[tor-dev] Rewriting to e.as207960.net (was: When RFC 7686 and transparent proxies collide)

2024-09-28 Thread Matt Traudt
Your email client, I presume, is rewriting links to first go through e.as207960.net. I'm curious why that is. Matt On 9/25/24 04:23, Q Misell via tor-dev wrote: Moin, I've posted my thoughts on a potential solution to this in GitLab: https://gitlab.torproject.org/tpo/core/torspe

[tor-dev] When RFC 7686 and transparent proxies collide

2023-09-14 Thread Matt Jolly
users? I'm not sure what the best way forward is here, but I'm hoping that actual Tor developers might have a useful opinion on the matter, or at least be able to point me in the right direction. Thanks for your time, Cheers, Matt ___ tor-de

Re: [tor-dev] TOR socket for P2P in Python

2022-08-15 Thread Matt Traudt
ng the basics, but I'll point you towards how flashflow configures and launches a tor client in case you will find it more useful than confusing[5]. Remember, this requires the standard tor binary to exist on the host. Matt [0]: https://github.com/torpyorg/torpy/ [1]: https://stem.torproject

Re: [tor-dev] torify/nmap results in SIGABRT

2021-01-15 Thread Matt Traudt
r for free access to uncensored information, and doing big port scanning the Internet or irresponsibly scraping webpages causes exit operators trouble. Rent a cheap VPS or something. Bonus: it will be way faster, support all transport protocols, AND you don't have to deal with proxying over T

[tor-dev] Update to Proposal 316: FlashFlow

2020-09-04 Thread Matt Traudt
Hi all I polished up the FlashFlow proposal based on the feedback provided by Teor, Nick, and Mike. I converted it to markdown, and pasted the new text at the bottom of this email. The updated proposal is also in my fork of torspec is on gitlab [0]; the branch with the changes is "flashflow-revisi

Re: [tor-dev] Proposal 316: FlashFlow: A Secure Speed Test for Tor (Parent Proposal)

2020-06-02 Thread Matt Traudt
On 6/2/20 3:01 PM, Nick Mathewson wrote: > On Thu, Apr 23, 2020 at 2:48 PM Matt Traudt wrote: >> > > Hi! I've got some comments on the FlashFlow proposal; I'll start with > the ones that I think are most important, so that we can try to get > them out

Re: [tor-dev] Proposal 316: FlashFlow: A Secure Speed Test for Tor (Parent Proposal)

2020-04-24 Thread Matt Traudt
riod independently given only inputs present in the consensus (e.g. the shared random value). I believe the under-specified section *5.2 Measurement Scheduling* is the primary source of your concern here. >> On 24 Apr 2020, at 04:48, Matt Traudt wrote: >> >> ... >> >>

[tor-dev] Proposal XXX: FlashFlow: A Secure Speed Test for Tor (Parent Proposal)

2020-04-23 Thread Matt Traudt
Filename: xxx-flashflow.txt Title: FlashFlow: A Secure Speed Test for Tor (Parent Proposal) Author: Matthew Traudt, Aaron Johnson, Rob Jansen, Mike Perry Created: 23 April 2020 Status: Draft 1. Introduction FlashFlow is a new distributed bandwidth measurement system for Tor that consists of a sin

Re: [tor-dev] Probability of Guessing a v3 Onion Address

2019-12-11 Thread Matt Traudt
easy for you to "bookmark" your v3 onion addresses without actually using the bookmark functionality of Tor Browser. So what if people know v3xyz.onion exists; they can't connect to it! I'll admit it's a rather weak use-case: if you can remember/save the client auth

Re: [tor-dev] What hidden services does my relay node know about?

2019-07-29 Thread Matt Traudt
no public Tor testnet, but you can easily run your own on your own machine with Chutney[0] (easy, but less powerful) or Shadow[1] (harder, but very powerful). Chutney is more than enough for what it sounds like you want to do. I did not mean to suggest curious users should not poke around code **sa

Re: [tor-dev] What hidden services does my relay node know about?

2019-07-29 Thread Matt Traudt
On 7/29/19 08:08, Matt Traudt wrote: > On 7/29/19 07:44, clive.jen...@tutanota.com wrote: >> I built tor from source and am running it as a relay (not exit node) and >> also as a directory server. It is my understanding that after a while I >> should experience V2 hidden serv

Re: [tor-dev] What hidden services does my relay node know about?

2019-07-29 Thread Matt Traudt
that receives the > announcements)? > Onion services will use your relay to store descriptors once it has the HSDir flag. You can't determine which onion services or how many onion services are using you without code changes. Doing this is considered being a malic

[tor-dev] Pastly stepping away from sbws

2018-11-21 Thread Matt Traudt
e sbws-admins github team - Removed myself from the default CC list on trac - #28559 to revoke my push power to gitweb.tpo/sbws.git You should feel free to CC me on tickets or grab my attention for specific issues. Matt signature.asc Description: OpenP

Re: [tor-dev] Idea which may or may not of been discussed

2018-10-13 Thread Matt Traudt
; Why wouldn't it be just as easy for censors to identify the small set of registered domains that Tor relays use and block TLS connections that involve them? I don't see how changing the domain a relay uses from aa.foo.com to bb.foo.com helps. The ce

Re: [tor-dev] Unable to access '#tor-dev' IRC Channel

2018-08-20 Thread Matt Traudt
hen you connect to OFTC, you will only need to do /msg nickserv identify YourPassword YourNick Matt On 8/20/18 12:54, KUSHAL BORKAR wrote: > Greetings All, >                      This is to inform you that, I, Kushal Borkar, IRC > Alias 'Lashuk', am unable to access t

[tor-dev] Brief state of sbws thoughts

2018-07-19 Thread Matt Traudt
results from someone running torflow. I fear sbws is doomed to die the death of the new bandwidth scanners before it if we don't start seriously verifying sbws is "good" or if I personally slowly stop working/coordinating work on it. Thanks Matt [0]: https://trac.torproject.org/pro

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-06-16 Thread Matt Traudt
; that much work and it is a great protection for many users. > Then put forward the time and effort to maintain it. Matt ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Porting TOR Relay Software To Run On Windows

2018-06-13 Thread Matt Traudt
/download/download.html.en You're looking for the "Expert Bundle," and the current direct download link is https://www.torproject.org/dist/torbrowser/7.5.5/tor-win32-0.3.2.10.zip Unzip it and inside you'll find tor.exe. This can be configured the usual way to run a r

Re: [tor-dev] (no subject)

2018-05-30 Thread Matt Traudt
On May 30, 2018 6:28:55 PM PDT, abhinav chowdary wrote: >Iam in or out You've sent 5 nonsense emails to many hundreds of people today. Please stop. Please learn how mailing lists work. It seems like you've successfully subscribed to this list. Please enjoy responsibly. Matt_

[tor-dev] Bandwidth Scanning Meeting Notes 3 May 2018

2018-05-03 Thread Matt Traudt
Next meeting is 10 May 2018 at 1200 UTC for 30 minutes... maybe. While we should find a standard time, next week is a special case for pastly and teor. Notes are https://pad.riseup.net/p/ioYq89yZSx1t and copy/pasted below. - Thi

[tor-dev] sbws meeting notes 26 April 2018

2018-04-26 Thread Matt Traudt
Next meeting is 3 May 2018 at 0930 UTC. http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-04-26-09.59.html https://pad.riseup.net/p/6292yqhUOuHC (copy/pasted below) Simple Bandwidth Scanner Meeting 25 April 2018 == This pad: https://pad.rise

[tor-dev] Simple Bandwidth Scanner is now open source

2018-04-23 Thread Matt Traudt
tHub other than I like GitHub's issue tracking, milestones, Travis CI integration, and readthedocs integration. So it might move ... or it might not. Cheers Matt [0]: https://gitweb.torproject.org/torflow.git [1]: https://github.com/pastly/simple-bw-scanner/milestone/3 [2]: https://sbws.re

[tor-dev] Notes from 19 April 2018 Simple Bandwidth Scanner Meeting

2018-04-19 Thread Matt Traudt
Next meeting is scheduled 26 April 2018 at 2200 UTC in #tor-meeting, **BUT** we are probably going to look into finding a time that works better across three halves of the globe. Pad is here, and is copy/pasted below. https://pad.riseup.net/p/BenwGdgpz0uS Meeting IRC log http://meetbot.debian.net

Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Matt Traudt
On 4/13/18 12:26, Damian Johnson wrote: >> https://github.com/pastly/simple-bw-scanner/blob/master/docs/source/specification.rst >> (ask Pastly for access) > > Hi Matt, why is this repo read restricted? I was idly curious to see > the code of sbws and was surprised it's

Re: [tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-13 Thread Matt Traudt
obtaining torflow data recently. Matt On 4/12/18 21:50, Tom Ritter wrote: > I'm happy to run a sbws alongside my torflow. It will let us compare bw > numbers apples to apples too.  My only difficulty is being unable to > spend significant time to diagnose why it doesn't work, if it

[tor-dev] Notes from 12 April 2018 Simple Bandwidth Scanner Meeting

2018-04-12 Thread Matt Traudt
See below for the pad notes. Next meeting is scheduled 19 April 2018 at 2200 UTC in #tor-meeting. (This one was held in #tor-dev, but we should use meetbot). - Simple Bandwidth Scanner meeting 12 April 2018 Updates/Status messages pastly: What's on my plate? <- doesn'

[tor-dev] Scaling bandwidth scanner results

2018-03-18 Thread Matt Traudt
d being told I'm wrong about this step being necessary. 3. Find all the places that hint at consensus weight being directly comparable to bandwidth (such as [3]) and change the wording. Matt [0]: https://paste.debian.net/1015409/ [1]: https://trac.torproject.org/projects/tor/

Re: [tor-dev] How fast can Tor go [was: (no subject)]

2018-03-15 Thread Matt Traudt
see the list of the fastest Tor relays[0] in the real network. IPredator has likely done some heavy kernel tweaking, but the remaining relays are all rather close to 700 Mbps. Thank you for your interest in Tor. Matt [0]: https://metrics.torproject.org/rs.html#toprelays

Re: [tor-dev] Which network simulator are you using/suggesting for testing Tor

2017-05-11 Thread Matt Traudt
ty to graph many things you might be interested in. And if you will be interested in simulating large networks, it should do so better than Chutney. Hoping I don't sound too much like a fanboy. Matt [1]: https://gitweb.torproject.org/chutney.git _

Re: [tor-dev] Call for help on testing core tor releases

2016-10-13 Thread Matt Traudt
Isabela / Core Tor I'd love to help. I use 99% Linux and will be able help with everything you listed. I'm pastly on trac and oftc. Matt isab...@riseup.net: > > What we are asking volunteers: > > * Validate release signature/checksum > > * Does it build with

Re: [tor-dev] Silly (or not so silly) question

2014-07-23 Thread Matt Pagan
Noel David Torres Taño: > Hi all > > What would happen if a Tor node changes behaviour and uses four or five > relay steps instead of three? > Hi Noel, Does https://www.torproject.org/docs/faq#ChoosePathLength answer your question? Matt signature.asc Description:

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-23 Thread Matt Pagan
>> >> COMMANDs: (combine COMMANDs to specify multiple options simultaneously) >> get bridgesRequest vanilla bridges. >> get transport [TYPE] Request a Pluggable Transport by TYPE. >> get help Displays this message. >> get keyGet a copy of Bridge

Re: [tor-dev] Two torspec proposals

2014-03-27 Thread Matt Pagan
n the directory consensus). This line will be treated akin to the ContactInfo field. An address may not contain a colon, comma, or nonprintable ASCII. -- Matt Pagan m...@pagan.io PGP: 0xE9284418E360583C signature.asc Description: OpenPGP digital signature ___

[tor-dev] Mockup for a hidden services publishing tool

2014-03-10 Thread Matt Pagan
Please see the image file for what I have in mind here. http://oi62.tinypic.com/10x80ok.jpg I hope this tool, when completed, can help reduce the barrier for people seeking to set up hidden services. I anticipate this tool being able to connect to a running tor and write to that tor's torrc fil

Re: [tor-dev] Help hacking Mumble

2014-02-09 Thread Matt
On Fri, 07 Feb 2014 09:54:35 +0400 meejah wrote: > What I would suggest: > > 1. change ConnectDialog so that it always uses not-yet-looked-up >QHostAddresses (perhaps only if a proxy is enabled). This still > won't help Tor, since they're sending UDP. > > 2. change Cert.cpp so it doesn't ha

Re: [tor-dev] Help hacking Mumble

2014-02-06 Thread Matt
On Thu, 30 Jan 2014 22:01:18 + Matt wrote: Here is one of the Mumble developers' take on the issue: > I don't know where @zanethomas's post went, but I just want to clarify > what needs to be done here, and what's wrong. > > By default, Qt's proxy

Re: [tor-dev] Help hacking Mumble

2014-02-02 Thread Matt
On Fri, 31 Jan 2014 22:17:54 + Andrew F wrote: > Matt, have you gotten any response? > On IRC, Yawning provided me some useful recommendations for further investigation. Any progress I make on this issue will be slow-going though, and getting a fresh set of eyes on this issue would h

[tor-dev] Help hacking Mumble

2014-01-30 Thread Matt
If you're into C++ or Qt, we could use some help. Mumble[0] is a free software VoIP application that various people have had success using with Tor. One problem using Mumble with Tor is that Mumble doesn't abide by the native proxy settings when looking up Mumble servers[1]. When using a Tor router

Re: [tor-dev] [tor-assistants] Please help me plan and run meetings in ways that you'll find most helpful

2013-11-07 Thread matt
what should be better. > Thanks for setting up the development calendar. I expect that is going to help me keep better track of scheduled meetings. I only found out about the calendar on IRC yesterday when you mentioned it, Was there an email I missed w

Re: [tor-dev] Sponsor F: update; next meeting [in *two weeks*]

2013-10-21 Thread matt
I wanted to give another update as to the status of patching Mumble to support native Tor proxification. Mumble uses its own connection protocol to make external connections, a protocol which is defined in a 30-page pdf file which comprises most of Mumble's documentation (the comments in the code

Re: [tor-dev] Sponsor F: update; next meeting [in *two weeks*]

2013-09-30 Thread Matt Pagan
On Mon, 30 Sep 2013 19:13:37 -0700 Tom Lowenthal wrote: > Today, at 1100 Pacific, we spent more than 90 minutes discussing > [Sponsor F][]. Here's the summary. > > **READ THIS**: The next Sponsor F meeting will be held in a mere two > weeks on **2013-10-14, at 1100h Pacific in #tor-dev**. > > T

Re: [tor-dev] File verification GUI tool

2013-09-23 Thread Matt Pagan
On Mon, 23 Sep 2013 17:59:23 -0400 Roger Dingledine wrote: > On Mon, Sep 23, 2013 at 05:45:36PM -0400, Sukhbir Singh wrote: > > > I am starting to work on a small GUI tool for file verification > > > because I find guiding users through the verification process on > > > Windows/Mac through the co