[tor-dev] Collecting data to demonstrate TCP ISN-based port knocking

2014-05-14 Thread Julian Kirsch
ion of if Knock one day could be used in a large scale. You can find sources, binaries and a more elaborate description here: https://gnunet.org/knock_nat_tester Technical details about Knock and a (somewhat outdated) research paper as well as kernel patches are provided here: https://gnunet.org/knoc

Re: [tor-dev] Detecting if a IP address belongs to a Tor Exit node.

2012-12-04 Thread Julian Yon
On Tue, 04 Dec 2012 18:51:16 +0100 Michael Zeltner wrote: > Excerpts from Julian Yon's message of 2012-12-04 14:10:50 +0100: > > On Tue, 4 Dec 2012 13:25:15 +0100 > > Jorge Couchet wrote: > > > > > I'm working with the ticket 7549 > > > (htt

Re: [tor-dev] Detecting if a IP address belongs to a Tor Exit node.

2012-12-04 Thread Julian Yon
;t have to handle any of the hard stuff. Just ping it a request like GET http://onionoo.local/details?search=10.9.8.7&type=relay and parse the returned JSON to check the exit policy. Julian -- 3072D/F3A66B3A Julian Yon (2012 General Use) signatur

Re: [tor-dev] Grailo.net is live (but very young)

2012-12-01 Thread Julian Yon
ripts via NoScript; this provides the ability to selectively enable scripting on sites you trust. However, Tor itself is agnostic to what you use it for. If you write an application that can talk to a SOCKS proxy, it can be pointed directly at Tor with no need to interface with the browser. Julian -

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-29 Thread Julian Yon
On Tue, 27 Nov 2012 20:53:03 -0500 Nick Mathewson wrote: > On Tue, Nov 27, 2012 at 10:08 AM, Julian Yon > wrote: > > > > So, perhaps have a cache but only consult it for making decisions > > about whether to use a circuit, not for resolving client requests? > > Alt

Re: [tor-dev] Proposal 205: Remove global client-side DNS caching

2012-11-27 Thread Julian Yon
change to the microdescriptor. Obviously the client can cache this info, and any node which subsequently doesn't honour its declared policy can still be (temporarily?) blacklisted. (Please forgive me if I'm missing something obvious. I'm not yet as familiar with Tor's inner wo

Re: [tor-dev] Proposal 213: Remove stream-level sendmes from the design

2012-11-06 Thread Julian Yon
le compromise: A stream level XOFF/XON instead of SENDME would allow us to save the flow control bandwidth for properly flowing streams and still have a way to deal with stalled ones. Julian -- 3072D/F3A66B3A Julian Yon (2012 General Use) signat

Re: [tor-dev] TBB Gentoo ebuild

2012-08-27 Thread julian
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/27/2012 08:26 PM, Matthew Finkel wrote: > > Ah, I apologize, I thought having optional runtime deps were > possible. I also agree that is should be obvious but I've learned > to err on the side of caution, if possible. Optional runtime-ONLY dep

Re: [tor-dev] TBB Gentoo ebuild

2012-08-26 Thread julian
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 12 Aug 22:56 Mansour Moufid: > Even with webrsync you still have to trust the mirror(s), and then > the Gentoo release infrastructure... Forgive me my bluntness, but how is that different from trusting you? The methods are reliable, being Manifests a

Re: [tor-dev] A modest proposal for a petname system in ideas/xxx-onion-nyms.txt

2012-01-03 Thread Julian Yon
time. At this point the nym can be hijacked as no secret is needed to claim it. Am I missing something? Julian -- 3072D/F3A66B3A Julian Yon (2012 General Use) signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@l

Re: [tor-dev] What Should Tor Bridges and Clients Do When They Get Hosed?

2011-11-12 Thread Julian Yon
vices widely used, frequently seen with SSL support, that > handle traffic that kinda looks like Tor's and are easily > implementable, are also welcome. People use SMTP, POP, IMAP, XMPP over SSL (off the top of my head). Not sure any of them look convincingly like web traffic though.

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread Julian Yon
ut this but it wasn't clear whether he was intending to write the idea off entirely or whether there was room to explore it further. Julian -- 3072D/D2DE707D Julian Yon (2011 General Use) signature.asc Description: OpenPGP digital signature __

Re: [tor-dev] Proposal 189: AUTHORIZE and AUTHORIZED cells

2011-11-05 Thread Julian Yon
7;t know enough about this. I'll have to read the documents before I can comment. J -- 3072D/D2DE707D Julian Yon (2011 General Use) signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org htt

Re: [tor-dev] Proposal 189: AUTHORIZE and AUTHORIZED cells

2011-11-05 Thread Julian Yon
#x27;s certainly subtle. You're left with the problem of what the client should do if it can't authenticate the bridge. It still needs to send something down the pipe that it opened, and the server still needs to respond to that, otherwise the unused connection will look

Re: [tor-dev] Proposal 189: AUTHORIZE and AUTHORIZED cells

2011-11-04 Thread Julian Yon
t (or just the URL), the shared secret and the bridge's TLS cert. If there's a MITM then the client will compute a different ETag (due to the wrong cert) and can close the connection. Otherwise it can immediately initiate the full authorisation sequence. (NB. I'm not a cryptographer