidate

2013-11-25 Thread Kevin P Dyer
I'm pleased to announce the release candidate of a pluggable transport powered by Format-Transforming Encryption. Cross-platform PTTBBs are available on the FTE website: https://fteproxy.org/download dcf - I've added a patch to ticket #9941. This patch can be applied to [2], to integrate FTE into

Re: [tor-dev] Development of an HTTP PT

2013-11-25 Thread Kevin P Dyer
Hi dardok, Thanks for thinking about HTTP pluggable transports. It turns out to be a deceptively hard problem! Do you have any initial high-level goals? Or are you just trying to figure out *some* way to bootstrap an existing HTTP client/server architecture to tunnel arbitrary data streams? -Kev

Re: [tor-dev] Transport composition

2013-11-19 Thread Kevin P Dyer
Hi George, Maybe I'm missing something from the discussions that happened eight months ago at the dev meeting. (as per the initial comment in [1]) However, I guess I'm a bit confused about the motivation. Just to be clear, the goal is to be able to combine multiple transports easily, right? For e

Re: [tor-dev] Pluggable Transport TBB Build

2013-10-09 Thread Kevin P Dyer
On Wed, Oct 9, 2013 at 12:22 PM, David Fifield wrote: > On Wed, Oct 09, 2013 at 12:02:20PM -0400, Kevin P Dyer wrote: >> On Sun, Oct 6, 2013 at 3:30 PM, David Fifield wrote: >> This is a good start and goes a long way towards automating the build >> process. However, I&#

Re: [tor-dev] Pluggable Transport TBB Build

2013-10-09 Thread Kevin P Dyer
Hi David! Thanks for the detailed response. My thoughts are inline. On Sun, Oct 6, 2013 at 3:30 PM, David Fifield wrote: > On Sat, Oct 05, 2013 at 11:08:40AM -0400, Kevin P Dyer wrote: >> Sorry I missed the most recent Pluggable Transport bi-weekly meeting. >> >> In regar

[tor-dev] Pluggable Transport TBB Build

2013-10-05 Thread Kevin P Dyer
Hi David, Sorry I missed the most recent Pluggable Transport bi-weekly meeting. In regards to the PTTBB build, I plan to make progress towards a streamlined build process. Platforms I want to get the PTTBB build working on: 1) CentOS 5.9 (32-bit) 2) CentOS 5.9 (64-bit) 3) Windows 7 4) OSX 10.8

Re: [tor-dev] Pluggable transport weekly meeting

2013-09-12 Thread Kevin P Dyer
Hi all, Will we be having the first Pluggable Transport Weekly tomorrow? I'm working towards getting a build environment setup for the PTTBB and would like to chat about it, to ensure I'm not duplicating previous efforts. Thanks, Kevin On Fri, Sep 6, 2013 at 1:58 AM, Vmon wrote: > I sent thi

Re: [tor-dev] Pluggable Transport Browser Bundle FTE Integration

2013-09-01 Thread Kevin P Dyer
[Taking this discussion to tor-dev.] On Sun, Sep 1, 2013 at 6:32 AM, George Kadianakis wrote: > Kevin P Dyer writes: > > > Hi George/David, > > > > Hi Kevin, > > > I spoke with Roger at USENIX. He said you're the pluggable transport (PT) > > gateke

Re: [tor-dev] Format-Transforming Encryption Pluggable Transport

2013-07-27 Thread Kevin P Dyer
he 32-bit/64-bit linux binaries were compiled on RHEL6.4 with GLIBC 2.12. Please let me know if this resolves the issue you encountered. -Kevin On Wed, Jul 24, 2013 at 10:51 PM, Kevin P Dyer wrote: > Hi George, > > Thanks for trying FTE! > > Apologies, this is my fault. I built

Re: [tor-dev] Format-Transforming Encryption Pluggable Transport

2013-07-24 Thread Kevin P Dyer
Hi George, Thanks for trying FTE! Apologies, this is my fault. I built the current packages on a recent Ubuntu version with GLIBC 2.14. On execution, the binary is looking for GLIBC >=2.14, which isn't available on your system. Hence, the bundle and binary won't execute properly. Which Linux dis

[tor-dev] Format-Transforming Encryption Pluggable Transport

2013-06-09 Thread Kevin P Dyer
onth, we've successfully tunneled Tor through the Great Firewall of China, using FTE to make our traffic "look like" HTTP. We're eager for feedback on this alpha release, so please do not hesitate to contact us with questions. -Kevin P Dyer (and his co-authors) [1] https://lis

Re: [tor-dev] Format-Transforming Encryption for Censorship Circumvention

2012-09-11 Thread Kevin P Dyer
On Thu, Sep 6, 2012 at 3:30 PM, David Fifield wrote: > On Thu, Sep 06, 2012 at 09:25:58AM -0700, Kevin P Dyer wrote: >> Following my email to this list, dated 29/07/2012, I direct your >> attention to the IACR eprint document http://eprint.iacr.org/2012/494, >> "Form

[tor-dev] Format-Transforming Encryption for Censorship Circumvention

2012-09-06 Thread Kevin P Dyer
igned to detect HTTP traffic. We consider this preliminary technical report on a work-in-progress. In fact, we can already do more than what is reported (e.g. greater variety of languages, better system performance), but we will save these advances for a future release. Cheers, Kevin P Dyer (and

Re: [tor-dev] Brainstorming about steganographic transports

2012-07-29 Thread Kevin P Dyer
On Wed, Jul 25, 2012 at 9:18 PM, David Fifield wrote: > This is a summary of some discussion among developers of pluggable > transports about steganographic channels and deriving them from protocol > grammars. Two things prompted the discussion: > > [snip] > > David (yours truly) wants to write or