Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-20 Thread Sebastian Hahn
> On 18. Jan 2021, at 18:00, Roger Dingledine wrote: > While I was looking at moria1's directory activity during the overload, > I did say to myself "wow that's a lot of microdescriptor downloads". > > So hearing that torpy isn't caching mirodescriptors yet makes me think > that it's a good bet

Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-15 Thread Sebastian Hahn
Hi James, thanks for already working on patches for these issues! I will reply inline some more. > On 15. Jan 2021, at 23:56, James wrote: > > First of all, sorry if torpy hurt in some way Tor Network. It was > unintentionally. I believe you :) > In any case, it seems to me that if there was

Re: [tor-dev] DirAuth usage and 503 try again later

2021-01-11 Thread Sebastian Hahn
> On 11. Jan 2021, at 23:20, James wrote: > > Good day. > > Is there any chance that torpy (https://github.com/torpyorg/torpy) was > triggered this issue > https://gitlab.torproject.org/tpo/core/tor/-/issues/33018 ? > > Some wary facts: > - Torpy using old fashion consensus (not mircodesc)

Re: [tor-dev] How do Ed25519 relay IDs look like?

2020-08-01 Thread Sebastian Hahn
Hi Damian, > On 2. Aug 2020, at 00:04, Damian Johnson wrote: > >> I'd like to use "ed25519 identity" or even just "identity" here going >> forward. > > Gotcha. The name of 'identity' makes me wonder how this relates to > relay fingerprints, which are the canonical identifier we use. > > Regardles

Re: [tor-dev] Proposal 320: Removing TAP usage from v2 onion services

2020-05-19 Thread Sebastian Hahn
Hi there, > On 19. May 2020, at 19:55, Nick Mathewson wrote: > If we do decide to finally deprecate v2 onion services, that would be > a significant maintenance burden reduced for us, but we'd have to > handle the transition carefully. Unlike all the other migrations > we've done, there isn't a

Re: [tor-dev] Is there strictly a one-to-one BW scanner to BW auth relationship?

2018-03-25 Thread Sebastian Hahn
> On 24. Mar 2018, at 13:50, Rob Jansen wrote: >> I think moria1 runs its own, and Faravahar runs its own. I've lost track >> of the others, but I'd guess that bastet also runs its own, and that >> maatuska pulls numbers from a bwauth that tjr runs. >> >> https://consensus-health.torproject.org/

Re: [tor-dev] blacklisting relays with end-to-end correlation capabilities?

2017-05-09 Thread Sebastian Hahn
Dear all, below mail was meant to make it to tor-dev, but I got a bounce and didn't notice until now. Whoops, my apologies. > On 8. Dec 2016, at 14:29, Sebastian Hahn wrote: > > Hi, > >> On 08 Dec 2016, at 14:03, nusenu wrote: >> >> Dear tor directory

[tor-dev] Tor in a safer language: Network team update from Amsterdam

2017-03-31 Thread Sebastian Hahn
Hi there tor-dev, as an update to those who didn't have the chance to meet with us in Amsterdam or those who haven't followed the efforts to rely on C less, here's what happened at the "let's not fight about Go versus Rust, but talk about how to migrate Tor to a safer language" session and what ha

Re: [tor-dev] blacklisting relays with end-to-end correlation capabilities?

2016-12-09 Thread Sebastian Hahn
> On 08 Dec 2016, at 15:02, nusenu wrote: >> If we did this, also why would we blacklist the nonexit relays? That >> seems to not make sense, as a relay operator could have multiple relays >> that act as guard and exit simultaneously. > > Exit relays with the guard flag have usually a guard prob

[tor-dev] Requiring p lines in consensuses

2016-08-30 Thread Sebastian Hahn
Hi there, Karsten and I have been working on metrics-related tasks and one thing that's got a potential to cause us pain going forward is that of "p"-lines in consensuses. Tor has added them with consensus method 5 but only declared them to be optional. In practice, every consensus ever produced t

[tor-dev] [::]/8 is marked as private network, why?

2016-03-29 Thread Sebastian Hahn
Hey, I've been wondering about the private_nets const in src/or/policies. It was added in a96c0affcb4cda1a2e0d83d123993d10efc6e396 but Nick doesn't remember why, and I'm hoping someone has an idea (maybe teor, who I've CCed here, who documented this in a later commit?). If nobody knows why we do t

[tor-dev] Dynamically updating tor

2015-10-10 Thread Sebastian Hahn
Hi list, I recently played with the Kitsune[0] framework to figure out whether we might be able to use it to dynamically update (that is, perform an update without restarting the process) Tor relays on Linux. This post is just to make you aware such a thing has been attempted. I deem it currently

Re: [tor-dev] Draft proposal -- no number yet: How to safely drop support for old clients.

2015-09-30 Thread Sebastian Hahn
Hi, comments inline. On 09/30/2015 12:01 PM, Nick Mathewson wrote: Early versions of Tor checked the recommended-versions field in the directory to see whether they should keep running. If they didn't recognize you did the thing where you To override this, a Tor instance m

Re: [tor-dev] [tor-reports] Sebastian's August 2015

2015-09-10 Thread Sebastian Hahn
> On 11 Sep 2015, at 07:04, ilv wrote: >> Next up is more of the same, especially focusing on website tickets >> and preparing the community team's dev meeting contributions. > > Maybe we could have a session at the dev meeting to talk about the > website (content, structure, translations, etc.)

Re: [tor-dev] tor's definition of 'median'

2015-08-13 Thread Sebastian Hahn
> On 13 Aug 2015, at 18:50, Nick Mathewson wrote: > > On Wed, Aug 12, 2015 at 5:34 PM, nusenu wrote: >> from today's measurement meeting: >> >>> 15:00:20 karsten: I've decided I'm going to fix the definition of >>> median >>> 15:00:26 in the tor sourcecode >>> 15:00:36 virgil: is it broken

Re: [tor-dev] Brainstorming ideas for controller features for improved testing; want feedback

2015-03-26 Thread Sebastian Hahn
Hi! > On 20 Mar 2015, at 16:55, Nick Mathewson wrote: > > IDEAS > = Many great ideas! Here's a few more, mostly just adding a bit to the things you already listed. Some of them make me kind of uneasy because they really are testing only and could be used for much unhappiness on the real net

Re: [tor-dev] #if 0 unused functions?

2015-03-22 Thread Sebastian Hahn
Hi teor, > On 22 Mar 2015, at 14:41, teor wrote: >> Date: Sun, 22 Mar 2015 05:12:03 +0100 >> From: Sebastian Hahn >> To: tor-dev@lists.torproject.org >> >> Hi there, >> >> we have some functions which we never call anywhere. In many cases, it

[tor-dev] #if 0 unused functions?

2015-03-21 Thread Sebastian Hahn
Hi there, we have some functions which we never call anywhere. In many cases, it appears we shouldn't delete them from the source because they "belong" there - the thing I initially stumbled across was ed25519_seckey_write_to_file(), for example. But I also don't see why compiling it and potential

[tor-dev] Removal of Vidalia-related content from Tor's website

2015-02-08 Thread Sebastian Hahn
Hi, I'm currently working on cleaning up the website. Our Vidalia bundles haven't been maintained in a long time, Tor Browser is the best way to use Tor as a client and nobody is stepping up to replace maintainership of the windows bundles. I'm removing the link to these bundles as well as the re

Re: [tor-dev] Internet-wide scanning for bridges

2014-12-17 Thread Sebastian Hahn
Hi there, On 14 Dec 2014, at 20:06, Vlad Tsyrklevich wrote: > I'm not against keeping some around, but this warning is unlikely to turn > around the thousands that currently match this configuration--hopefully it'll > just encourage future bridge operators to use a 'safer' configuration. The >

Re: [tor-dev] Git hosting changes, git:// support discontinued

2014-11-30 Thread Sebastian Hahn
Hi Jason, On 30 Nov 2014, at 23:32, Jason Cooper wrote: > On Sun, Nov 30, 2014 at 06:48:09PM +0100, Sebastian Hahn wrote: >> Access via https:// has been provided for years, and should continue >> to work without any hiccups. > > No issue there for folks that prefer the e

[tor-dev] Git hosting changes, git:// support discontinued

2014-11-30 Thread Sebastian Hahn
Hi there, git users! Today, weasel changed our gitweb setup to use cgit from now on in the wake of a migration to wheezy. This move hopefully improves speed without taking away any needed functionality. At the same time, we've discontinued supporting clones via the git:// Protocol. It is unauthen

Re: [tor-dev] Understanding bwauth data in Stem?

2014-11-21 Thread Sebastian Hahn
Hi there, On 21 Nov 2014, at 23:44, Damian Johnson wrote: >> In other words, if I sorted the descriptors by "measured" value, what would >> that order mean? > > I *think* that would be the ordering of 'relays who receive the most tor > client traffic due to having a more highly weighted heuristi

Re: [tor-dev] Building TOR using Visual Studio

2014-10-18 Thread Sebastian Hahn
On 18 Oct 2014, at 06:29, teor wrote: > Are there no-cost, non-license-restricted compilers available for Windows > that support C99? > > This could be a way out for those who don't wish to pay for the VS 2013 > upgrade. > > But it's a bit more of a barrier than using an existing compiler on

Re: [tor-dev] Building TOR using Visual Studio

2014-10-17 Thread Sebastian Hahn
On 17 Oct 2014, at 18:07, M. Ziebell wrote: > Looking at this blog post [1] even the support for C99 in VS2013 is > limited. I don't know if tor hit the limitations, that's for you to > decide. > > C99 is 15 years old ... It should be "sane" to use it. Please also see bug #13260 and its friend

Re: [tor-dev] Scaling tor for a global population

2014-09-28 Thread Sebastian Hahn
On 28 Sep 2014, at 16:33, Tom Ritter wrote: > On 28 September 2014 07:00, Sebastian Hahn wrote: >> This analysis doesn't make much sense, I'm afraid. We use compression >> on the wire, so repeating flags as human-readable strings has a much >> lower overhead tha

Re: [tor-dev] Scaling tor for a global population

2014-09-28 Thread Sebastian Hahn
On 28 Sep 2014, at 02:12, Tom Ritter wrote: > why not also change the consensus > and related document formats to be something more efficient than ASCII > text? Taking the latest consensus and doing some rough estimates, I > found the following: > > Original consensus, xz-ed: 407K > Change flag

Re: [tor-dev] Scaling tor for a global population

2014-09-26 Thread Sebastian Hahn
On 27 Sep 2014, at 02:18, Mike Perry wrote: > If we were willing to tolerate 10% directory overhead this would allow > for 5 times as many users. In other words, 100M daily connecting users. > > We would still need to find some way to fund the growth of the network > to support this 40X increase

Re: [tor-dev] Guardiness: Yet another external dirauth script

2014-09-16 Thread Sebastian Hahn
On 16 Sep 2014, at 16:15, George Kadianakis wrote: > How guardiness works > The idea was that the guardiness script will be an external script > that is run by Tor in a similar fashion to the bandwidth auth > scripts. We chose that because we could write the script in a > high-level langu

Re: [tor-dev] Proposal 220 (revised): Migrate server identity keys to Ed25519

2014-08-17 Thread Sebastian Hahn
Hi Nick, On 25 Feb 2014, at 17:18, Nick Mathewson wrote: > To mirror the way that authority identity keys work, we'll fully > support keeping Ed25519 identity keys offline; they'll be used to > sign long-ish term signing keys, which in turn will do all of the > heavy lifting. A signing k

Re: [tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-08-13 Thread Sebastian Hahn
On 18 Apr 2014, at 21:56, Nick Mathewson wrote: > Thanks! I've added this as proposal 235. Code review down to 0.2.3.x has shown that the naming-related code hasn't changed much at all, and no issues were found which would mean a Named-flag free consensus would cause any problems. gabelmoo and

Re: [tor-dev] [GSoC] Consensus diffs - Fifth report

2014-08-02 Thread Sebastian Hahn
On 02 Aug 2014, at 21:25, Daniel Martí wrote: > This is the fifth status report of my Google Summer of Code project, > which is to implement consensus diffs for Tor. My mentors - Sebastian and > Nick - and myself usually hold meetings on IRC on wednesday at 16h UTC. 14h UTC. __

Re: [tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-04-18 Thread Sebastian Hahn
On 18 Apr 2014, at 19:52, Nick Mathewson wrote: > Imo we _should_ check through the code for things related to the Named > flag, though, back through 0.2.3 or maybe 0.2.2. Reasons: > > * Private networks never worked very well with older tors. > * Maybe there's some piece of obscure functiona

Re: [tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-04-18 Thread Sebastian Hahn
On 18 Apr 2014, at 15:02, Karsten Loesing wrote: > If I understand the proposal correctly, operators will still be able to > name their relay or bridge, and people can still find it in Atlas or > Globe by this nickname. If so, great! Yes, this is in no way related to the nickname field. >> T

[tor-dev] Proposal idea: Stop assigning (and eventually supporting) the Named flag

2014-04-10 Thread Sebastian Hahn
Filename: xxx-kill-named-flag.txt Title: Stop assigning (and eventually supporting) the Named flag Authors: Sebastian Hahnn Created: 10 April 2014 Target: 0.2.5 Status: Draft 1. Intro and motivation Currently, Tor supports the c

Re: [tor-dev] TorBEL migration

2013-04-29 Thread Sebastian Hahn
On Apr 30, 2013, at 3:17 AM, Sreenatha Bhatlapenumarthi wrote: > Hi, > > My name is Sreenatha Bhatlapenumarthi. I'd like to migrate TorBEL > from TorCtl to Stem as a part of GSoC'13 project this summer. Hi Sreenatha, great to hear from you! > Damian pointed out that there is still some impro

Re: [tor-dev] Parallel release series for directory authorities?

2012-09-04 Thread Sebastian Hahn
On Sep 1, 2012, at 1:02 AM, Roger Dingledine wrote: > On Sat, Sep 01, 2012 at 12:36:51AM +0200, Linus Nordberg wrote: >> Just a thought. A few of the directory authorities, I think at least >> three, as well as the bridge authority run packages/ports only, not >> builds from source. We'd have to

Re: [tor-dev] Win32/MSVC: tinytest.c problems

2012-05-05 Thread Sebastian Hahn
On May 5, 2012, at 3:30 PM, Gisle Vanem wrote: > There are 2 problems with the use of 'stricmp()' (line 295) in tinytest.c. > > 1. As it is now, I'm getting an undefined reference to 'stricmp' when > linking tinytest.exe and using '-nodefault:oldnames' in the link-flags. Can > we please remo

Re: [tor-dev] [PATCH] tor-exit-notice.html: shorten Cornell URLs

2012-03-17 Thread Sebastian Hahn
On Mar 17, 2012, at 8:37 AM, Christian Kujau wrote: > Hi, > > these ever so long law.cornell.edu URLs are now automatically redirecting > to a shorter version - let's use that in our tor-exit-notice.html as well. > > Christian. Hi, and thanks for the patch. I've filed a trac ticket[0] for thi

Re: [tor-dev] Proposal 193: Safe cookie authentication

2012-03-16 Thread Sebastian Hahn
On Feb 10, 2012, at 12:02 AM, Robert Ransom wrote: > The sole exception to ‘non-safe cookie authentication must die’ is > when a controller knows that it is connected to a server process with > equal or greater access to the same filesystem it has access to. In > practice, this means ‘only if you

Re: [tor-dev] DNS/DNSSEC resolving in Tor (PoC implementation)

2012-01-31 Thread Sebastian Hahn
On Feb 1, 2012, at 2:48 AM, Watson Ladd wrote: > On Tue, Jan 31, 2012 at 2:57 PM, Nick Mathewson wrote: >> Another possibility is this: >> >> Browser's resolver -> Tor Client (as DNSPort): "Resolve >> www.example.com, give me an A, and give me DNSSec stuff too." >> Tor Client-> Tor net-> Tor Exi

Re: [tor-dev] Using Tor w/o GeoIP

2012-01-22 Thread Sebastian Hahn
On Jan 23, 2012, at 2:38 AM, Nathan Freitas wrote: > It is legal on Android, but I have always been concerned about that sort > of secondary download from a Tor perspective, in that you would want to > make sure it was downloaded through the Tor network itself, right? > > Maybe I can just create

Re: [tor-dev] Using Tor w/o GeoIP

2012-01-22 Thread Sebastian Hahn
On Jan 20, 2012, at 1:48 AM, Nathan Freitas wrote: > Is it the geoip database only required if you are specifying > Exit/Entrances nodes by country code? > > I am thinking about not fully unpacking it into Android storage, unless > the user activates those option in Orbot. This will save quite a

[tor-dev] Automatically retrieve and store information about bridges

2011-11-30 Thread Sebastian Hahn
Filename: xxx-store-bridge-information.txt Title: Automatically retrieve and store information about bridges Author: Sebastian Hahn Created: 16-Nov-2011 Status: Open Target: 0.2.[45].x Overview: Currently, tor already stores some information about the bridges it is configured to use locally, but

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-11-27 Thread Sebastian Hahn
On Nov 25, 2011, at 9:58 PM, Sebastian Hahn wrote: > On Nov 25, 2011, at 9:27 PM, Sebastian Hahn wrote: >> I have since become convinced that it would be better to get >> this implemented quickly, even if it doesn't have a generic >> "prevent this param from bei

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-11-25 Thread Sebastian Hahn
On Nov 25, 2011, at 9:27 PM, Sebastian Hahn wrote: > I have since become convinced that it would be better to get > this implemented quickly, even if it doesn't have a generic > "prevent this param from being set" mechanism. I would thus like > to change the prop

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-11-25 Thread Sebastian Hahn
On May 4, 2011, at 7:20 AM, Sebastian Hahn wrote: > On May 4, 2011, at 2:49 AM, Nick Mathewson wrote: >> On Mon, May 2, 2011 at 5:23 AM, Sebastian Hahn wrote: >>> On Mar 2, 2011, at 8:06 AM, Nick Mathewson wrote: >>>> On Tue, Feb 22, 2011 at 1:34 AM, Sebas

[tor-dev] git-rw moved hosts - new ssh host key

2011-10-30 Thread Sebastian Hahn
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey there people who have repositories hosted on tpo hardware, weasel migrated cupani to our shiny new VM server. Along with this came a change of ssh host key, so please be ready to modify your known_hosts file accordingly when you next push. The new

Re: [tor-dev] Sanitizing and publishing our web server logs

2011-09-02 Thread Sebastian Hahn
On Sep 2, 2011, at 2:46 PM, Karsten Loesing wrote: > Hi Andrew, > > On 9/2/11 2:18 AM, Andrew Lewman wrote: >> On Thursday, August 25, 2011 04:08:00 Karsten Loesing wrote: >>> we have been discussing sanitizing and publishing our web server logs >>> for quite a while now. The idea is to remove

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-05-03 Thread Sebastian Hahn
On May 4, 2011, at 2:49 AM, Nick Mathewson wrote: > On Mon, May 2, 2011 at 5:23 AM, Sebastian Hahn wrote: >> >> On Mar 2, 2011, at 8:06 AM, Nick Mathewson wrote: >> >>> On Tue, Feb 22, 2011 at 1:34 AM, Sebastian Hahn wrote: >>> >>>> Desi

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-05-02 Thread Sebastian Hahn
On May 2, 2011, at 11:23 AM, Sebastian Hahn wrote: > On Mar 2, 2011, at 8:06 AM, Nick Mathewson wrote: >> This is possibly bikeshed, but I would suggest that instead of >> requiring half of existing authorities to vote on a particular >> parameter, we require 3 or more

Re: [tor-dev] Proposal 178: Require majority of authorities to vote for consensus parameters

2011-05-02 Thread Sebastian Hahn
On Mar 2, 2011, at 8:06 AM, Nick Mathewson wrote: > On Tue, Feb 22, 2011 at 1:34 AM, Sebastian Hahn wrote: > >> Design: >> >> When the consensus is generated, the directory authorities ensure that >> a param is only included in the list of params if at least

[tor-dev] Proposal idea: Require majority of authorities to vote for consensus parameters

2011-02-21 Thread Sebastian Hahn
Filename: xxx-param-voting.txt Title: Require majority of authorities to vote for consensus parameters Author: Sebastian Hahn Created: 16-Feb-2011 Status: Draft Overview: The consensus that the directory authorities create may contain one or more parameters (32-bit signed integers) that