Re: [tor-dev] Relay "Ping" Functionality

2022-02-11 Thread grarpamp
Well onioncat is not "arbitrary node" but is a set up one. Yet some timing differentiations can be divined by selectively constructing the "circuit" to test, looking at setup timings, pushing characterizing traffic through them and your own nodes, polling existing services, etc. Please publish your

Re: [tor-dev] Relay "Ping" Functionality

2022-02-11 Thread grarpamp
> Right now we're exploring latency-based attacks but are having trouble > achieving a particular goal: a way to “ping” an arbitrary node in a > client’s already-built (“live”) circuit. One-way timing is ideal but round > trip time would suffice. We can glean this information during circuit > const

Re: [tor-dev] [tor-relays] Relays running an unsupported (EOL) Tor version

2021-10-28 Thread grarpamp
> mpan: >> Is there any data available that sheds light on >> why operators run outdated versions Besides latent OS packages, or being busy, or simply not updating things, those are natures of computing world anyway... or having no network operations crypto-monetization model as some nextgen p2p o

[tor-dev] v2 Onions, IPv6 BiDir P2P Capability Regression... [re: Relays running unsupported EOL ver]

2021-10-06 Thread grarpamp
On that, and regardless of what TPO Inc says re... tor is a bit decentralized, and freely licensed, as such... DirAuths, HSDirs, Relays are all free to choose to continue signing over and running older versions in order to support the community of tor clients that are happily using useful feature

Re: [tor-dev] GSoC 2021 - Alexa Top Sites Captcha and Tor Block Monitoring

2021-05-24 Thread grarpamp
>> https://gitlab.torproject.org/woswos/CAPTCHA-Monitor/-/wikis/GSoC-2021 >> tpo/community/support/#40013 > > https://trac.torproject.org/projects/tor/wiki/org/projects/DontBlockMe > https://trac.torproject.org/projects/tor/wiki/org/doc/ListOfServicesBlockingTor Beyond talk (and dev) there was tor

Re: [tor-dev] GSoC 2021 - Alexa Top Sites Captcha and Tor Block Monitoring

2021-05-24 Thread grarpamp
> https://gitlab.torproject.org/woswos/CAPTCHA-Monitor/-/wikis/GSoC-2021 > tpo/community/support/#40013 https://trac.torproject.org/projects/tor/wiki/org/projects/DontBlockMe https://trac.torproject.org/projects/tor/wiki/org/doc/ListOfServicesBlockingTor The importance due to negative utility and

Re: [tor-dev] Lets give every circuit its own exit IP?

2020-03-07 Thread grarpamp
signal NEWNYM exit bucketing - Make circuit isolation isolate exits? https://trac.torproject.org/projects/tor/ticket/6256 ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] interested in working on a ticket

2020-02-24 Thread grarpamp
> https://trac.torproject.org/projects/tor/ticket/13184 . Perhaps not only "which local network", as in customary 127.0.0.0/8, but may be useful to some as being flexibly narrow to "which IP and port", as in 127.201.52.38:843, for IPv6 as well. Some OS / VM may utilize beyond concept of just 127.0

Re: [tor-dev] torsocks configure bug (uClibc, maybe other nonstandard libcs)

2019-11-14 Thread grarpamp
> libc.so.0 => ... > ld64-uClibc.so.0 => ... Samples from systems for developing pattern matches should not be truncated... if the data is sensitive or very long, it can be obfuscated or have its char class substrings shortened. Some forums and mail can mangle chars classes outside isalnum(3), ta

Re: [tor-dev] Compile warns

2019-09-12 Thread grarpamp
On 9/10/19, Nick Mathewson wrote: > https://trac.torproject.org/projects/tor/ticket/31687 > needs testing; please let me know if it works for you. Works. The second hunk for fp.c is below. > Is it possible that > a new compiler version or new headers in FreeBSD is what has made them > start appe

Re: [tor-dev] Compile warns

2019-09-06 Thread grarpamp
On 9/6/19, Nick Mathewson wrote: > What version of Tor? Oops, here it is: 0.4.1.5 ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Compile warns

2019-09-06 Thread grarpamp
freebsd 12 x64 gcc 8.3.0 src/core/or/connection_edge.c:2563:5: warning: potential null pointer dereference [-Wnull-dereference] src/lib/math/fp.c:106:16: warning: conversion from 'double' to 'float' may change value [-Wfloat-conversion] src/lib/math/fp.c:111:18: warning: conversion from 'double' t

Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-14 Thread grarpamp
On 8/14/19, Pop Chunhapanya wrote: > When deploying an onion service ... the ip address > of my machine ... is exposed to the Tor network... > DDoS ... if someone knows my ip address. Only your tor client, and your guard, knows your ip. Unless you're up against a malicious guard, that's not a pro

[tor-dev] User Data Exchange with Network Automata (re: Prop 305, ex energy)

2019-06-17 Thread grarpamp
> And this is really off topic for this list. General Tor energy bits moved here... https://lists.torproject.org/pipermail/tor-talk/2019-June/045256.html re 305 etc It wouldn't be unusual for an app to pop up some form of captcha, challenge, or data exchange where needed. Some of that model exi

[tor-dev] Cryptocurrency: Total Energy Analysis - Crypto Uses Less Than Fiat

2019-06-16 Thread grarpamp
(from tor-dev: PoW DoS defenses Prop 305: INTRO Cell) On 6/16/19, Chelsea Holland Komlo wrote: > Given the significant environmental impact of POW in other distributed > systems (blockchain), we should not implement schemes that solve a > problem for Tor but create problems for people elsewhere (

Re: [tor-dev] Proposal 304: Extending SOCKS5 Onion Service Error Codes

2019-05-28 Thread grarpamp
This should make sure these errors are synchronized with that from controller events HS_DESC HS_DESC_CONTENT HSFETCH HSPOST and other semantics and logging. I submitted a bunch of bugs and enhance on HS* controller command and event failures that can be trac searched and integrated with this. Some

[tor-dev] Solving World's Tor Users Being Blocked by Websites (was: Tor exit bridges)

2019-05-07 Thread grarpamp
On 5/7/19, nusenu wrote: > > juanjo: >> Tor relays are public and easily blocked by IP. To connect to Tor >> network users where Tor is censored have to use bridges and even PTs. >> But, what happens on the exit? Many websites block Tor IPs so using >> it to access "clearweb" is not possible. Shou

[tor-dev] Controller: text connection vs SNMP

2019-05-07 Thread grarpamp
Speaking of MIBs and management, was SNMP ever seriously looked at back when desire for a control mechanism evolved? If I recall, agent libs and clients weren't wished as middleware, thus demurring to a text connection shell interface. Though commercial routers have both, the shell connection is us

Re: [tor-dev] [RFC] control-spec: Specify add/remove/view client auth commands (client-side).

2019-05-07 Thread grarpamp
On 5/7/19, Suphanat Chunhapanya wrote: > That's cool. But according to what dgoulet proposed, if we use both > ONION_CLIENT_AUTH_ADD > and ONION_SERVICE_AUTH_ADD. The latter will sound like it's an > authentication of the service not the client. At least for me :) And or maybe that seem more like

Re: [tor-dev] [RFC] control-spec: Specify add/remove/view client auth commands (client-side).

2019-05-06 Thread grarpamp
On namespaces... Like MIBs, APIs, file systems, most anything, it's usually... least specific left to most specific right ... DNS also maintains hier but in reverse direction. add_foo_thing1 add_thing1 add_thing2 see_bar_thing1 string_assorted_junk_this ... gives you hierarchies of *add* filled

Re: [tor-dev] Tor Directory Meta-Format + Line Wrapping?

2019-04-03 Thread grarpamp
On 4/3/19, Iain Learmonth wrote: >> When line wrapping, implementations MUST wrap lines >> at 64 characters. Upon decoding, implementations MUST >> ignore and discard all linefeed characters. The sectiion quoted is here... https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n193 > I c

Re: [tor-dev] Tor Friendliness Scanner

2019-03-04 Thread grarpamp
On 3/4/19, Kevin Gallagher wrote: > Recently I've been > working on creating a "Tor Friendliness Scanner" (TFS), or a scanner > that will measure what features of a given website are broken > (non-functional) when accessed on the Tor Browser (TB), along with > actionable suggestions to improve it.

Re: [tor-dev] tor relay process health data for operators (controlport)

2019-02-02 Thread grarpamp
All sorts of statistical counters could be useful to graph from some API... a control port stats dump in something like var=value, a BSD sysctl text format, and even up to a proper SNMP port which many graphers already speak. Logging isn't really the right place for such things, unless they've rea

Re: [tor-dev] New Proposal: Preferring IPv4 or IPv6 based on IP Version Failure Count

2019-01-26 Thread grarpamp
> https://github.com/torproject/torspec/pull/53 > https://trac.torproject.org/projects/tor/ticket/27491 > https://github.com/torproject/tor/pull/566 > https://github.com/torproject/torspec/tree/master/proposals The subject would make use of the folllowing RFC... Happy Eyeballs Version 2: Better C

Re: [tor-dev] HTTPS and Tor Onion v3 Services

2018-12-28 Thread grarpamp
> rewriting onion proxies Though it should be noted that if users already can't get their own simple human link and bookmark usage right... they're probably not going to get any higher level naming or authority config and usage right either. ___ tor-dev

Re: [tor-dev] HTTPS and Tor Onion v3 Services

2018-12-28 Thread grarpamp
> sign a > self-signed tls certificate with your Onion Service's hs_ed25519_secret_key > and Tor Browser trusting the tls certificate based on this signature - In unlikely case tor crypto fails or breaks, e2e TLS is good there. - An admin might terminate onions on one box, and forward the plaintex

Re: [tor-dev] Upcoming Tor change with application impact: "Dormant Mode"

2018-12-21 Thread grarpamp
Regarding mobile, dormant, battery, etc... There may still be a ticket for phone, mobile, laptop, wifi users... if an interface change happens, typically interface down event or IP change, then tor should tear down all internet associated state, to not expose traveling user to identifying IP traff

Re: [tor-dev] Tor Relay Guide Disagreements

2018-08-03 Thread grarpamp
> /TorRelayGuide > /TorRelayGuide/DebianUbuntu The former, in context wiith the latter, cannot be treated as both a file and a directory (hier) by web mirror / archvers such as wget onto disk. And wiki / trac exports aren't available either :( So instead push the page down into the hier, thus ensu

Re: [tor-dev] Entreaty for spreading awareness about ProxAllium, a useful frontend for Tor

2018-07-23 Thread grarpamp
> I am not sure where I should start with getting feedback as it is quite hard > to find users of ProxAllium. People can't be forced to use or comment. Yet if it's a tool that interacts with tor or the ecosystem of tor tools, post up an announce and feedback request to tor-talk and see. When yo

Re: [tor-dev] Entreaty for spreading awareness about ProxAllium, a useful frontend for Tor

2018-07-21 Thread grarpamp
> https://proxallium.org/ > adding references to it in places like the wiki and the "projects" list on > the website. People are free to create their own wiki account and add descriptions and links to their tools / projects on the relavant wiki pages. https://trac.torproject.org/ You probably w

Re: [tor-dev] Proposal: Check Maxmind GeoIP DB before distributing

2018-07-03 Thread grarpamp
Thanks for your work. You may also consider Africa and South America, Canada, Russia, etc. And locations interior to all such that contacts within an RTT are not as likely to be across a pond or other border, vs as at some edge IX or landing. Cable maps may assist. _

Re: [tor-dev] man: "IPv6 addresses should be wrapped in square brackets"

2018-06-30 Thread grarpamp
On Sat, Jun 30, 2018 at 5:22 PM, nusenu wrote: > tor's man page for OutboundBindAddress* options say: > >> IPv6 addresses should be wrapped in square brackets > > since it does not throw an error without square brackets: > does it make any difference? > > Previously I forgot the square brackets wh

Re: [tor-dev] onion v2 deprecation plan?

2018-04-30 Thread grarpamp
> for v3 support, HSFETCH won't be ncessary... N... HSFETCH is an absolutely necessary control function now critical to operation of a variety of onionland search / index / status / webhosting / research services, and any other basic commandline checks that have zero wish to be spawning hea

Re: [tor-dev] onion v2 deprecation plan?

2018-04-27 Thread grarpamp
On Fri, Apr 27, 2018 at 6:44 AM, Jonathan Marquardt wrote: > v3 onion services just seem like a way worse deal to the average user and > the unknowledgeable admin. Mainly because the addresses are way too long. Then it's analyzing whether shifting the default to v3 for the clueless and the perhap

Re: [tor-dev] onion v2 deprecation plan?

2018-04-27 Thread grarpamp
On Fri, Apr 27, 2018 at 8:01 AM, Alec Muffett wrote: > OnionBalance Forgot to include this in the former list of common / useful onion tools, thanks. If anyone knows of others, feel free to add to thread. > OTOH, I have been performance testing simultaneous regular-expression > matching of v2/3

Re: [tor-dev] onion v2 deprecation plan?

2018-04-25 Thread grarpamp
On Wed, Apr 25, 2018 at 2:22 PM, nusenu wrote: > even though you are probably years away from deprecating onion v2 services > it is certainly good to have a clear plan. > > I'm asking because the sooner onion v2 are deprecated the sooner some > people can stop worrying about malicious HSDirs. The

Re: [tor-dev] Lets give every circuit its own exit IP?

2018-03-25 Thread grarpamp
You may also be interested in - newnym exit bucketing (in trac somewhere), this guarantees cycling through all exits before reusing one - openvpn exit termination (in tor-relays somewhere), this gives non-tor IP to clients that initiate a termination ___

Re: [tor-dev] Is OutboundBindAddress respected during ORPort IP auto detection?

2018-03-24 Thread grarpamp
It seems that each function in a network app that - listens to the net, should have an independantly configurable inbound ip and port. - talks out to the net, should have an independantly configurable source ip and port. And when there are multiple interfaces / NAT, address metadata and metainfo a

Re: [tor-dev] Setting NumEntryGuards=2

2018-03-22 Thread grarpamp
On Thu, Mar 22, 2018 at 1:13 PM, Mike Perry wrote: > I strongly disagree. Dumping more traffic onto an already existing, > otherwise in-use connection is not the same as the ability to force a > new connection that is only used for a single request at a very specific > time. These are completely d

Re: [tor-dev] 3.2.10 compiler warnings

2018-03-10 Thread grarpamp
On Fri, Mar 9, 2018 at 11:20 PM, teor wrote: > Can you tell us what compiler and version, and what system? Was gcc 4.2.1 modded by whatever freebsd did in its 8.x series. Any extant bugs... ok, but don't bother porting for those releases as they're EOL / moot.

[tor-dev] 3.2.10 compiler warnings

2018-03-09 Thread grarpamp
Test from an older system before it was updated, unlikely to be prevalent, so don't bother fixing unless obvious. src/common/confline.c:135: warning: 'include_list' may be used uninitialized in this function src/common/confline.c:135: warning: 'include_list' may be used uninitialized in this funct

Re: [tor-dev] Creating custom Tor Browser settings profile

2018-02-25 Thread grarpamp
On Mon, Feb 26, 2018 at 12:26 AM, procmem wrote: > Any way to do this? See 'firefox -h'. Then see if 'torbrowser -h' and args work the same way. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/

Re: [tor-dev] Agnostic Tools: Code Dev and Support For

2018-01-11 Thread grarpamp
On Thu, Jan 11, 2018 at 5:44 PM, teor wrote: > This thread is off-topic > This list is used for developing new features, bug fixes, and > removing old features. Here are three easily found and directly quoted charters for this list, none of which are strictly constrained to only the feature and b

[tor-dev] Agnostic Tools: Code Dev and Support For

2018-01-11 Thread grarpamp
> I'm interested in helping you guys with Tor development. I don't really care > what I work on, except I do not support .onion websites (though I am willing > to be convinced otherwise) so I would prefer not to participate directly in > their development. I have plenty of experience with writing c

Re: [tor-dev] Relay diversity master thesis

2018-01-07 Thread grarpamp
On Sun, Jan 7, 2018 at 8:29 AM, teor wrote: >> On 22 Dec 2017, at 11:23, Robin Descamps wrote: >> May I ask you advices/feedback about this master thesis plan? >> The master thesis plan: >> https://drive.google.com/open?id=1XEOSS29owavKJ_cJJAVaPiJe34Ez6XXx >> The poster: >> https://drive.google

Re: [tor-dev] Rust rewrite help

2017-12-23 Thread grarpamp
> Recently, I spent some time in China > and it made me realize the importance of a project like TOR. Consider speaking of your experience on the cypherpunks and/or liberation-tech lists, anonymously if need be. Your contribution is valued. ___ tor-dev m

Re: [tor-dev] #tor-dev exitmap

2017-12-22 Thread grarpamp
On Sat, Dec 23, 2017 at 12:49 AM, Harshavardhan Reddy wrote: > How does the Tor Project deal with the malicious exit relays. Do you still > run exitmap or something better? As with dirauths, the effort is distributed and not necessarily a function of the tor project proper. Users report them when

Re: [tor-dev] Detecting multi-homed exit relays (was: Onion auto-redirects using Alt-Svc HTTP header)

2017-11-18 Thread grarpamp
>> Detecting exit nodes is error prone, as you point out. Some exit nodes >> have their traffic exit a different address than their listening >> port. Hey does Exonerator handle these? > > Right. It's not trivial for tor to figure out what exit relays are > multi-homed -- at least not without actu

Re: [tor-dev] Question on Tor Design (current and maybe past and future)

2017-11-10 Thread grarpamp
> https://www.torproject.org/docs/documentation.html.en#DesignDoc > https://spec.torproject.org/ > https://gitweb.torproject.org/torspec.git/tree/ > https://gitweb.torproject.org/torspec.git/tree/proposals > https://trac.torproject.org/projects/tor/report/12 > https://lists.torproject.org/pipermail

Re: [tor-dev] anonbib

2017-11-06 Thread grarpamp
On Mon, Nov 6, 2017 at 12:56 AM, ng0 wrote: > I think videos should be a separate issue, we selfhost them > already as far as I know but integrating them into git is > no (good) solution. Don't think I would propose committing the actual videos / papers to git... too much bloat... just the bib /

Re: [tor-dev] anonbib

2017-11-05 Thread grarpamp
On Sat, Nov 4, 2017 at 8:05 PM, Scfith Riseup wrote: > I wonder if there is an option to start to use ipfs ( https://ipfs.io/ ) or > something like it to permanently and resiliently store items for posterity? Bib users would need a client to avoid abusing inproxy. Though a client would offload fr

Re: [tor-dev] anonbib

2017-11-04 Thread grarpamp
> With mentioned problems of - Broken links, not founds, redirects covered by a single monthly crawl thus being regular and benefitting all projects at once. - Size, could apply common compression such as xz or even ZSTD to entire mirrorable local archive. Similar for video materials. http://open

Re: [tor-dev] anonbib

2017-11-04 Thread grarpamp
> Saves a lot of duplicative work at the projects, is easily mirrored, > imported into web pages, etc. With mentioned problems of - Google threat covered by community hosting and replication. - Separate / overlapping project / topic focus covered by a flexible tagging and views system. - Not easi

Re: [tor-dev] anonbib

2017-11-04 Thread grarpamp
On Sat, Nov 4, 2017 at 2:54 PM, Roger Dingledine wrote: > On Fri, Nov 03, 2017 at 09:58:35PM +, ng0 wrote: >> our plan with the bibliography collection of GNUnet is to https://gnunet.org/bibliography >> implement something similar to your/freehaven's anonbib. https://www.freehaven.net/anonb

Re: [tor-dev] anonbib

2017-11-03 Thread grarpamp
At some time in the past I noticed that the anonbib did not have links to local copies of some of the materials. If that's still the case, I'd definitely suggest creating them at this oppurtunity. And though rare and more curation work, some papers do receive content / errata updates. _

Re: [tor-dev] (no subject)

2017-05-14 Thread grarpamp
On Sun, May 14, 2017 at 9:35 AM, harshit tandon wrote: > I would like to contribute to tor browser how can I help Start by filling out the "^Subject: ' lines of your emails with a relavant "Subject" so people know what you're talking about instead of leaving them blank. You can learn more details

[tor-dev] Tracing TCP Connections online..

2017-04-10 Thread grarpamp
re: "tcp_tracing_internet.pdf" This appears to describe an active network modulation attack (node DoS). Either hammer tree on nodes of the expected path and trace the modulation, or on all but the expected path to find unmodulated. It generally requires GPA, deploying nodes, or being one end of th

[tor-dev] Reverse Naming Proposals?

2017-04-08 Thread grarpamp
These recent naming proposals on list, for forward naming 'string --> onion, 1:1', I think. Is anyone working on doing reverse naming, 'onion --> string, 1:1' ? With links to such work? ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.

[tor-dev] Circuit times

2017-04-03 Thread grarpamp
Anything going to blow up if set anywhere from 1k to 1M? CBT_NCIRCUITS_TO_OBSERVE ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Mailing List Etiquette Reminder

2017-04-02 Thread grarpamp
New members are very welcome and valued whether through gradual accretion or project influx such as GSOC's. In order to ensure messaging efficiency and clarity... - Reply *below* what others have written. Do not "top post". - Trim out and *delete* irrelavant portions of what others have written, s

Re: [tor-dev] Rethinking Bad Exit Defences: Highlighting insecure and sensitive content in Tor Browser

2017-04-02 Thread grarpamp
On Tue, Mar 28, 2017 at 11:31 AM, Donncha O'Cearbhaill wrote: > The Tor bad-relay team regularly detects malicious exit relays which are > actively manipulating Tor traffic. These attackers appear financial > motivated and have primarily been observed modifying Bitcoin and onion > address which ar

Re: [tor-dev] GSoC 2017 - unMessage: a privacy enhanced instant messenger

2017-03-29 Thread grarpamp
On Wed, Mar 29, 2017 at 3:38 PM, Felipe Dau wrote: > Thanks for the suggestion. It should be possible to support multiple > kinds of transport, but we still need to do some research on that > because it might make some attacks > possible/easier (e.g., partitioning attacks)? It would be great to >

Re: [tor-dev] GSoC 2017 - unMessage: a privacy enhanced instant messenger

2017-03-29 Thread grarpamp
You may want to link unmessage into the I2P network as well. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Flag blocked websites

2017-03-10 Thread grarpamp
> [1] Maybe from tor-talk or linked to your idea from the wiki page. You also see some discussions here https://lists.torproject.org/pipermail/tor-access/ and here https://lists.torproject.org/pipermail/tor-talk/ ___ tor-dev mailing list tor-dev@lists.to

Re: [tor-dev] Flag blocked websites

2017-03-10 Thread grarpamp
On Fri, Mar 10, 2017 at 12:35 PM, Boter42 wrote: > https://trac.torproject.org/projects/tor/wiki/org/doc/ListOfServicesBlockingTor > It would be great to have an updated records of this kind of websites so that > we can push website owners to make the Tor user-experience as smooth as > possible

[tor-dev] Netflow padding

2017-02-18 Thread grarpamp
Are these the current / recommended paper refs for eyeballing things on this to date? torspec/proposals/251-netflow-padding.txt torspec/proposals/254-padding-negotiation.txt ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.o

[tor-dev] Prop224 oppurtunity: keygen, crypt, sign, encoding tools

2017-02-15 Thread grarpamp
Tor could ship with a tool to offline generate all the various keys, encrypt and sign with them, for debug, test, and use with other apps that tie to tor. And a tool to translate strings between different encodings in use. Or at least provide howto and links in the docs to third party tools that us

Re: [tor-dev] git-update: transparently torified git pulls

2017-01-31 Thread grarpamp
> test x"$url" = x Some users may be a bit unfamiliar with this longform 'test' construct having trended from that in say their distro's example rc scripts over recent posix and bugfixed decades, easier visual delimited parsing, 4 chars of line width saved, to form of... [ ! "$var" ] http://pubs

Re: [tor-dev] tor 0.2.9.9 gcc 4.2.1

2017-01-29 Thread grarpamp
It was a test compile on a very old 8.x i386 box, warnings would be no surprise there, hardly worth addressing unless exposed a bug, since 11.x runs on most all hw 8.x does. gcc version 4.2.1 20070831 patched [FreeBSD] ___ tor-dev mailing list tor-dev@lis

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-29 Thread grarpamp
Skimming thread... Version or not is fine, provided if you want versions you know you must store the bits somewhere, or ensure regex parser rules to recognize and match an intrinsic version represented by entire address format specification itself. Note onion search spiders rely on such address r

[tor-dev] tor 0.2.9.9 gcc 4.2.1

2017-01-27 Thread grarpamp
Ancient gcc says src/or/connection.c:1843: warning: passing argument 1 of 'TO_OR_CONN' discards qualifiers from pointer target type src/or/connection.c:1843: warning: passing argument 1 of 'TO_OR_CONN' discards qualifiers from pointer target type src/test/test_dir.c:3700: warning: assuming signed

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-18 Thread grarpamp
On Wed, Jan 18, 2017 at 3:31 AM, George Kadianakis wrote: > What do you mean by "develop an IPv6 layer"? prop224 destroys the one to one bidirectional binary mapping that makes onioncat possible, and fails to provide a replacement for it :-( Any "human naming" layer (whether under prop224 or curr

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-17 Thread grarpamp
Always wondered how naming is relevant, for example, IPv6 with OnionCat as a deterministic form of naming. So now we propose a 'naming' layer. Which should not also support IPv6 addressing? Is not IPv6, subsequent to the 80bit scheme, merely a name on top of onions? ie: If we develop a 'naming' lay

Re: [tor-dev] RFC: Tor long-term support policy

2017-01-16 Thread grarpamp
You may encounter special justification to extend support for last branch that still supports pre-prop224 onions. There is a *lot* of code / community built on those. Darknet fora have mentioned possible maintenance forks as such if need be. ___ tor-dev m

Re: [tor-dev] Request for comments: patch to mark exit traffic for routing and statistical analysis

2016-10-20 Thread grarpamp
> On 2016-09-26 00:54, teor wrote: >> The one concern I have about this is that Tor-over-Tor would stick out more, >> as it would look like Tor coming out the OutboundBindAddressExit IP. >> But we don't encourage Tor-over-Tor anyway. ToT is technically not some special tor aware / tunneled relay f

Re: [tor-dev] Onioncat and Prop224

2016-10-08 Thread grarpamp
On Thu, Jun 23, 2016 at 3:51 PM, grarpamp wrote: > Freenet has talk on their lists of adding 100 new onioncat nodes > to tor and i2p as linked to in this thread... > > https://lists.torproject.org/pipermail/tor-dev/2016-June/011108.html More folks blogging related to the ab

Re: [tor-dev] Proposal 273: Exit relay pinning for web services

2016-10-06 Thread grarpamp
On Wed, Oct 5, 2016 at 4:09 PM, Philipp Winter wrote: > Also, Tor Browser MUST abort the ERP procedure if the HTTPS > certificate is not signed by a trusted authority. This is a problem for independant sites that choose not to pay the CA cabal, deal with what free CA will be around tomorrow, or

Re: [tor-dev] Onioncat and Prop224

2016-10-05 Thread grarpamp
Many wrote, in subthread started by dawuud 5 days ago: > talk: internet of things, security / exploit / nsa, crypto via tor, > everything over tor, exits This subthread does not concern the subject made for curating / supporting / tracking / developing "Onioncat and Prop224" [1]. Please a) end it,

Re: [tor-dev] Onioncat and Prop224

2016-09-28 Thread grarpamp
On Wed, Sep 28, 2016 at 11:30 AM, dawuud wrote: > Are you aware of Tahoe-LAFS? Don't know if they are, or if they are here, all we have is their short post. If they just need an insert and retrieve filestore for small user bases, there are lots of choices. If they need the more global and random

Re: [tor-dev] Onioncat and Prop224

2016-09-28 Thread grarpamp
https://www.reddit.com/r/TOR/comments/54rpil/dht_syncthing_bitsync_over_tor/ Hi we would like to integrate DHT Bittorrent Syncing over Tor for our open source encrypted obfuscated media rich notepad app. This app will have for main objective to provide a secure information gathering and sharing t

Re: [tor-dev] More tor browser sandboxing fun.

2016-09-21 Thread grarpamp
There is VM's, and Multiple X server can isolate on up to all available vty's. There is also program shipped by X11 called Xnest. But the more concern than apps and keyboards above, is probably the driver / kernel portion of security surface. ___ tor-dev

Re: [tor-dev] More tor browser sandboxing fun.

2016-09-21 Thread grarpamp
On Wed, Sep 21, 2016 at 5:33 AM, Yawning Angel wrote: > Where: https://git.schwanenlied.me/yawning/sandboxed-tor-browser > X11 is a huge mess of utter fail. Since the sandboxed processes get direct > access to the host X server, this is an exploitation vector. Is anyone actually actively throwi

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-20 Thread grarpamp
On Mon, Sep 19, 2016 at 10:32 AM, teor wrote: > But I also think we should warn when Tor guesses between multiple addresses, > because some operators are going to find that Tor guesses one they don't want: Might help to emit a simple table on startup with - explicitly configured addrs / ports -

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-20 Thread grarpamp
On Mon, Sep 19, 2016 at 5:36 PM, René Mayrhofer wrote: > That is exactly what we have patched our local Tor node to do, although > with a different (slightly hacky, so the patch will be an RFC type) > approach by marking real exit traffic with a ToS flag to leave the > decision of what to do with

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-19 Thread grarpamp
On Mon, Sep 19, 2016 at 9:14 AM, René Mayrhofer wrote: > Setup: Please note that our setup is a bit particular for reasons that > we will explain in more detail in a later message (including a proposed > patch to the current source which has been pending also because of the > holiday situation...)

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-19 Thread grarpamp
On Mon, Sep 19, 2016 at 9:14 AM, René Mayrhofer wrote: > Sep 19 11:37:41.000 [warn] I have no descriptor for the router named > "ins1" in my declared family; I'll use the nickname as is, but this may > confuse clients. > Sep 19 11:37:41.000 [warn] I have no descriptor for the router named > "ins2"

Re: [tor-dev] Please consider allowing /48 for VirtualAddrNetworkIPv6

2016-09-17 Thread grarpamp
On Fri, Sep 16, 2016 at 6:10 PM, Alex Elsayed wrote: >> (Yes, there is a typo in the last IPv6 address as well. >> https://trac.torproject.org/projects/tor/ticket/20153 ) Yes Tor is making some quite bad text representation issues so I added summary of them to this ticket. > - [FC00]/8 is _reser

Re: [tor-dev] Please consider allowing /48 for VirtualAddrNetworkIPv6

2016-09-16 Thread grarpamp
On Fri, Sep 16, 2016 at 5:13 AM, Alex Elsayed wrote: > Hi, I'm using Tor in transparent mode, and I'm running into a rather > inconvenient behavior. > > VirtualAddrNetworkIPv6 refuses to parse unless the network address given > is a /40 or broader. However, IPv6 ULA, which makes it very easy to gi

Re: [tor-dev] Some information about Tor relays

2016-08-25 Thread grarpamp
> On Fri, Aug 26, 2016 at 01:42:38AM +, Liu, Zhuotao wrote: >> We hope to have an estimate about computation capacity of Tor relays. For >> instance, how many circuits a relay can maintain when its CPU is driven to >> about 100%? On average, how many circuits are maintained by a busy guard >> a

Re: [tor-dev] Alternative Implementations of Tor

2016-08-17 Thread grarpamp
Add your projects here... https://trac.torproject.org/projects/tor/wiki/doc/ListOfTorImplementations ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] prop224: zero bits in addresses

2016-08-02 Thread grarpamp
And 10 years down when 20 bits is easy, you're going want shrinking it again, or along any interim update cycle. This is going to upset downstream parsers such as web indexers that expect matching fixed length / pattern. or that have to write zero [de]fillers. ex: [a-z2-7]{16}\.onion, we now see s

Re: [tor-dev] Onioncat and Prop224

2016-07-31 Thread grarpamp
Hi Jeremy. In regard your post 'Tor and Namecoin' here... https://lists.torproject.org/pipermail/tor-dev/2016-July/011245.html In this thread prefixed 'Onioncat and Prop224' started and spanning from here through now... https://lists.torproject.org/pipermail/tor-dev/2016-April/010847.html Onionc

Re: [tor-dev] Using Tor Stealth HS with a home automation server

2016-07-09 Thread grarpamp
> Nathan Freitas writes: >> Any thoughts on a format? torhs://clientname:authcookie@foo.onion looks >> decent. You probably want to coordinate with ricochet if it doesn't already have such QR sharing feature. ___ tor-dev mailing list tor-dev@lists.torpr

[tor-dev] Torsocks workalikes

2016-07-06 Thread grarpamp
I remember a survey list of torsocks workalikes somewhere (where?). This one's for windows and I don't remember it. Whoever maintains that list can add it for reference. https://github.com/cpatulea/TorCap2 ___ tor-dev mailing list tor-dev@lists.torprojec

Re: [tor-dev] Freenet + Onioncat: Is the traffic welcome?

2016-06-24 Thread grarpamp
On 6/23/16, grarpamp wrote: > Don't forget to add around 1000+ ms latency. Should say that on average tor's not that high, but as to prudently setting somewhat higher timeouts, especially for initial setup where the '+' may indeed apply.

Re: [tor-dev] Freenet + Onioncat: Is the traffic welcome?

2016-06-24 Thread grarpamp
On 6/24/16, konst...@mail2tor.com wrote: > Chinese users can reach Freenet again with Tor. China blocks Freenet with > DPI for a long time. This use case is nice to hear. Compared to other networks and attack vectors it's not the best at, Tor has put good effort into and is rather strong at gett

Re: [tor-dev] Onioncat and Prop224

2016-06-23 Thread grarpamp
Freenet has talk on their lists of adding 100 new onioncat nodes to tor and i2p as linked to in this thread... https://lists.torproject.org/pipermail/tor-dev/2016-June/011108.html Is anyone working on resurrecting the onioncat mailing list and archives? ___

Re: [tor-dev] Freenet + Onioncat: Is the traffic welcome?

2016-06-23 Thread grarpamp
On 6/22/16, konst...@mail2tor.com wrote: > I want to be clear about a couple of things. I am not looking to defy the > wishes of Tor developers and relay contributors. I hope to get their views > on the matter. Should they explicitly refuse, I will look at I2P. When I ran, donated, managed relays

Re: [tor-dev] Freenet + Onioncat: Is the traffic welcome?

2016-06-22 Thread grarpamp
On 6/22/16, konst...@mail2tor.com wrote: > I posted steps on how to connect Freenet nodes over Onioncat and Garlicat > for Tor/I2P. I am looking to scale it into an Opennet inside Tor with a > lot of peers: > > https://emu.freenetproject.org/pipermail/devl/2016-June/039056.html > https://emu.freen

Re: [tor-dev] [RELEASE] Torsocks 2.2.0-rc1

2016-06-21 Thread grarpamp
Thanks for your work david. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

  1   2   3   >