Re: [tor-dev] A proposal to phase out CAPTCHAs for BridgeDB

2021-07-30 Thread Matthew Finkel
On Thu, Jul 29, 2021 at 04:46:37PM -0400, Cecylia Bocovich wrote: > Hi everyone, > > We've been working on improving the usability of BridgeDB lately, and > our CAPTCHAs have been a constant thorny problem. They are not > accessible for blind users [0]. We've gotten many complaints over the > year

Re: [tor-dev] A series of questions about Tor (m1 support, forward secrecy, v3 auth)

2021-07-23 Thread Matthew Finkel
Hi Holmes, On Fri, Jul 23, 2021 at 05:46:47PM -0400, Holmes Wilson wrote: > Hi everyone, > > A few disjointed questions that have come up recently in our work with Tor: > > 1. PERFORMANCE ON M1 / ARM64 > > We just got a report from a user that the tor binary for Mac was using much > more CPU o

[tor-dev] Hackathon UDP Support

2021-04-14 Thread Matthew Finkel
Hello! During the Hackweek, I spent a little time hacking support of UDP-over-Tor. The goal of the project was supporting UDP onion services, and leaving Exit support for another time. I didn't have a working implementation by the end of the week, but life moves one. This is an initial mail abou

Re: [tor-dev] Store Salmon-related information in Tor Browser?

2020-08-20 Thread Matthew Finkel
On Thu, Aug 20, 2020 at 11:30:09AM -0700, Philipp Winter wrote: > We recently started experimenting with the Salmon social bridge > distributor: > https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/issues/31873 > > We are now exploring the possibility of storing some Salmon-related data

Re: [tor-dev] Safe Alternative Uses of Onion Service Keys

2020-08-12 Thread Matthew Finkel
On Mon, Aug 10, 2020 at 09:00:32AM -0400, Nick Mathewson wrote: > On Wed, Jul 29, 2020 at 1:15 AM Matthew Finkel wrote: > > > > Hello everyone, > > Hi, Matt! > > There's a part of this that I'm still trying to figure out: > > > The safest usage of

Re: [tor-dev] Safe Alternative Uses of Onion Service Keys

2020-07-30 Thread Matthew Finkel
On Thu, Jul 30, 2020 at 01:18:33PM +0300, George Kadianakis wrote: > Matthew Finkel writes: > > > Hello everyone, > > > > Hello hello! > > These are all good questions and they become more and more important as > the onionspace grows and more use cases appear.

[tor-dev] Safe Alternative Uses of Onion Service Keys

2020-07-28 Thread Matthew Finkel
Hello everyone, Onion service version two (v2) key pairs were used for more purposes than simply facilitating the establishment of rendezvous circuits, in particular third-party applications used this key in numerous ways. Similarly, version three (v3) onion service keys are being re-used in simil

Re: [tor-dev] Distributing Tor developer keys via Fedora packages

2020-07-20 Thread Matthew Finkel
On Fri, Jul 17, 2020 at 02:56:08PM +0100, Andrew Clausen wrote: > Hi everyone, > Hi, Thanks for your interest in this. > I propose distributing the Tor developer keys inside the Fedora package > distribution-gpg-keys.[1] This would give most Linux users a trustworthy > chain of signatures from

Re: [tor-dev] DNS-over-HTTPS (DOH) in Firefox/Torbrowser

2020-07-01 Thread Matthew Finkel
On Sun, Jun 14, 2020 at 08:19:13PM +0200, nusenu wrote: > Georg Koppen: > > nusenu: > >> Hi, > >> > >> since Mozilla did tests [0] on DOH [1] in Firefox I was wondering > >> if Torbrowser developers have put any thought into that as well? > > > > Actually, the study did not get done yet. The start

Re: [tor-dev] Optimistic SOCKS Data

2019-10-15 Thread Matthew Finkel
On Fri, Oct 11, 2019 at 6:30 AM Tom Ritter wrote: > > On Thu, 10 Oct 2019 at 10:37, George Kadianakis wrote: > > So are you suggesting that we can still do SOCKS error codes? But as > > David said, some of the errors we care about are after the descriptor > > fetch, so how would we do those? > >

Re: [tor-dev] Optimistic SOCKS Data

2019-10-08 Thread Matthew Finkel
On Wed, Oct 2, 2019 at 5:46 PM Nick Mathewson wrote: > > On Fri, Sep 27, 2019 at 1:35 PM Tom Ritter wrote: > > > > On Mon, 5 Aug 2019 at 18:33, Tom Ritter wrote: > > > > > > On Tue, 2 Jul 2019 at 09:23, Tom Ritter wrote: > > > > Or... something else? Very interested in what David/asn think sin

Re: [tor-dev] reproducible builds for Android tor daemon

2019-09-13 Thread Matthew Finkel
On Thu, Sep 12, 2019 at 10:50 AM Hans-Christoph Steiner wrote: > > > Hey all, > > I'm currently working on tor for Android as part of a Guardian Project > project. One key goal is making a shareable, reproducible build process > for the tor daemon for Android. Then this would be published to > M

Re: [tor-dev] reproducible builds for Android tor daemon

2019-09-13 Thread Matthew Finkel
On Fri, Sep 13, 2019 at 7:51 AM Hans-Christoph Steiner wrote: > > > > teor: > > Hi, > > > >> On 12 Sep 2019, at 20:50, Hans-Christoph Steiner > >> wrote: > >> > >> Then that work > >> will hopefully be extended into sharing tor between apps, e.g. letting > >> Briar, Tor Browser, etc share the to

Re: [tor-dev] Tor exit bridges

2019-05-07 Thread Matthew Finkel
On Tue, May 7, 2019 at 5:35 PM juanjo wrote: > Tor relays are public and easily blocked by IP. To connect to Tor > network users where Tor is censored have to use bridges and even PTs. > But, what happens on the exit? Many websites block Tor IPs so using it > to access "clearweb" is not possible.

[tor-dev] Building meek-server with Go 1.11.5

2019-01-26 Thread Matthew Finkel
Attached is a script for building meek-server. I used this for completing #29171. The newest version of Go is only available in Sid and Buster[0], so this script creates a Buster environment and installs the dependencies. The script assumes debootstrap and sudo are installed (and you have necessar

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-07-25 Thread Matthew Finkel
On Tue, Jul 24, 2018 at 01:37:10AM +, Matthew Finkel wrote: > On Mon, Jul 16, 2018 at 01:32:19AM +0000, Matthew Finkel wrote: > > Hi Everyone, > > > > We'll discuss this at a meeting next Tuesday, 24 July at 15:00 UTC in > > #tor-meeting on OTFC. > &g

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-07-23 Thread Matthew Finkel
On Mon, Jul 16, 2018 at 01:32:19AM +, Matthew Finkel wrote: > Hi Everyone, > > We'll discuss this at a meeting next Tuesday, 24 July at 15:00 UTC in > #tor-meeting on OTFC. Reminder! > > There was some discussion on the tbb-dev@ mailing list, but this meeting &

Re: [tor-dev] Sandboxed Tor Browser should be officially developed

2018-07-15 Thread Matthew Finkel
Hi Everyone, We'll discuss this at a meeting next Tuesday, 24 July at 15:00 UTC in #tor-meeting on OTFC. There was some discussion on the tbb-dev@ mailing list, but this meeting will cover the details, implementation plan, roadmap, timeline, etc (maybe we won't have enough time for all of these t

Re: [tor-dev] Tor browser for Chrome OS

2018-07-13 Thread Matthew Finkel
On Fri, Jul 13, 2018 at 11:02:53AM -0700, Keifer Bly wrote: > Hello, > > So I am wondering, are there plans to develop a version of tor browser that > will run on Chromebooks? I though that might be a good idea as those are > getting somewhat popular in the US. Thanks. Yes! And, not only are they

Re: [tor-dev] Is there strictly a one-to-one BW scanner to BW auth relationship?

2018-03-23 Thread Matthew Finkel
On Fri, Mar 23, 2018 at 08:21:38PM -0400, Roger Dingledine wrote: > On Fri, Mar 23, 2018 at 08:13:59PM -0400, Rob Jansen wrote: > > I understand that the current bandwidth measurement system is far from > > ideal, but I am wondering about how the current system works. Does each > > bandwidth auth

Re: [tor-dev] Request for resource requirement

2017-10-23 Thread Matthew Finkel
On Sun, Oct 22, 2017 at 09:56:59PM +0530, Ankit Rathore wrote: > Hello, > I am currently working on a project where I require the resource which was > originally present at this link > > https://trac.torproject.org/projects/tor/wiki/sponsors/SponsorD/June2011 > > The contents of this page are no

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-27 Thread Matthew Finkel
On Sun, Nov 27, 2016 at 01:07:02PM -0500, chelsea komlo wrote: > Hi, > > >> Yes, the onion-service-version and the version of the descriptor that tor > >> publishes are now tightly coupled, comparing v2 and v3. However, this may > >> not always be the case and, indeed, was not the case previously

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-27 Thread Matthew Finkel
On Sun, Nov 27, 2016 at 11:24:11AM -0500, David Goulet wrote: > On 27 Nov (00:44:39), Matthew Finkel wrote: > > On Sat, Nov 26, 2016 at 09:25:44PM +1100, teor wrote: > > > > On 26 Nov. 2016, at 02:25, David Goulet wrote: > > > > > > > >>> >

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-26 Thread Matthew Finkel
On Thu, Nov 24, 2016 at 08:14:55PM -0500, cko...@thoughtworks.com wrote: > Hi, > > > > > 2) It also means we create an option that will get deprecated once v2 is > >phased out so we are adding a "temporary" option for users to "keep > >creating v2 addresses" but then will be useless and we

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-26 Thread Matthew Finkel
On Sat, Nov 26, 2016 at 09:25:44PM +1100, teor wrote: > > > On 26 Nov. 2016, at 02:25, David Goulet wrote: > > > >>> > >>> 2) It also means we create an option that will get deprecated once v2 is > >>> phased out so we are adding a "temporary" option for users to "keep > >>> creating v2 addre

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-11 Thread Matthew Finkel
On Sat, Jul 11, 2015 at 03:50:16PM +0300, s7r wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > I find it better to add a new consensus flag called 'Vanguard' which > will be assigned to relays with lower requirements than the 'Guard' > (less bandwidth, just the Stable flag). We will

Re: [tor-dev] Adding a NotDir router status flag

2015-06-08 Thread Matthew Finkel
On Wed, Jun 03, 2015 at 01:33:11AM +1000, teor wrote: > > > Date: Fri, 29 May 2015 14:24:33 +0300 > > From: s7r > > > > Signed PGP part > > Hi Matt, > > > > Nice to hear there's ongoing work for this proposal. > > > > I also see the NotDir flag as useful for migration, because for quite > > so

[tor-dev] Adding a NotDir router status flag

2015-05-28 Thread Matthew Finkel
.txt Title: All relays are directory servers Author: Matthew Finkel Created: 29-Jul-2014 Status: Open Target: 0.2.7.x Overview: This proposal aims at simplying how users learn about the relays in the Tor network. This is accomplished by changing the default functionality of relays

[tor-dev] Update: Proposal 237 - All relays are directory servers

2015-03-21 Thread Matthew Finkel
ctory servers Author: Matthew Finkel Created: 29-Jul-2014 Status: Open Target: 0.2.7.x Overview: This proposal aims at simplying how users interact directly with the Tor network by turning all relays into directory servers (also known as directory caches), too. Currently an operator ha

[tor-dev] Directory Server Consensus Status Flag

2015-03-21 Thread Matthew Finkel
Hi all, I'd like some opinions. Currently authorities give relays the V2Dir if they are useful directory servers. Clients don't actually care about this flag in any way, but it's a useful visual indicator. With proposal 237 (All relays are directory servers) and #12538 as its implementation, the c

Re: [tor-dev] Of CA-signed certs and .onion URIs

2014-11-19 Thread Matthew Finkel
On Tue, Nov 18, 2014 at 10:53:30PM -0500, grarpamp wrote: > On Tue, Nov 18, 2014 at 12:55 PM, George Kadianakis > wrote: > > plans for any Tor modifications we want to do (for example, trusting > > self-signed certs signed by the HS identity key seem like a generally > > good idea). > > If the HS

Re: [tor-dev] Of CA-signed certs and .onion URIs

2014-11-18 Thread Matthew Finkel
On Tue, Nov 18, 2014 at 05:55:29PM +, George Kadianakis wrote: > Tom Ritter writes: > > > There's been a spirited debate on irc, so I thought I would try and > > capture my thoughts in long form. I think it's important to look at > > the long-term goals rather than how to get there, so that's

Re: [tor-dev] Of CA-signed certs and .onion URIs

2014-11-18 Thread Matthew Finkel
On Mon, Nov 17, 2014 at 05:48:26PM -0500, grarpamp wrote: > On Fri, Nov 14, 2014 at 12:08 PM, Tom Ritter wrote: > > a) Eliminate self-signed certificate errors when browsing https:// on > > an onion site > > No, please don't. Browsers throw cert errors for good reasons. > If you don't want to dea

Re: [tor-dev] yes hello, internet supervillain here

2014-11-09 Thread Matthew Finkel
On Sun, Nov 09, 2014 at 07:25:39PM +, Fears No One wrote: > In other news, the same guy runs a bot that records uptimes for various > onions, and he gave me output related to up/down times for doxbin, > Cloud9, and Silk Road 2.0. > > NOTE: Time zone is GMT+9:30 on all of these. He used sed to

Re: [tor-dev] Newbie Devloper Questions

2014-10-29 Thread Matthew Finkel
On Mon, Oct 27, 2014 at 03:13:29PM -0400, py...@riseup.net wrote: > Hello, > > I am would like to begin working on a distributed application > sitting on top of TOR and am wondering if there are any existing > guides providing a good starting point for this type of development. > If not, what othe

Re: [tor-dev] On the visualization of OONI bridge reachability data

2014-10-25 Thread Matthew Finkel
On Sat, Oct 25, 2014 at 11:26:50AM +, Matthew Finkel wrote: > On Sat, Oct 25, 2014 at 01:01:52PM +0200, Karsten Loesing wrote: > > On 24/10/14 01:53, isis wrote: > > > isis transcribed 6.6K bytes: > > >>* The hashed fingerprint (as is the case for bridges in o

Re: [tor-dev] On the visualization of OONI bridge reachability data

2014-10-25 Thread Matthew Finkel
On Sat, Oct 25, 2014 at 01:01:52PM +0200, Karsten Loesing wrote: > On 24/10/14 01:53, isis wrote: > > isis transcribed 6.6K bytes: > >>* The hashed fingerprint (as is the case for bridges in onionoo) > >>* The hashed ip:port > > > > Actually, my apologies, I was quite tired when I wrote th

[tor-dev] Prop 237 (Make all relays directory caches) Patch

2014-10-15 Thread Matthew Finkel
y comments/suggestions (the overall proposal is unchanged). If not, I'll start implementing this within the next few days. Thanks! Matt [0] https://git.torproject.org/user/sysrqb/torspec.git >From cc4e5afb83b7a5d34dc570f1f79a74e7ca000bf7 Mon Sep 17 00:00:00 2001 From: Matthew Finkel Date: T

Re: [tor-dev] On the visualization of OONI bridge reachability data

2014-10-06 Thread Matthew Finkel
On Sat, Oct 04, 2014 at 06:27:22PM -0700, M. C. McGrath wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Hi, > These were a few possibilities for visualization that we came up with > at the OTF summit (I can send the full notes from that discussion if > everyone is okay with it): > -

Re: [tor-dev] Proposal: All Relays are Directory Servers

2014-08-18 Thread Matthew Finkel
On Mon, Aug 18, 2014 at 02:17:28PM -0400, Nick Mathewson wrote: > On Wed, Aug 13, 2014 at 11:53 AM, Matthew Finkel > wrote: > > Hi All, > > > > Below is the proposal for #12538 [0], with some changes after George's > > review and some other revisions. >

Re: [tor-dev] Guard nodes and network down events

2014-08-15 Thread Matthew Finkel
On Wed, Aug 13, 2014 at 03:47:43PM +0300, George Kadianakis wrote: > Hello friends :) > > This is a post to discuss how Tor should treat its entry guards when > its network goes down. This is part of ticket #12595 [0] which aims to > design better interfaces and data structures for entry guards. >

Re: [tor-dev] On picking Introduction Points in Next Generation Hidden Services

2014-08-15 Thread Matthew Finkel
On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote: > One missing piece of rend-spec-ng.txt [0] is a section on how HSes > should pick their Introduction Points (IPs). There are three main > questions here: > - How many IPs should an HS have? > - Which relays can be IPs? > - What's t

[tor-dev] Proposal: All Relays are Directory Servers

2014-08-13 Thread Matthew Finkel
: xxx-directory-servers-for-all.txt Title: All relays are directory servers Author: Matthew Finkel Created: 29-Jul-2014 Status: Target: 0.2.6.x Overview: This proposal aims at removing part of the distinction between the relay and the directory server. Currently operators have the options of bein

Re: [tor-dev] [DRAFT] Proposal: All Routers are Directory Servers

2014-07-31 Thread Matthew Finkel
On Thu, Jul 31, 2014 at 02:29:13PM +0300, George Kadianakis wrote: > Matthew Finkel writes: > > > Hi All, > > > > Below is a draft proposal for making all relays also be directory > > servers (by default). It's almost ready for a number, but it can use > &g

Re: [tor-dev] UX Idea - A controller inside TBB

2014-07-29 Thread Matthew Finkel
On Tue, Jul 29, 2014 at 09:38:55AM -0400, Mark Smith wrote: > On 7/29/14, 9:31 AM, Matthew Finkel wrote: > >Did you start working on this again? Having something like this > >is actually really important. It would be awesome to get this > >functionality in Tor Browser again

Re: [tor-dev] UX Idea - A controller inside TBB

2014-07-29 Thread Matthew Finkel
On Tue, Jul 08, 2014 at 11:16:12PM +0200, Arlo Breault wrote: > I started working on something like this a little while ago, > https://github.com/arlolra/bulb > > but didn't manage to stir up much interest. > > I'm happy to continue with it if anyone wants to collaborate. > > Arlo Hey Arlo, Di

[tor-dev] [DRAFT] Proposal: All Routers are Directory Servers

2014-07-29 Thread Matthew Finkel
e. Thanks! === Filename: directory-servers-for-all.txt Title: All routers are directory servers Author: Matthew Finkel Created: 29-Jul-2014 Status: Draft Target: 0.2.6.x Overview: (In practice we refer to the servers that mirror directory documents as directory servers, directory mi

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-27 Thread Matthew Finkel
On Sat, Jul 26, 2014 at 09:42:04PM -0700, Ken Keys wrote: > On 7/26/2014 1:54 AM, Matthew Finkel wrote: > > We also do try to discard fake requests, isis actually added another > > yesterday! > Could you elaborate on this? I don't understand what you mean my fake > reques

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-26 Thread Matthew Finkel
On Fri, Jul 25, 2014 at 07:32:42AM +, isis wrote: > Lunar transcribed 2.1K bytes: > > isis: > > > > PS: why are we still shipping obfs2 bridges?! > > > > > > > > > tl;dr: Because we have them. > > > > The protocol is known to be broken and fingerprintable. That's something > > we know. Not u

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-26 Thread Matthew Finkel
On Thu, Jul 24, 2014 at 04:16:44PM +, harmony wrote: > Nima Fatemi : > > > > I think "bridges" works just fine for "vanilla bridges" and I want to > > take the opportunity to +1 Philipp's idea on looking for keywords > > instead of commands, regardless of how they're phrased. > > Help desk fr

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-26 Thread Matthew Finkel
On Thu, Jul 24, 2014 at 04:01:34PM -0400, Israel Leiva wrote: > Hi. > > I support what Philipp and Nima say about keywords. The given commands > surely look simple for technical users, but what about non-technical users? > If the purpose of the distributor is to give info, and you're already > fil

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-26 Thread Matthew Finkel
On Sun, Jul 20, 2014 at 06:07:03PM -0400, Philipp Winter wrote: > On Sun, Jul 20, 2014 at 06:52:44PM +0000, Matthew Finkel wrote: > > So, the questions I am posing to those in the community who has an > > opinion about this: What do you think? What problems do you currently >

Re: [tor-dev] Email Bridge Distributor Interactive Commands

2014-07-26 Thread Matthew Finkel
On Fri, Jul 25, 2014 at 10:19:40PM +, isis wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Yawning Angel transcribed 2.9K bytes: > > On Fri, 25 Jul 2014 13:25:31 +0200 > > Lunar wrote: > > > > > isis: > > > > > We can't just make Tor Browser stop accepting obfs2 because some >

[tor-dev] Email Bridge Distributor Interactive Commands

2014-07-20 Thread Matthew Finkel
Hi everyone, A short time ago BridgeDB learned how to accept some more commands via email[0]. Below is an example of the current help/overview autoresponse email[1] that users receive (in English, we do have translations). These commands may not be optimal, so we'd love to be given feedback on th

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-21 Thread Matthew Finkel
On Mon, Jan 20, 2014 at 05:21:26PM +0100, Philipp Winter wrote: > On Mon, Jan 20, 2014 at 08:30:12AM -0500, Ian Goldberg wrote: > > On Sat, Jan 18, 2014 at 01:40:43AM +, Matthew Finkel wrote: > > > obfs3 is supposed to be fairly difficult to detect because entropy > > &

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-21 Thread Matthew Finkel
On Wed, Jan 22, 2014 at 02:17:34AM +, Matthew Finkel wrote: > On Mon, Jan 20, 2014 at 05:21:26PM +0100, Philipp Winter wrote: > > On Mon, Jan 20, 2014 at 08:30:12AM -0500, Ian Goldberg wrote: > > > On Sat, Jan 18, 2014 at 01:40:43AM +0000, Matthew Finkel wrote: > > >

[tor-dev] Attributes of Current Public Bridges

2014-01-20 Thread Matthew Finkel
Hi everyone, Over the last few days there were a few questions raised regarding the current status of public bridges and their pluggable transports. I've written a script to gather some data points using the sanitized bridge descriptors and extrainfo documents provided on metrics.tp.o. If anyone i

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-17 Thread Matthew Finkel
sports... fewer people using them. > > > On Thu, Jan 16, 2014 at 12:54 PM, Matthew Finkel > wrote: > > On Wed, Jan 15, 2014 at 09:16:20PM -0600, Jim Rucker wrote: > >> Are there any projects in Tor being worked in to combat data correlation? > >> For instance, rela

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread Matthew Finkel
On Wed, Jan 15, 2014 at 09:16:20PM -0600, Jim Rucker wrote: > Are there any projects in Tor being worked in to combat data correlation? > For instance, relays the send/recv constant data rates continuously - > capping data rates and padding partial or non-packets with random data to > maintain the

Re: [tor-dev] bridgdb automation

2013-12-18 Thread Matthew Finkel
On Thu, Dec 19, 2013 at 02:52:03AM +0100, Nicolas Vigier wrote: > On Tue, 17 Dec 2013, isis agora lovecruft wrote: > > > Nicolas Vigier transcribed 1.4K bytes: Hi Nicolas! Thanks again for following up on this! > > > > Just in case you haven't seen it, Lunar made a wiki page which has quite a

Re: [tor-dev] next globe update feedback

2013-11-07 Thread Matthew Finkel
On Thu, Nov 07, 2013 at 03:33:23PM -0500, m...@rndm.de wrote: > > > > If there isn't anything wrong, I will release it to the regular globe > > url. > > I deployed the latest globe version on http://globe.rndm.de/ . > > The jshint code quality check was replaced with latest eslint version > th

Re: [tor-dev] [Draft Proposal] Scalable Hidden Services

2013-11-07 Thread Matthew Finkel
On Wed, Oct 30, 2013 at 08:11:16AM +, Matthew Finkel wrote: > On Mon, Oct 28, 2013 at 08:49:46PM +, George Kadianakis wrote: ... > > It seems to me that an IP+Client adversary is always able to find the > > number and status of HS-nodes. The proposed ways to fix this is to a

Re: [tor-dev] [Draft Proposal] Scalable Hidden Services

2013-10-30 Thread Matthew Finkel
On Mon, Oct 28, 2013 at 08:49:46PM +, George Kadianakis wrote: > Christopher Baines writes: > > > On 28/10/13 13:19, Matthew Finkel wrote: > >> This is a proposal I wrote to implement scalable hidden services. It's > >> by no means finished (there are some

Re: [tor-dev] [Draft Proposal] Scalable Hidden Services

2013-10-30 Thread Matthew Finkel
On Mon, Oct 28, 2013 at 07:40:12PM +, Christopher Baines wrote: > On 28/10/13 13:19, Matthew Finkel wrote: > > This is a proposal I wrote to implement scalable hidden services. It's > > by no means finished (there are some slight inconsistencies which I will > > be

Re: [tor-dev] [Draft Proposal] Scalable Hidden Services

2013-10-28 Thread Matthew Finkel
On Mon, Oct 28, 2013 at 12:53:35PM -0400, Nick Mathewson wrote: > On Mon, Oct 28, 2013 at 9:19 AM, Matthew Finkel > wrote: > > Hi everyone, > > > > This is a proposal I wrote to implement scalable hidden services. It's > > by no means finished (there are some

[tor-dev] [Draft Proposal] Scalable Hidden Services

2013-10-28 Thread Matthew Finkel
Hi everyone, This is a proposal I wrote to implement scalable hidden services. It's by no means finished (there are some slight inconsistencies which I will be correcting later today or tomorrow) but I want to make it public in the meantime. I'm also working on some additional security measures th

Re: [tor-dev] Notes on HS revamping

2013-10-22 Thread Matthew Finkel
Hey George, Thanks for sending this to the list. On Thu, Oct 17, 2013 at 02:18:01AM +0100, George Kadianakis wrote: > 3.3 What are other anonymous publishing protocols doing here? I2P seems > to be weak here too, according to Grothoff's recent paper. Do you have a link? I found [0] but wan

Re: [tor-dev] Hidden Service Scaling

2013-10-15 Thread Matthew Finkel
On Sun, Oct 13, 2013 at 10:22:29PM +0100, Christopher Baines wrote: > On 09/10/13 18:05, Matthew Finkel wrote: > >>>> These two changes combined should help with the two goals. Reliability > >>>> is improved by having multiple OP's providing the service, and

Re: [tor-dev] Hidden Service Scaling

2013-10-09 Thread Matthew Finkel
On Wed, Oct 09, 2013 at 09:58:07AM +0100, Christopher Baines wrote: > On 09/10/13 01:16, Matthew Finkel wrote: > >> Then comes the second problem, following the above, the introduction > >> point would then disconnect from any other connected OP using the same > >&g

Re: [tor-dev] Hidden Service Scaling

2013-10-08 Thread Matthew Finkel
Hi Christopher, It's great that you started thinking about a design (and the potential obstacles). I will try not to reiterate what Nick already said, though. On Tue, Oct 08, 2013 at 06:52:39AM +0100, Christopher Baines wrote: > I have been looking at doing some work on Tor as part of my degree,

Re: [tor-dev] RFC of proposal draft for "Migration to ed25519 HS identity keys and privacy-preserving directory documents"

2013-09-16 Thread Matthew Finkel
On Fri, Sep 13, 2013 at 05:39:30PM +0300, George Kadianakis wrote: > Here is another HS proposal draft. > > Inlining: > > Filename: xxx-hs-id-keys-migration.txt > Title: Migration to ed25519 HS identity keys and privacy-preserving directory > documents > Author: George Kadianakis > Created: 13 Se

Re: [tor-dev] Retiring old user number estimates

2013-09-16 Thread Matthew Finkel
On Mon, Sep 16, 2013 at 08:28:21PM +0200, Karsten Loesing wrote: > Hi everyone, > > some of you may already know our new approach to estimating daily Tor users: > > https://metrics.torproject.org/users.html#userstats > > This new approach is in beta since April, and I'm quite happy with it. > I

Re: [tor-dev] Draft of proposal "Stop HS address enumeration by HSDirs"

2013-08-16 Thread Matthew Finkel
Greetings Sir, On Fri, Aug 16, 2013 at 05:31:33PM +0300, George Kadianakis wrote: > Greetz, > > I'm posting the draft of a proposal that specifies how to hide HS > descriptors and addresses from the hidden service directories. > > This proposal is supposed to go along with the proposal that spec

Re: [tor-dev] Torsocks development status

2013-06-27 Thread Matthew Finkel
On Thu, Jun 27, 2013 at 05:39:08PM -0400, David Goulet wrote: > > > Matthew Finkel: > > On Thu, Jun 27, 2013 at 03:11:23PM -0400, David Goulet wrote: > >> Ian Goldberg: > >>> Are non-blocking sockets, select/poll/etc. (especially at connect() > >>&

Re: [tor-dev] Torsocks development status

2013-06-27 Thread Matthew Finkel
On Thu, Jun 27, 2013 at 03:11:23PM -0400, David Goulet wrote: > Ian Goldberg: > > Are non-blocking sockets, select/poll/etc. (especially at connect() > > time), and optimistic data on the to-do list? > > Yes! Good point I should have put the todo list. So yes, non block socket > support. > > For

Re: [tor-dev] Vidalia 2.0 - an complete rewrite

2013-06-24 Thread Matthew Finkel
On Mon, Mar 11, 2013 at 2:40 AM, Leo Unglaub wrote: > > I also have named my tool. It's called "Gibbs". I also created a github > repository where i will push my local git repository the next couple of > days. I also want to release some screenshots soon so you can see what is > comming. > > http

Re: [tor-dev] Torsocks locking design

2013-06-12 Thread Matthew Finkel
On Sun, Jun 09, 2013 at 04:52:45PM -0400, David Goulet wrote: > Hi everyone, > Hi David! > I'm posting here the small design document I've made for the Torsocks locking > mechanism. > > I'm looking for reviews, comments, improvements, ... well anything useful! :). > (Even English mistakes since

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-07 Thread Matthew Finkel
On Fri, Jun 07, 2013 at 02:23:55AM -0400, grarpamp wrote: > >> This has the side effect of promoting good onion upkeep. > > Which people might be loathe to do given the recent paper > about deanon hidden services seeming to be relatively doable. > At least until those issues are solved... > > > o

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-06-06 Thread Matthew Finkel
On Fri, May 17, 2013 at 06:23:28AM -0700, George Kadianakis wrote: > Greetings, > > I'm supposed to write a Tor proposal for the migration of the > long-term identity keys of Hidden Services. When I began writing the > proposal, I realized that some of my choices might not be appreciated by > Hidd

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-06-06 Thread Matthew Finkel
On Fri, May 17, 2013 at 03:44:27PM +0200, Jeroen Massar wrote: > On 2013-05-17 15:23 , George Kadianakis wrote: > [..] > > That is, when we change the identity keys of a Hidden Service, its > > onion also changes (since the onion is the truncated hash of its > > public key). This will be quite prob

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-06-06 Thread Matthew Finkel
On Mon, May 20, 2013 at 12:25:03AM -0400, Tom Ritter wrote: > On 17 May 2013 09:23, George Kadianakis wrote: > > > There are basically two ways to do this: > > > > A third comes to mind, somewhat similar to Mike's. > > If we believe that 1024 RSA is not broken *now* (or at the very least, if >

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-06 Thread Matthew Finkel
On Thu, Jun 06, 2013 at 12:48:42PM +, Matthew Finkel wrote: > On Mon, May 20, 2013 at 12:11:37AM -0400, Griffin Boyce wrote: > > Matthew Finkel wrote: > Unless, are you talking about running I2P and Tor on the same > computer/network and being able use the same naming schem

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-06 Thread Matthew Finkel
On Mon, May 20, 2013 at 12:11:37AM -0400, Griffin Boyce wrote: > Matthew Finkel wrote: > > > So I think we should make some terms clear (just for the sake of > > clarity). We have, I guess, three different naming-system ideas > > floating here: petnames, (disti

Re: [tor-dev] Building better pluggable transports (Google Summer of Code)

2013-05-28 Thread Matthew Finkel
On Tue, May 28, 2013 at 02:33:40PM -0400, Tom Ritter wrote: > I have another idea. (Not "another" in the sense of "do this instead", but > "another" in the sense of "maybe do this additionally"). > > Can a country block SSH? Surely state-sponsored network operations take > place over SSH, so I s

Re: [tor-dev] "Trawling for Tor Hidden Services: Detection, [...]"

2013-05-25 Thread Matthew Finkel
On Fri, May 24, 2013 at 12:32:20AM -0400, Jon Smithe wrote: > Hi, > > > As for the deanonymization attack, I think it is pretty novel in that it > > uses a custom traffic signature to make the attack from > > http://freehaven.net/anonbib/cache/hs-attack06.pdf more reliable, but > > otherwise that

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-05-19 Thread Matthew Finkel
I liked the new subject, so I'm sticking with it. :) On Sun, May 19, 2013 at 04:37:22AM -0700, George Kadianakis wrote: > > adrelanos: > >> George Kadianakis: > >> I don't know if the petname system is an completely orthogonal issue or > >> if it could be considered when you decide this one. > >>

Re: [tor-dev] BridgeDB - Bridge Distribution Modifications

2013-05-14 Thread Matthew Finkel
On Tue, May 14, 2013 at 09:42:47AM +0200, Karsten Loesing wrote: > On 5/14/13 8:08 AM, Matthew Finkel wrote: > > Hi all, > > > > Over the last few weeks I've been working with George and Aaron on > > updating BridgeDB's code with respect to how it handles plug

[tor-dev] BridgeDB - Bridge Distribution Modifications

2013-05-13 Thread Matthew Finkel
Hi all, Over the last few weeks I've been working with George and Aaron on updating BridgeDB's code with respect to how it handles pluggable transports. I've made some decent progress, but there are some questions that I'd like to ask (because I'm not sure I should be the one making the decision).

Re: [tor-dev] Iran

2013-05-05 Thread Matthew Finkel
On Sun, May 05, 2013 at 04:18:56PM +0300, George Kadianakis wrote: > tor-admin writes: > > > On Sunday 05 May 2013 14:50:51 George Kadianakis wrote: > >> It would be interesting to learn which ports they currently whitelist, > >> except from the usual HTTP/HTTPS. > >> > >> I also wonder if they

Re: [tor-dev] Source Code Static Analisys

2013-04-28 Thread Matthew Finkel
On Sun, Apr 28, 2013 at 04:39:55PM -0300, Ulises Cuñé wrote: > I send you a new Security Report. > > Regards, > U > > > 2013/4/27 Nick Mathewson > > > On Sat, Apr 27, 2013 at 7:16 PM, Ulises Cuñé wrote: > > > I want colaborate with Tor project. > > > > > > I send a document of analys source c

Re: [tor-dev] Remote anonymous browsing

2013-04-16 Thread Matthew Finkel
On Tue, Apr 16, 2013 at 10:49:38PM -0400, Paul Syverson wrote: > On Wed, Apr 17, 2013 at 12:46:17AM +0000, Matthew Finkel wrote: > > > > 4) Who do you trust? With this remote-proxy, it really depends on what > > you're looking to gain from using the Tor netw

Re: [tor-dev] Remote anonymous browsing

2013-04-16 Thread Matthew Finkel
On Wed, Apr 17, 2013 at 12:04:52AM +0530, mahesh wrote: > Hi, I am a third year undergraduate student of Information Technology at > PICT, Pune, India. I'm dying to contribute to tor community as I use it > a lot. There's an opportunity for me in GSOC-2013. I read tor's idea > page and came to k

Re: [tor-dev] Remote anonymous browsing

2013-04-16 Thread Matthew Finkel
On Tue, Apr 16, 2013 at 04:11:37PM -0400, Paul Syverson wrote: > On Tue, Apr 16, 2013 at 07:35:45PM +, adrelanos wrote: > > > I think that having a web server to handle Tor requests would defeat the > > > purpose of obfuscation because the server's IP address would be public and > > > censors

Re: [tor-dev] final torsocks RC 1.3 tar.gz up for testing

2013-01-30 Thread Matthew Finkel
On Jan 29, 2013 10:11 PM, "grarpamp" wrote: > > > Thus, I am declaring the following tar.gz to be the final RC for 1.3: > > Though I don't actually use it on FreeBSD RELENG_4 anymore, > it doesn't compile there. If someone has old routers or something > based on that they should speak up. Do you

Re: [tor-dev] [tor-talk] torsocks is broken and unmaintained

2012-12-01 Thread Matthew Finkel
On 12/02/2012 01:27 AM, grarpamp wrote: https://gitweb.torproject.org/torsocks.git/shortlog/refs/heads/dlerror It seems to fix the issues on my Ubuntu system. I could use some testing > >> https://code.google.com/p/torsocks/issues/detail?id=3#c47 > > These compile on freebsd 8.x: > ee

Re: [tor-dev] [tor-talk] torsocks is broken and unmaintained

2012-12-01 Thread Matthew Finkel
On 11/25/2012 10:13 AM, Sean Robinson wrote: > On Sun, Nov 4, 2012 at 4:03 PM, Jacob Appelbaum wrote: >> >> I've pushed my first branch to fix the dlopen bugs: >> >> https://gitweb.torproject.org/torsocks.git/shortlog/refs/heads/dlerror >> >> It seems to fix the issues on my Ubuntu system. I cou

Re: [tor-dev] [tor-talk] torsocks is broken and unmaintained

2012-12-01 Thread Matthew Finkel
On 11/25/2012 10:13 AM, Sean Robinson wrote: > On Sun, Nov 4, 2012 at 4:03 PM, Jacob Appelbaum wrote: >> >> I've pushed my first branch to fix the dlopen bugs: >> >> https://gitweb.torproject.org/torsocks.git/shortlog/refs/heads/dlerror >> >> It seems to fix the issues on my Ubuntu system. I cou

Re: [tor-dev] TBB Gentoo ebuild

2012-08-27 Thread Matthew Finkel
On Sun, Aug 26, 2012 at 5:35 PM, julian wrote: > 13 Aug 00:28 Matthew Finkel: >> 4) Given 3), is there a reason Tor is not at least an optional >> RDEPEND for torbrowser via a USE flag (or another way)? > > There are no optional runtime-only dependencies in gentoo, this cou

Re: [tor-dev] TBB Gentoo ebuild

2012-08-12 Thread Matthew Finkel
On Sun, Aug 12, 2012 at 1:21 PM, Alessandro Di Federico wrote: > Hi, I'm trying to put up an ebuild for the Tor Browser Bundle for > Gentoo. As you may know an ebuild is a script which automates the build > of a certain application. We already have something in Portage [2] (the > official ebuild