Thank you, Proposal 140 sounds perfect for what I need, that would minimize
traffic quite a bit! I see some code for it at
https://gitweb.torproject.org/tor.git/log/?qt=grep&q=prop140 , I'm guessing
it's not complete yet.
Thanks again,
Razvan
On Sat, Apr 8, 2017 at 12:43 PM, nusenu wrote:
> > I
the moment and I think the default is to re-download every 3 hours, so
that's 18.4MB/day or 552MB/month. Is there any way to reduce this while
still maintaining good citizenship on the Tor network? Are there any
recommended options for low-bandwidth nodes?
Thank you,
Razvan
--
Razvan Dragomi
Allow me to second that - for some applications (Internet of Things being
the one I'm working on), the volume of data exchanged is very small, so
there isn't much chance for packets to be lost or retransmitted. OnionCat +
Tor simplify development immensely by giving each node a fixed IPv6
address,
script given as a
parameter on each IPv6 to name lookup (and checking that the returned name
hashes back to the IPv6 address expected).
I think OnionVpn may be easier to modify than OnionCat, given that it's
Python.
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Gra
OnionCat devs
fix bugs for us :). I just didn't want to duplicate effort, so if they have
a plan to adapt their tools to v3, I'd rather wait for their solution than
do a half-baked one of our own.
Razvan
On Tue, Sep 13, 2016 at 10:31 PM, s7r wrote:
>
> On 9/13/2016 6:13 PM, Razv
I disagree with your approach, for comparison's sake, let's say v2 is IPv4
and v3 is IPv6. When IPV6 was introduced, IPv4 was kept around (and still
is to this day, although IPv6 is arguably a much better solution in a lot
of areas). Expecting _everyone_ to just switch to IPv6 or get cut off is a
b
it can
be used for a variety of things while putting very little stress on the
network components. Very little traffic, potentially large PR impact (in a
good way :) ).
Razvan
On Tue, Sep 13, 2016 at 1:29 AM, Ivan Markin wrote:
> Razvan Dragomirescu:
> > Thank you Ivan! I still dont see a
ote:
> Hi Razvan,
>
> Razvan Dragomirescu:
> > I've developed against the current hidden service infrastructure and it
> > appears to work like a charm, but I'm a bit worried about Prop224. That
> > will break both the OnionBalance-like service re-registration
ployed (only their owner can access them), so we
cannot force an upgrade, we can just suggest it to the owner and come up
with a procedure for them to do so.
Any ideas?
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
___
I've just tried the patch from ticket 20082 and it works great for me. I
was actually wondering why it was taking so long for a ephemeral hidden
service to get registered in my SIM4Things project (I register an ephemeral
service first to get Tor to setup the introduction points, then re-register
it
seless, I just
don't see the point, maybe I'm missing something.
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sat, Jul 30, 2016 at 9:44 PM, Lunar wrote:
> George Kadianakis:
> > this is an experimental mail meant to address legitimate
Thank you Tim! For the record, GETINFO works ok in 0.2.8.4-rc (unstable).
HSFETCH still doesn't and I'll file a bug for it.
Razvan
On Thu, Jun 30, 2016 at 1:28 AM, Tim Wilson-Brown - teor wrote:
>
> > On 30 Jun 2016, at 06:42, Razvan Dragomirescu <
> razvan.dr
y "hs/service/desc/id/js2usypscw6y6c5e"*
Any ideas? I'm running Tor 0.2.7.6 btw. This also appears to happen with
non-authenticated services, but the hs/service/desc/id/ was supposed
to have been merged back in 0.2.7.1 (??).
Razvan
On Wed, Jun 29, 2016 at 11:14 PM, Razvan Dragomiresc
ces with basic auth
and I couldn't find a way to obtain the hidden service descriptor from the
hidden service machine itself before publishing. Any advice would be
appreciated.
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
_
using the consensus hash as a future unpredictable value, etc).
As of last night, I have a very basic proof of concept, it needs a bit of
polish and then I'll start showing it off and submitting it to external
analysis.
Thank you!
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne G
't inject a hash computed somewhere else
into the signed descriptor).
3. The card doesn't have to parse the consensus - it just uses it as a
shared random value (the hash of the consensus).
Makes sense?
Thank you,
Razvan
On Tue, Jun 28, 2016 at 6:02 AM, Tim Wilson-Brown - teor wrot
lay? Or am I missing some random data that the DA includes
in its vote that could be used for this?
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Mon, Jun 27, 2016 at 10:30 PM, Razvan Dragomirescu <
razvan.dragomire...@veri.fi> wrote:
> Thank y
ttacker can only launch a Denial of
Service type of attack (preventing the legitimate node from getting the
traffic) but cannot decrypt or encrypt traffic from/to that node.
Thanks again,
Razvan
On Mon, Jun 27, 2016 at 9:02 AM, Tim Wilson-Brown - teor wrote:
> Hi Razvan,
>
> >
per, but a lot harder to find.
Razvan
On Sun, Jun 26, 2016 at 3:32 PM, Razvan Dragomirescu <
razvan.dragomire...@veri.fi> wrote:
> Thank you s7r, Tom,
>
> I'll try to explain what I'm doing - I'm working on something called
> SIM4Things - it's an Inter
ical SIM) and a way to
talk to similar nodes, with no central server or censorship opportunity.
If you have any questions, feel free to ask.
Thanks,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sun, Jun 26, 2016 at 1:29 AM, s7r wrote:
> Hello,
>
> If yo
epend on an unpredictable
future value (the hash of the consensus at that time), an attacker can only
generate descriptors for past and current time periods.
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
___
tor
ime period), I want to use that.
I'll take a look at the doc you've linked to, thank you!
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Mon, Jun 20, 2016 at 7:51 PM, Ivan Markin wrote:
> Hello Razan,
>
> Razvan Dragomirescu:
> > I
Any hints would be appreciated. Thank you!
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ASAP).
Thanks,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Mon, May 23, 2016 at 11:25 PM, Evan Margin wrote:
> Hey Razvan and tor-dev@!
>
> Razvan Dragomirescu:
> > I wanted to revisit this subject and actually start writing some
> > co
o the card - that only does RSA key
generation and signing, nothing else. Easy to write and easy to audit.
Thanks again,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Mon, May 23, 2016 at 11:26 PM, Evan Margin wrote:
> Hello Donncha!
>
> Donncha Ó Cearbhaill:
microdescriptors for relays in the network. I
> don't have exact numbers for how much is this but count few MBs at every
> 2 hours just to be sure.
>
> On 5/23/2016 12:56 AM, Razvan Dragomirescu wrote:
> > Hello everyone,
> >
> > I'm working on an Internet
I can't seem to
find that link or page anywhere now... :(.
Any hints on where to find this type of info (or maybe how to measure it
myself) would be appreciated.
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
___
Hello again,
I wanted to revisit this subject and actually start writing some code, but
it looks like Ivan Markin's GitHub account is gone, together with all the
code there. Ivan, are your modifications to OnionBalance still available
anywhere?
Thank you,
Razvan
--
Razvan Dragomirescu
Yes, that's precisely the point - if the card is stolen, the service is
stolen with it. I'm not trying to prevent that, I'm trying to _tie_ the
service to the card - whoever has the card runs the service. If you see
that the card is gone, you know your service is gone too. If the card is
still ther
e any backwards compatibility or will old hidden services simply
stop working at that point?
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sun, Oct 18, 2015 at 12:08 PM, Razvan Dragomirescu <
razvan.dragomire...@veri.fi> wrote:
> Thank you Ivan!
&
ter out of band, like OnionBalance does. I just do it from the
same host instead of a frontend machine and I do it by signing with the
smartcard key (and generating the name based on that).
Thanks again,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sun, Oct 18, 2015
wo
smartcards establish their own encrypted channel over that connection. A
compromised host can only deny service or redirect traffic somewhere else,
but still can't make the smartcard accept injected traffic and can't
extract the keys on it. I'm basically using Tor as a transpo
at keeping
secret keys secret, both from a software attack and from a hardware (drop
the card in acid, use a logic analyzer kind of) attack.
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sat, Oct 17, 2015 at 11:40 PM, Ivan Markin wrote:
> Ken Keys:
> >> &
or Amazon's new IoT service, but those would depend on PubNub/Amazon.
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sat, Oct 17, 2015 at 10:13 PM, Ivan Markin wrote:
> Razvan Dragomirescu:
> > Thank you Ivan, I've taken a look but as far as
small
embedded tamper-resistant _computer_ - you never ask it for the key, you
ask it to _decrypt_ something for you or _sign_ something for you, you can
never extract the key out of the card.
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sat, Oct 17, 2015 at 9:36 PM
crypt traffic with it, so he or she is the owner of the service.
Best regards,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Sat, Oct 17, 2015 at 4:43 AM, Ivan Markin wrote:
> Hello,
> Razvan Dragomirescu:
> > I am not sure if this has been discussed befo
can change the
_current_ content or serve his own, but cannot permanently compromise the
service by reading its private key.
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
On Fri, Oct 16, 2015 at 1:56 AM, grarpamp wrote:
> On Tue, Oct 13, 2015
doing this? Would
it be just a matter of configuring OpenSSL to use the card (I haven't tried
that yet)?
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Technology Officer
Cayenne Graphics SRL
___
tor-dev mailing list
tor-dev@lists.torpr
38 matches
Mail list logo