Re: [tor-dev] [Proposal] A simple way to make Tor-Browser-Bundle more portable and secure

2016-10-30 Thread Ximin Luo
libc is dynamically linked so one distribution-level upgrade will fix one libc problem. As opposed to having to rebuild every single program and trying to ship that to users in a huge update. The former is less complex. Statically linking shifts the burden of tracking and fixing security bugs, a

Re: [tor-dev] A meta-package for Pluggable Transports?

2016-07-05 Thread Ximin Luo
Dafwig: > Ximin Luo: >> I made something like this a few years ago: >> >> https://people.debian.org/~infinity0/apt/pool/contrib/t/tor-bridge-relay/ > > A general question, but related to the sample configuration you've > provided here, as well as other instr

Re: [tor-dev] A meta-package for Pluggable Transports?

2016-07-01 Thread Ximin Luo
Ximin Luo: > Nima Fatemi: >> [..] >> >> After some discussion on #tor-project a little while ago, the idea of >> having a meta-package that includes all or the most recent transports >> came up. Where people would install this meta package and it would >>

Re: [tor-dev] A meta-package for Pluggable Transports?

2016-07-01 Thread Ximin Luo
Nima Fatemi: > [..] > > After some discussion on #tor-project a little while ago, the idea of > having a meta-package that includes all or the most recent transports > came up. Where people would install this meta package and it would > automatically take care of the required steps to get the late

Re: [tor-dev] Freenet + Onioncat: Is the traffic welcome?

2016-06-24 Thread Ximin Luo
Hi, ex-Freenet developer here. konst...@mail2tor.com: > Is the extra traffic desirable in Tor? Reading asn's comment, I was under > the impression that you are interested in adding higher latency traffic > such as Freenet or mixnets for better anonymity: > https://blog.torproject.org/blog/crowdfun

Re: [tor-dev] Git users, enable fsck by default!

2016-02-02 Thread Ximin Luo
On 02/02/16 18:56, Peter Palfrader wrote: > On Tue, 02 Feb 2016, Nick Mathewson wrote: > >> The tl;dr here is: >>* By default Git doesn't verify the sha1 checksums it receives by default. >>* It doesn't look like we've got any inconsistencies in our >> repositories I use, though. That's go

Re: [tor-dev] Fwd: [guardian-dev] RC-7 is out - try to repro? Re: towards reproducible Orbot

2016-01-28 Thread Ximin Luo
Hey, thanks for this! I'd like to ask please upload this (or 15.1) to F-Droid soon. The version currently in F-Droid is RC-4 and is broken with orwall - orwall-allowed/redirected apps see no internet, but tor is connected and orfox can access it. RC-7 fixes this issue, I just tested it out. X

Re: [tor-dev] Preliminary Debian packages for meek

2015-03-04 Thread Ximin Luo
On 05/03/15 00:53, Ximin Luo wrote: > From the binaries, one should install both meek-client and > xul-ext-meek-http-helper; the latter depends on xfvb and xauth. > > meek-client has been modified slightly to run meek-http-helper in a headless > firefox using Xfvb(1) ahem

[tor-dev] Preliminary Debian packages for meek

2015-03-04 Thread Ximin Luo
Source package: https://mentors.debian.net/package/meek Binary packages: https://people.torproject.org/~infinity0/bin/ From the binaries, one should install both meek-client and xul-ext-meek-http-helper; the latter depends on xfvb and xauth. meek-client has been modified slightly to run meek-htt

Re: [tor-dev] tor and libressl

2015-02-21 Thread Ximin Luo
On 20/02/15 23:01, Tyrano Sauro wrote: > I got tor build with libressl. it works. Is this a good idea? > > TY > Could you write some more details about how you got this to work? For example, did you link in libressl during the build, did you have to change anything, or did you just drop-in lib

Re: [tor-dev] Hidden Service authorization UI

2014-11-21 Thread Ximin Luo
On 09/11/14 12:50, George Kadianakis wrote: > Hidden Service authorization is a pretty obscure feature of HSes, that > can be quite useful for small-to-medium HSes. > > Basically, it allows client access control during the introduction > step. If the client doesn't prove itself, the Hidden Service

Re: [tor-dev] Call for a big fast bridge (to be the meek backend)

2014-09-18 Thread Ximin Luo
On 18/09/14 16:41, David Fifield wrote: > On Thu, Sep 18, 2014 at 02:02:42PM +0100, Ximin Luo wrote: >> On 18/09/14 03:31, David Fifield wrote: >>> Currently in the bundles we're not setting a bridge fingerprint, so >>> relays wouldn't have to share a key. >

Re: [tor-dev] Call for a big fast bridge (to be the meek backend)

2014-09-18 Thread Ximin Luo
On 18/09/14 03:31, David Fifield wrote: > Currently in the bundles we're not setting a bridge fingerprint, so > relays wouldn't have to share a key. > This is something to be *fixed*, not to build future components on top of. Previously you mentioned that "the user could set their circuits to 4

Re: [tor-dev] Call for a big fast bridge (to be the meek backend)

2014-09-16 Thread Ximin Luo
On 16/09/14 03:12, David Fifield wrote: > The meek pluggable transport is currently running on the bridge I run, > which also happens to be the backend bridge for flash proxy. I'd like to > move it to a fast relay run by an experienced operator. I want to do > this both to diffuse trust, so that I

Re: [tor-dev] Draft proposal: Tor Consensus Transparency

2014-07-06 Thread Ximin Luo
(Disclaimer, I don't know the details of how consensus documents work. Some assumptions I made might be wrong.) In section 2 Motivation, you mention a partition attack. I think the rest of the document neglects the topic of *actually protecting against this*, instead focusing only on running th

[tor-dev] Composing multiple pluggable transports

2014-06-18 Thread Ximin Luo
Hi Steven, Nikita, I was told that you two are interested in the idea of composing multiple PTs together. Here are our ideas on it. We have a GSoC student, Quinn also at Illinois, working on turning this into reality. ## Concepts On the most abstract level, pt-spec.txt defines an "input interfa

[tor-dev] New events calendar

2014-04-30 Thread Ximin Luo
Hi all, I decided to create a new calendar, since the old one is out-of-date and we seem to have lost the access. View as a web page: https://www.google.com/calendar/embed?src=dt92shou5q1ooe1kptubhclo4s%40group.calendar.google.com Import into your calendar program: https://www.google.com/calend

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-16 Thread Ximin Luo
On 16/04/14 16:24, Ximin Luo wrote: > On 16/04/14 16:11, Ximin Luo wrote: >> On 16/04/14 15:56, George Kadianakis wrote: >>> Ximin Luo writes: >>> >>> Hm, but this kind of kills the magic of indirect PTs, right? That is, >>> users who want to use f

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-16 Thread Ximin Luo
On 16/04/14 15:56, George Kadianakis wrote: > Ximin Luo writes: > >> >> >> >> So instead of having, as currently: >> >> (old, hacky) Bridge flashproxy (dummy addr) >> >> We would have the following cases: >> >> (1) Bridge flashp

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-16 Thread Ximin Luo
On 16/04/14 16:11, Ximin Luo wrote: > On 16/04/14 15:56, George Kadianakis wrote: >> Ximin Luo writes: >> >> Hm, but this kind of kills the magic of indirect PTs, right? That is, >> users who want to use flashproxy in the way above, will have to know >> an addre

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
On 15/04/14 19:36, David Fifield wrote: > On Tue, Apr 15, 2014 at 02:03:43PM +0100, Ximin Luo wrote: >> ## The problem >> >> The problem with the above structure, is that it is incompatible with the >> metaphor of connecting to a specific endpoint. This is what the PT sp

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
On 15/04/14 14:03, Ximin Luo wrote: > (3, not-ideal) Bridge flashproxy (dummy addr) (fingerprint) > > Option (3) is quite nice, since in indirect PTs the actual address is > irrelevant - the Tor client never tries to connect to it. I suggest that we > have a special syntax fo

[tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
## Background Pluggable Transports are proxy programs that help users bypass censorship. [App client] -> XXX EVIL CENSOR HAS YOU XXX ACCESS DENIED XXX [App client] -> [PT client] -> (the cloud!) -> [PT server] -> [App server] The structural design, on the client side, is roughly: 1. App client

Re: [tor-dev] How to run a headless second Firefox instance?

2014-04-09 Thread Ximin Luo
On 09/04/14 16:31, Ximin Luo wrote: > On 09/04/14 07:29, David Fifield wrote: >> It gets the job done, but it sucks because the first thing you see is >> the dialog and you have to know not to close it. Is there a way to >> accomplish the same thing (keep the browser runn

Re: [tor-dev] How to run a headless second Firefox instance?

2014-04-09 Thread Ximin Luo
On 09/04/14 07:29, David Fifield wrote: > It gets the job done, but it sucks because the first thing you see is > the dialog and you have to know not to close it. Is there a way to > accomplish the same thing (keep the browser running, but don't show a > browser window) without raising a conspicuou

Re: [tor-dev] Using the HS protocol for unlinkability only

2014-03-26 Thread Ximin Luo
On 26/03/14 16:54, Michael Rogers wrote: > Hi all, > > (Please let me know if this belongs on tor-talk instead of here.) > > I'm working on a messaging app that uses Tor hidden services to > provide unlinkability (from the point of view of a network observer) > between users and their contacts. U

Re: [tor-dev] GSoC - Tor pluggable transports project

2014-03-15 Thread Ximin Luo
On 14/03/14 20:56, quinn jarrell wrote: > Hi Tor Devs, > I'm a computer engineering undergrad at University of Illinois > Urbana-Champaign. I am interested in working on a GSoC pluggable transports > project. > I mainly code in python or common lisp and have worked with asynchronous > programmin

Re: [tor-dev] [tor-commits] [flashproxy/master] remove failed connections from proxy_pairs as well

2014-03-10 Thread Ximin Luo
On 10/03/14 17:02, David Fifield wrote: > On Fri, Mar 07, 2014 at 02:39:18PM +, infini...@torproject.org wrote: >> commit 05b9c101ba9afe4653d1eff6f5414f90f22ef042 >> Author: Ximin Luo >> Date: Fri Mar 7 13:39:31 2014 + >> >> remove failed con

Re: [tor-dev] Feasibility of using a Tor Browser plugin as a PT component?

2014-02-22 Thread Ximin Luo
On 22/02/14 04:08, David Fifield wrote: > 2. Run a second browser, apart from Tor Browser, that receives commands > from a client PT program and makes the HTTPS requests it is > commanded to. You might want to look at MozRepl. More summary here: https://lists.torproject.org/pipermail/tor

Re: [tor-dev] Allowing NAT for relay/exit nodes - Bootstrap file size

2014-01-20 Thread Ximin Luo
This would be a nice-to-have, but not a priority for Tor. OTOH, that functionality is more vital for i2p, who are exploring the idea of integrating into Tor's PT system: https://trac.torproject.org/projects/tor/ticket/10629 Also, right now, no PT servers can actually traverse NAT. In the future

Re: [tor-dev] Projects to combat/defeat data correlation

2014-01-16 Thread Ximin Luo
> I imagine the anonymity set would be much smaller for these combined > transports... fewer people using them. In my understanding, the anonymity set doesn't apply to use of PTs since this is only at the entry side. The exit side does not know[1] what PT the originator is using, so is unable to

Re: [tor-dev] exit-node block bypassing

2013-12-31 Thread Ximin Luo
On 31/12/13 12:35, Jeroen Massar wrote: > On 2013-12-31 12:07, Ximin Luo wrote: >> Hey all, >> >> Flashproxy[1] helps to bypass entry-node blocks. But we could apply >> the general idea to exit-nodes as well - have the exit-node connect >> to the destination via an

[tor-dev] exit-node block bypassing

2013-12-31 Thread Ximin Luo
Hey all, Flashproxy[1] helps to bypass entry-node blocks. But we could apply the general idea to exit-nodes as well - have the exit-node connect to the destination via an ephemeral proxy. The actual technology probably needs to be different since we can't assume the destination has a flashproxy

Re: [tor-dev] Slight obfsproxy API change (#10342)

2013-12-12 Thread Ximin Luo
On 12/12/13 23:40, George Kadianakis wrote: > David Stainton writes: > >> Excellent! I was thinking of making this change but lately I haven't had >> much time. >> Merging that patch specified in the 1st ticket comment? That looks good. >> >> I'd be happy to update the bananaphone transport to us

Re: [tor-dev] Transport composition

2013-11-19 Thread Ximin Luo
Hey Kevin, to get you updated on what we've discussed so far, you could try to build the diagrams from this repo: https://github.com/infinity0/tor-notes/blob/master/pt-compose.rst The build-dependencies are short and listed in the Makefile. There is also a sketch at the bottom of #9744: https:

Re: [tor-dev] Development of an HTTP PT

2013-11-18 Thread Ximin Luo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 17/11/13 14:22, dardok wrote: > Hi, > > I've been reading about Selenium web-browser driver thing and I > consider that is not very handy to do what an HTTP PT client side > needs, that is to forge HTTP requests and embbed the TOR traffic into >

Re: [tor-dev] recreated website png diagrams as svg

2013-11-12 Thread Ximin Luo
On 11/11/13 15:40, Roger Dingledine wrote: > On Mon, Nov 11, 2013 at 02:42:24PM +0000, Ximin Luo wrote: >> Whilst we're on that topic, labelling the final link from the exit node >> to the destination as "unencrypted" is unnecessarily scary as well Perhaps >>

Re: [tor-dev] recreated website png diagrams as svg

2013-11-11 Thread Ximin Luo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/11/13 14:10, Lunar wrote: > Justin Findlay: >> Item h under >> >> https://www.torproject.org/getinvolved/volunteer.html.en#OtherCoding >> >> discusses (at least) the images at this page, >> >> https://www.torproject.org/about/overview.html.en >

Re: [tor-dev] [tor-assistants] Please help me plan and run meetings in ways that you'll find most helpful

2013-11-08 Thread Ximin Luo
On 07/11/13 17:20, m...@pagan.io wrote: > >> We've been doing regular meetings for little over a month now, and I'd >> like to get some feedback and solicit suggestions, complaints, and >> ways to make the meetings suck the least they can. Please let me know >> what's working for you, what isn't w

Re: [tor-dev] Sponsor F: update; next meeting [in *two weeks*]

2013-10-21 Thread Ximin Luo
On 20/10/13 07:02, David Fifield wrote: > It's not that I'm trying to neglect unglamorous development--I'm really > not. This is how I see it: As a software engineer, I am always trying to > reduce risk. Refactoring code reduces risk in the long term but > increases risk in the short term. Sticking

Re: [tor-dev] Sponsor F: update; next meeting [in *two weeks*]

2013-10-19 Thread Ximin Luo
On 19/10/13 06:31, David Fifield wrote: > On Mon, Oct 14, 2013 at 09:14:25PM +0100, Ximin Luo wrote: >> Specific remaining tasks: >> >> - merge #9349, #6810, #9974 >> - push #7167 to an official tpo repo >> - do #9976, and #7167#comment:42 might require an obf

Re: [tor-dev] Sponsor F: update; next meeting [in *two weeks*]

2013-10-14 Thread Ximin Luo
On 01/10/13 03:13, Tom Lowenthal wrote: > Combine obfuscation (obfsproxy) with address-diversity (flashproxy) [#11] > --- > > **[On Track: Minimal]** The work of integrating obfsproxy with > flashproxy is done. George will include thi

Re: [tor-dev] Pluggable transport weekly meeting

2013-09-08 Thread Ximin Luo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 08/09/13 15:33, Lunar wrote: > Ximin Luo: >> I assume people will be interested in creating Debian packages for >> these too. I am wondering if we should adopt a naming convention like >> tor-pt-sshproxy, tor-pt-flashproxy,

Re: [tor-dev] Pluggable transport weekly meeting

2013-09-08 Thread Ximin Luo
I assume people will be interested in creating Debian packages for these too. I am wondering if we should adopt a naming convention like tor-pt-sshproxy, tor-pt-flashproxy, tor-pt-obfsproxy etc - like how mozilla extensions are all called xul-ext-*. (We could even start a working group too.) AT

Re: [tor-dev] Pluggable transport weekly meeting

2013-09-06 Thread Ximin Luo
On 06/09/13 09:58, Vmon wrote: > Preliminary, we decided to have the meeting on Fridays, cause why not, > but if you have serious problem with Fridays then we might be able to > pick a better day. > > For the time of the meeting, considering the geographical positions > of the current transport de

Re: [tor-dev] RFC: obfsproxyssh

2013-07-02 Thread Ximin Luo
On 28/06/13 10:13, Yawning Angel wrote: > Hello, > > I have been talking about this in #tor-dev for a while (and pestering > people with questions regarding some of the more nuanced aspects of > writing a pluggable transport, thanks to nickm, mikeperry and asn for > their help), and finally have w