Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-16 Thread Michael Rogers
t somebody could do if they could access your socksport, so long as you are using circuit isolation properly -- and it would be great to hear some if they do exist. But that said, Michael, you said you *aren't* using circuit isolation yet? For that case here's my attack: as a neighboring

Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-12 Thread Michael Rogers
Thanks so much for the thorough answer Nick. Looks like there are several potential solutions here. Responses inline below... On 11/09/2024 14:12, Nick Mathewson wrote: On Wed, Sep 11, 2024 at 7:02 AM Michael Rogers wrote: Hi Nick, It would be useful to have a way of controlling access to

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-11 Thread Michael Rogers
t more difficult, and if it's going to be possible to support SOCKS credentials in future, it might make sense to plan for it now. I'm not asking for username/password auth to be added to this proposal, just for the proposal to leave room for it to be added in the future. Can you see

Re: [tor-dev] Timers in Arti?

2024-01-15 Thread Michael Rogers
ard to say how often that's representative of what's happening on real devices. Strongly agree that it would be good to think about what Tor would look like if built for mobile first! Cheers, Michael On 13/01/2024 15:19, Holmes Wilson wrote: Michael, what kind of reduction in batt

Re: [tor-dev] Timers in Arti?

2024-01-10 Thread Michael Rogers
arm was needed, or the controller could just assume this whenever hidden services were published, and wake the device every fifteen minutes without explicitly communicating with Tor about alarms. Cheers, Michael ___ tor-dev mailing

Re: [tor-dev] Timers in Arti?

2024-01-10 Thread Michael Rogers
p the circuits alive, but avoid network-visible changes in behaviour compared with a device that's not sleeping. Cheers, Michael On 09/01/2024 17:57, Micah Elizabeth Scott wrote: Ah. If you want to run an onion service you'll need to keep at least a couple circuits open conti

Re: [tor-dev] Timers in Arti?

2024-01-09 Thread Michael Rogers
ptors published and the consensus fresh, although hopefully the timing requirements for those are a bit looser due to the longer timescales involved. Cheers, Michael On 08/01/2024 21:01, Micah Elizabeth Scott wrote: A variety of timers are needed on the relay side; on the client side though, a

[tor-dev] Timers in Arti?

2024-01-04 Thread Michael Rogers
give me an overview of how these local timers are handled in Arti, or any information about what's likely to happen if the timers are arbitrarily delayed? Thanks, Michael OpenPGP_0x11044FD19FC527CC.asc Description: OpenPGP public key OpenPGP_signatu

Re: [tor-dev] A way to connect quickly to a newly-online hidden service?

2023-02-23 Thread Michael Rogers
so it would be interesting to find out what's different between your scenario and ours. When you say newly-online, do you mean that the HS has never been published before, or that it's been published and has then spent some time offline? Is the Tor process still running when the app is offli

[tor-dev] Latest releases missing from changelog

2022-11-09 Thread Michael Rogers
Hi all, The latest releases (0.4.7.10, 0.4.6.12 and 0.4.5.14) seem to be missing from the changelog: https://gitlab.torproject.org/tpo/core/tor/-/raw/main/ChangeLog Is this file still the right place to look? Cheers, Michael OpenPGP_0x11044FD19FC527CC.asc Description: OpenPGP public key

Re: [tor-dev] Counting HS descriptor uploads

2022-08-17 Thread Michael Rogers
upload the descriptor to after restarting? In particular, are there any situations where Tor might decide that it doesn't need to upload any copies at all after restarting, because the previously uploaded copies are still good? Thanks, Michael On 09/08/2022 14:01, David Goulet wrote: On 2

Re: [tor-dev] bridge:// URI and QR codes

2022-08-02 Thread Michael Rogers
ding bridges from sources like Telegram bots, where the provenance isn't always clear. However, including these signatures in a bridge URI might make the URI quite long, which in turn might cause issues with scanning QR codes. So there might be tradeoffs here. Cheers, Michael OpenPGP

[tor-dev] Bootstrapping with a very inaccurate clock

2022-06-28 Thread Michael Rogers
Is there any way for Tor to tell, during bootstrapping, that the system clock appears to be far ahead of real time? Thanks, Michael OpenPGP_0x11044FD19FC527CC.asc Description: OpenPGP public key OpenPGP_signature Description: OpenPGP digital signature __

[tor-dev] Counting HS descriptor uploads

2022-06-28 Thread Michael Rogers
ugh copies were previously uploaded, and still contain up-to-date information about introduction points etc, so no new copies need to be uploaded? Thanks, Michael OpenPGP_0x11044FD19FC527CC.asc Description: OpenPGP public key OpenPGP_signature Description: OpenPGP digital

Re: [tor-dev] Onion Service Intro Point Retry Behavior

2019-11-01 Thread Michael Rogers
r some definition of broken remains hard, but fortunately we don't need to solve that to handle the common cases of switching between wifi and mobile data, and losing mobile signal, which the OS can tell us about.) My one-sided two cents. ;-) Cheers, Michael __

Re: [tor-dev] reproducible builds for Android tor daemon

2019-09-13 Thread Michael Rogers
://code.briarproject.org/briar/tor-reproducer https://code.briarproject.org/briar/go-reproducer https://bintray.com/briarproject/org.briarproject Cheers, Michael On 13/09/2019 16:24, Santiago Torres-Arias wrote: > On Fri, Sep 13, 2019 at 12:32:06PM +0200, Nicolas Vigier wrote: >> On Thu, 12 Sep 2019, Hans-

Re: [tor-dev] Onion Service - Intropoint DoS Defenses

2019-07-05 Thread Michael Rogers
on to make sure that's true? I may have missed parts of the discussion, so apologies if this has already been discussed and ruled out. Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal 300: Walking Onions: Scaling and Saving Bandwidth

2019-02-05 Thread Michael Rogers
Argh, I'm really sorry, I thought I'd reached the end of the proposal but my questions were addressed further down. Sorry for the noise. Cheers, Michael On 05/02/2019 17:42, Michael Rogers wrote: > I'm very happy to see this proposal! Two quick questions about relay > se

Re: [tor-dev] Proposal 300: Walking Onions: Scaling and Saving Bandwidth

2019-02-05 Thread Michael Rogers
sensus on disk would indicate that the client had unusual exit/guard requirements at some point, however.) Cheers, Michael On 05/02/2019 17:02, Nick Mathewson wrote: > Filename: 300-walking-onions.txt > Title: Walking Onions: Scaling and Saving Bandwidth > Author: Nick Mathewson > Cre

Re: [tor-dev] Upcoming Tor change with application impact: "Dormant Mode"

2019-01-04 Thread Michael Rogers
Sorry, I have one more follow-up question. On 02/01/2019 21:00, Nick Mathewson wrote: > On Fri, Dec 21, 2018 at 6:34 AM Michael Rogers > wrote: >> >> Hi Nick, >> >> Is the guard connection closed when becoming dormant? > > No; it times out independently. I

Re: [tor-dev] Upcoming Tor change with application impact: "Dormant Mode"

2019-01-04 Thread Michael Rogers
Hi Nick, Thanks very much for the reply. Follow-ups inline below. On 02/01/2019 21:00, Nick Mathewson wrote: > On Fri, Dec 21, 2018 at 6:34 AM Michael Rogers > wrote: >> >> Hi Nick, >> >> Is the guard connection closed when becoming dormant? > > No; it t

Re: [tor-dev] Upcoming Tor change with application impact: "Dormant Mode"

2018-12-21 Thread Michael Rogers
NAL DORMANT? If Tor doesn't close client connections when becoming dormant, will it become active again (or send an event that the controller can use to trigger SIGNAL ACTIVE) if there's activity on an open client stream? Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-ke

Re: [tor-dev] Dealing with frequent suspends on Android

2018-12-04 Thread Michael Rogers
On 26/11/2018 21:46, Nick Mathewson wrote: > On Wed, Nov 21, 2018 at 5:10 PM Michael Rogers > wrote: >> >> On 20/11/2018 19:28, Nick Mathewson wrote: >>> Hi! I don't know if this will be useful or not, but I'm wondering if >>> you've seen this

Re: [tor-dev] Dealing with frequent suspends on Android

2018-11-21 Thread Michael Rogers
ant mode occasionally to fetch diffs before they expire, so we can avoid fetching a fresh consensus later. Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailin

Re: [tor-dev] Dealing with frequent suspends on Android

2018-11-12 Thread Michael Rogers
On 07/11/2018 09:04, teor wrote: > > >> On 7 Nov 2018, at 04:10, Michael Rogers wrote: >> >> On 06/11/2018 01:58, Roger Dingledine wrote: >>> On Tue, Nov 06, 2018 at 11:38:33AM +1000, teor wrote: >>>>> so if we could ask the guard for >>&g

Re: [tor-dev] Dealing with frequent suspends on Android

2018-11-06 Thread Michael Rogers
re interesting for the Briar case, since it > comes way way more often than keepalives: so if you're trying for deep > sleep but you wake up for network activity every several seconds, you'll > probably end up sad. Unfortunately we've disabled netflo

[tor-dev] Dealing with frequent suspends on Android

2018-11-05 Thread Michael Rogers
some of the time, for sleeping to be worthwhile. And finally, even if all those conditions are met, we run up against the 15-minute limit on alarms again. None of these options are good. I'm not even sure if the first and third are feasible. But I don't know enough about Tor or libe

Re: [tor-dev] obfs4, meek, active probing and the timeline of pluggable transports

2018-10-29 Thread Michael Rogers
ecome possible with encrypted SNI, which is now supported by Cloudflare. If anyone on the list knows whether/when we're likely to see a pluggable transport based on encrypted SNI I'd love to hear about it. Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys si

Re: [tor-dev] Temporary hidden services

2018-10-22 Thread Michael Rogers
On 19/10/2018 16:05, Leif Ryge wrote: > On Wed, Oct 17, 2018 at 07:27:32PM +0100, Michael Rogers wrote: > [...] >> If we decided not to use the key blinding trick, and just allowed both >> parties to know the private key, do you see any attacks? > [...] > > If I&#x

Re: [tor-dev] Temporary hidden services

2018-10-22 Thread Michael Rogers
On 19/10/2018 14:01, George Kadianakis wrote: > Michael Rogers writes: >> A given user's temporary hidden service addresses would all be related >> to each other in the sense of being derived from the same root Ed25519 >> key pair. If I understand right, the security

Re: [tor-dev] Temporary hidden services

2018-10-19 Thread Michael Rogers
On 18/10/2018 13:26, George Kadianakis wrote: > Michael Rogers writes: > >> Hi George, >> >> On 15/10/2018 19:11, George Kadianakis wrote: >>> Nick's trick seems like a reasonable way to avoid the issue with both >>> parties >>> knowing t

Re: [tor-dev] Temporary hidden services

2018-10-17 Thread Michael Rogers
protocol for doing that yet). I guess that may help to deter adversaries who don't want to reveal that they can read and modify the channel. Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature

Re: [tor-dev] Temporary hidden services

2018-10-01 Thread Michael Rogers
On 28/09/2018 02:40, Nick Mathewson wrote: > On Thu, Sep 27, 2018 at 9:26 AM Michael Rogers > wrote: >> >> Hi all, >> >> The Briar team is working on a way for users to add each other as >> contacts by exchanging links without having to meet in person. >&g

Re: [tor-dev] Temporary hidden services

2018-10-01 Thread Michael Rogers
r confidence that they've received your authentic link. On the other hand, time-limited or single-use links are less likely to become surveillance selectors in their own right, and the "key fingerprints on business cards" pattern has never really caught on. So there are pros and c

[tor-dev] Temporary hidden services

2018-09-27 Thread Michael Rogers
this question? Or is this way of using hidden services too disgusting to even discuss? :-) Thanks, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@li

Re: [tor-dev] Alternative directory format for v3 client auth

2018-07-11 Thread Michael Rogers
On 11/07/18 14:22, George Kadianakis wrote: > Michael Rogers writes: > >> On 10/07/18 19:58, George Kadianakis wrote: >>> here is a patch with an alternative directory format for v3 client auth >>> crypto key bookkeeping as discussed yesterday on IRC: >>&g

Re: [tor-dev] Alternative directory format for v3 client auth

2018-07-11 Thread Michael Rogers
;client_authorized_privkeys" if it might contain private keys, public keys, or a mixture of the two? Cheers, Michael 0x11044FD19FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailing

Re: [tor-dev] Proposal 286: Controller APIs for hibernation access on mobile

2017-12-06 Thread Michael Rogers
On 05/12/17 22:18, teor wrote: > >> On 6 Dec 2017, at 05:12, Michael Rogers wrote: >> >> If the service needs to fetch a consensus and microdescs before it can >> respond to a rendezvous cell, the delay could be far longer than the >> difference in latency betwee

Re: [tor-dev] Proposal 286: Controller APIs for hibernation access on mobile

2017-12-05 Thread Michael Rogers
On 01/12/17 12:16, teor wrote: > >> On 1 Dec 2017, at 21:56, Michael Rogers wrote: >> >>> On 30/11/17 12:55, Nick Mathewson wrote: >>> >>> When a Tor instance that is running an onion service is IDLE, it >>> does the minimum to try to rem

Re: [tor-dev] Proposal 286: Controller APIs for hibernation access on mobile

2017-12-01 Thread Michael Rogers
until we get client > activity. Has no effect if not in sleep or idle. > > "WAKEUP" -- If in sleep, sleep-update, idle, idle-update, or > shutdown:sleep state, enter the live state. Has no effect > in any other state. How does the co

Re: [tor-dev] Action items wrt prop224 onion address encoding (was Re: Proposition: Applying an AONT to Prop224 addresses?)

2017-04-11 Thread Michael Rogers
not in the blinded key derivation, can a service publish descriptors for multiple protocol versions? Would there be a conflict if the HS directories store the descriptors under the same blinded key? Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Descripti

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-02-07 Thread Michael Rogers
descriptor, but a v4 descriptor and a v5 descriptor could point to the same hidden service, which would be compatible with both descriptors? 3. The version of the *entire protocol* - meaning that a v4 address must point to a v4 descriptor, which must point to a v4 hidden service? Cheers, Michael

Re: [tor-dev] Is it safe for second_elapsed_callback() to be called less often?

2016-12-07 Thread Michael Rogers
On 02/12/16 16:56, Nick Mathewson wrote: > On Thu, Dec 1, 2016 at 9:54 AM, Michael Rogers > wrote: >> Hi, >> >> When running hidden services on Android I've found it's necessary to >> hold a wake lock to keep the CPU awake. Otherwise Tor's >> se

[tor-dev] Is it safe for second_elapsed_callback() to be called less often?

2016-12-01 Thread Michael Rogers
y sane? Another possibility would be to look into how Libevent's timers work. Perhaps we can ensure that the timers wake the CPU on Android, so second_elapsed_callback() and any other timer-based functions get called without keeping the CPU permanently awake? Thanks, Michael 0x9FC527CC.asc

Re: [tor-dev] Different trust levels using single client instance

2016-10-31 Thread Michael Rogers
Likewise DANGEROUS_PORT leaks information about ports, HS_DESC about HS descriptor lookups. I'm not sure if covert channels between two VMs (e.g. for exfiltration) are part of your threat model, but events would be a rich source of those too. Cheers, Michael 0x9FC527CC.asc Description:

Re: [tor-dev] [prop269] Further changes to the hybrid handshake proposal (and NTor)

2016-10-17 Thread Michael Rogers
erial shouldn't be included in the salt? Again, probably just a failure on my part to understand the context, but I thought I should ask just in case. Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature

Re: [tor-dev] Proposal 273: Exit relay pinning for web services

2016-10-06 Thread Michael Rogers
erved over plain HTTP, and apply the same trusted certificate rules to the connection that supplies the header as the connection that supplies the policy (sites that want pinning can use HSTS to upgrade HTTP to HTTPS before serving the pin header) Cheers, Michael

Re: [tor-dev] Revisiting prop224 time periods and HS descriptor upload/downloads

2016-04-21 Thread Michael Rogers
d the client are both running on mobile devices, the relative skew can be twice as much. Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list to

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-04-04 Thread Michael Rogers
filters would be applied to the underlying list, resulting in more candidates without repeating any sampling. Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev

Re: [tor-dev] stopping the censoring of tor users.

2016-02-26 Thread Michael Rogers
"It might not have been me, anyone could be an exit node". Cheers, Michael On 25/02/16 22:06, blacklight . wrote: > About the issue of exit nodes needing to know to which bridge they need > to connect to, could we not make a system that similair to hidden > services, so that the

Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points

2016-01-14 Thread Michael Rogers
relay failures and internet connection failures. On Android the OS broadcasts connectivity events that could be used to reset the retry counter via the control port, but I don't know about other platforms. Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature

Re: [tor-dev] Fwd: Orbot roadmap feedback

2016-01-13 Thread Michael Rogers
On 13/01/16 16:04, Nathan Freitas wrote: > On Tue, Jan 12, 2016, at 11:52 AM, Michael Rogers wrote: >> On 12/01/16 16:16, Nathan Freitas wrote: >>> The broader idea is to determine which Tor torrc settings are relevant >>> to the mobile environment, and that coul

Re: [tor-dev] Fwd: Orbot roadmap feedback

2016-01-12 Thread Michael Rogers
mobile data, feel free to backport it to Orbot. Likewise for the plugin as a whole, if it would be a suitable basis for LibOrbot. We've benefitted a lot from your work and I'd love to send some contributions back upstream! Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys

Re: [tor-dev] Shared random value calculation edge cases (proposal 250)

2015-12-07 Thread Michael Rogers
ences. When the failed dirauths come back online they should accept the consensus that was generated in their absence. So in the following round, all dirauths will vote for an SRV based on the one that was agreed while the failed dirauths were offline. Cheers, Michael > I wonder what's

Re: [tor-dev] Shared random value calculation edge cases (proposal 250)

2015-11-20 Thread Michael Rogers
RV they know about, right? It doesn't have to be yesterday's SRV - if the last fresh SRV was produced a week ago, they keep hashing based on that (which is not ideal of course). As above, using the consensus seems like a good idea because it allows the network to converge on the same v

Re: [tor-dev] Proposal: Padding Negotiation

2015-10-14 Thread Michael Rogers
ratio exceeds the limit and the relay stops padding, will the client know that the circuit's no longer protected? Perhaps the safe thing would be to kill the circuit? Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP dig

Re: [tor-dev] Should cloud-hosted relays be rejected?

2015-09-02 Thread Michael McConville
tordev...@safe-mail.net wrote: > > > I'm not talking about those providers hosting exit nodes. I'm > > > talking about general web sites and resources hosted by them and > > > the traffic that goes there. > > > > I'm confused. You're worried about people hosting clearnet websites > > with cloud hos

Re: [tor-dev] Should cloud-hosted relays be rejected?

2015-09-01 Thread Michael McConville
tordev...@safe-mail.net wrote: > > I don't think banning GCE, AWS and MS Azure is an efficient method > > to significantly increase the cost of attacks because it is trivial > > for an attacker to quickly spin up "a large number of disposable > > machines" at other ISPs as well. > > It has other b

Re: [tor-dev] Remove NULL checks for *_free() calls

2015-08-30 Thread Michael McConville
Mansour Moufid wrote: > Michael McConville wrote: > > free() is specified to be NULL-safe, and I don't know of any > > implementations that violate this. > > I think those NULL checks are meant to avoid double-free bugs. If you > assign NULL to a pointer after you f

[tor-dev] Remove NULL checks for *_free() calls

2015-08-30 Thread Michael McConville
free() is specified to be NULL-safe, and I don't know of any implementations that violate this. Tor's *_free() functions conform, although relaycache_free() prints a warning (which I remove in the below diff). I checked every *_free() function for NULL-safety before removing conditions for it. Thi

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-08-19 Thread Michael Rogers
rd by repeatedly breaking the circuit until it was rebuilt through the corrupt middle node. Would it make sense to use vanguards here, as well as on rendezvous circuits? Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Descripti

Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2015-05-28 Thread Michael Rogers
ensive. A quick thought: to select IPs by bandwidth weight, divide each IP into one or more slices depending on its bandwidth, then select slices instead of selecting IPs directly. Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: O

Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2015-05-28 Thread Michael Rogers
consensus the client is using, the service may not have a copy of that consensus (and may not ever have had one). Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailin

Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2015-05-28 Thread Michael Rogers
) similarly to how 224 selects HSDirs. One small problem with this suggestion (hopefully fixable) is that there's no single "current consensus" that the client and IP are guaranteed to share: https://lists.torproject.org/pipermail/tor-dev/2014-September/007571.html Cheers, Michael

Re: [tor-dev] Listen to Tor

2015-05-21 Thread Michael Rogers
f music, one for unanonymised traffic and the other for the same traffic passed through Tor? Then we'd know what privacy sounds like. :-) Cheers, Michael 0x9FC527CC.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature __

Re: [tor-dev] Hidden Services and IP address changes

2015-05-21 Thread Michael Rogers
ing the Tor source code and not sure how to best >> fix them. > > Thanks for bringing this up. I know Michael from Briar has definitely > focused on solving this at some point, and Yaron from the Thali Project > (who build this library: > https://github.com/thaliproject/Tor_Onion_

Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2015-05-12 Thread Michael Rogers
alicious middle node, the adversary would learn the identity of the HS's guard. I don't know whether that's a serious enough threat to outweigh the benefits of this idea, but I thought it should be mentioned. Cheers, Michael signature.asc Description: OpenPGP digital signature _

Re: [tor-dev] PT-themed stuffed animals: huggable transports

2015-04-01 Thread Michael Rogers
USENIX Security. > > [1] http://en.wikipedia.org/wiki/Rabbit That's a plaintext rabbit - surely you meant [2]? Cheers, Michael [2] https://en.wikipedia.org/wiki/File:Hare_Tonic.jpg signature.asc Description: OpenPGP digital signature ___ to

Re: [tor-dev] Brainstorming ideas for controller features for improved testing; want feedback

2015-03-20 Thread Michael Rogers
test our download logic, it would be helpful to have a way > to drop items from our caches. This too. (I have a patch for purging entries from the HS descriptor cache that I'll bring to the patch workshop one of these weeks...) Cheers, Michael signature.asc Descri

Re: [tor-dev] bittorrent based pluggable transport

2015-03-07 Thread Michael Rogers
gh information to manage their own risks. Is that true of all users? If not, perhaps the only responsible course of action is to disable risky features by default and give any users who want to manage their own risks enough information to decide whether to overrid

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Michael Rogers
process running > just to keep the HS alive. Dormant processes are essentially free, so does this matter? Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJU4kaeAAoJEBEET9GfxSfMP/oH/Aoel3gyOAtn5NrgKh6WRcFf 5TwPOElP/vL+XI5XrPRYJYczilQ2st/ZLu6nu

Re: [tor-dev] high latency hidden services

2015-01-20 Thread Michael Rogers
ve padding, if a relay detects a gap in the incoming traffic along a circuit, it doesn't try to assign blame for the existence of the gap - it just fills it. Likewise for the single-hop padding scheme I suggested: each relay is responsible for normalising its out

Re: [tor-dev] high latency hidden services

2015-01-20 Thread Michael Rogers
he client and the hidden service are cooperating - for example, a Pond client and server that want unlinkability rather than mutual anonymity. For that use case we may be able to find a relatively simple, low-overhead solution that doesn't depend on datagram transports, new flow control algo

Re: [tor-dev] high latency hidden services

2015-01-19 Thread Michael Rogers
ics: http://pdos.csail.mit.edu/tarzan/docs/tarzan-ccs02.pdf http://pdos.csail.mit.edu/tarzan/docs/tarzan-thesis.pdf George Danezis looked at the anonymity properties of paths chosen from a restricted graph rather than a complete graph (this was in the context of mix networks, but the findings may also be

Re: [tor-dev] high latency hidden services

2015-01-05 Thread Michael Rogers
saying that wheat can only be sent over links that have been chosen to carry chaff? Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUquNZAAoJEBEET9GfxSfMO3MIAIVQ0nlcHjNjudOKMGpG6pyI wDcq9GfFIp1h9WDYh0c+d398XEfAp+TlDAKNsGK3d7tFQHyM5JgtbaK/FGzXxcSj hBeynFQ

Re: [tor-dev] high latency hidden services

2015-01-01 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Resurrecting a thread from last year... On 11/12/14 16:05, grarpamp wrote: > On Thu, Dec 11, 2014 at 8:26 AM, Michael Rogers > wrote: >> * Which links should carry chaff? > > First you need it to cover the communicating end

Re: [tor-dev] TOR C# application

2014-12-17 Thread Michael Rogers
/psiphon/ploggy/TorWrapper.java https://github.com/thaliproject/Tor_Onion_Proxy_Library All of the above are based on Orbot by the Guardian Project: https://gitweb.torproject.org/orbot.git Cheers, Michael On 15/12/14 15:51, Hollow Quincy wrote: > Hi all, > > I would like to write a C# applic

Re: [tor-dev] high latency hidden services

2014-12-11 Thread Michael Rogers
u.edu/cs6461/www/Reading/08/Wang-ccs08.pdf https://www.cosic.esat.kuleuven.be/publications/article-1230.pdf Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUiZt+AAoJEBEET9GfxSfMYsQH/iMCSvmQYxjGFZC5lzvpT06Z Ggjk+mflVkEDCKPt8e8ucQ7dp1URi9BS0wgxv

Re: [tor-dev] high latency hidden services

2014-12-09 Thread Michael Rogers
the exponential, we also have to consider the pause time at each hop while building circuits and the 'hangover time' at each hop while tearing them down. But I think we can mine the mix literature for some ideas to apply - and probably some attacks against this first attempt at a design as

Re: [tor-dev] obfs4 questions

2014-11-29 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 29/11/14 00:35, Yawning Angel wrote: > On Fri, 28 Nov 2014 17:57:26 +0000 Michael Rogers > wrote: > >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >> >> On 28/11/14 15:50, Yawning Angel wrote: >>> A one

Re: [tor-dev] obfs4 questions

2014-11-28 Thread Michael Rogers
doesn't derive the authentication key from the nonce) you can include the nonce in the AAD, so it's explicitly authenticated. With crypto_secretbox it seems like the nonce is implicitly authenticated, but I just wanted to be sure. Cheers, Michael -BEGIN PGP SIGNATUR

Re: [tor-dev] obfs4 questions

2014-11-28 Thread Michael Rogers
Interesting, thanks. Would SHA-256 be too slow for obfuscation? It just seems like a lot of dependencies for a simple protocol. For what it's worth, we're using the two-box approach for the next version of the Briar transport protocol. I'm concerned about the possibility of an attack co

[tor-dev] obfs4 questions

2014-11-28 Thread Michael Rogers
esigned to ensure this. Any particular reason for using two different MACs (HMAC-SHA256-128 for the handshake, Poly1305 for the frames) and two different hashes (SHA-256 for the handshake, SipHash-2-4 for obfuscation)? Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12

Re: [tor-dev] high latency hidden services

2014-11-20 Thread Michael Rogers
gt; starting points. I would love to participate, and encourage > everyone to start in this direction (in your copious free time ;). This issue has just come up on the guardian-dev list, so we're moving the conversation over here. Context quoted below. On Thu, Nov 20, 2014, at 09:46 AM, Michae

Re: [tor-dev] Hidden Service authorization UI

2014-11-11 Thread Michael Rogers
the auth cookies itself and supply the relevant cookie when making a SOCKS connection. The SOCKS password field seems like a natural fit, but I think perhaps Tor's already using the username and password for some other purpose? Cheers, Michael -BEGIN PGP SIGNATURE

[tor-dev] 5-hop hidden service circuits (was: Potential projects for SponsorR (Hidden Services))

2014-10-21 Thread Michael Rogers
is never guaranteed to happen, because each client may skip a consensus each time it downloads a fresh one. That would need to be addressed before implementing the 5-hop proposal. https://lists.torproject.org/pipermail/tor-dev/2014-September/007571.html Cheers, Michael -BEGIN PGP SIGNATURE

Re: [tor-dev] Patches to improve mobile hidden service performance

2014-10-08 Thread Michael Rogers
projects/tor/ticket/3521 Thanks! The patch only supports purging a single descriptor at present, but it would be easy enough to make the hostname optional and purge all descriptors if it's absent. Cheers, Michael -BEGIN PGP SIGNAT

Re: [tor-dev] Patches to improve mobile hidden service performance

2014-10-08 Thread Michael Rogers
to make the retention time of the HS descriptor cache configurable. Then clients connecting to mobile hidden services could set a shorter retention time than the default. But that would affect all hidden services used by the client. What I'm trying to achieve

[tor-dev] Patches to improve mobile hidden service performance

2014-10-07 Thread Michael Rogers
oject's repo, which is ahead of the upstream repo (n8fr8 needs commit privileges for upstream, I think). https://github.com/guardianproject/jtorctl I've only done small-scale testing of these patches so far. If they seems like they might be useful I'll create a trac ticket to mer

[tor-dev] Getting the network consensus

2014-09-30 Thread Michael Rogers
interval between the time 3/4 into the first interval after the consensus is no longer fresh, and the time one consensus interval after that, there would be no gap or overlap between replacement intervals. This wouldn't affect the third observation, however - there would still be no guarantee of

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-09-22 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 13/09/14 15:34, George Kadianakis wrote: > Michael Rogers writes: >> Hi George, >> >> Could you explain what it means to say that HS traffic isn't >> counted in the load balancing equations? Why is that so,

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-09-13 Thread Michael Rogers
isn't counted in the load balancing equations? Why is that so, and can it be changed if that would allow a more secure HS design? Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJUFEODAAoJEBEET9GfxSfMkicH/RJFaXcI2fmgq9Qm9xV5C3H

[tor-dev] Hidden services mailing list

2014-07-20 Thread Michael Rogers
list here: https://fulpool.org/cgi-bin/mailman/listinfo/hidden-services Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJTy9lOAAoJEBEET9GfxSfMZMIH/jHmO6/RlLUDSaEcxtgSsO1W rlxW9oPCmwoFg258+1FRAVmfpqmUxmr0RTMiG4yb2Go23mM7HmnNVJ

Re: [tor-dev] I have a group at internet archive that are, interested in buying a lot of OnionPi's

2014-07-01 Thread michael
ormance (judging that the newer boxes run a dual core ARM Cortex A7 1GHz and 1 Go RAM. Don't know about networking, as these boards integrate Allwinner A2 SoCs. A third (and most powerful of all) option would be to port to the Intel Galileo. That would be cheapest as well as exposing a IA32 i

Re: [tor-dev] Running Tor with static path

2014-06-16 Thread Michael Rogers
for writing > controllers here: https://stem.torproject.org/ A related question: is it possible to build introduction/rendezvous circuits via the controller protocol? Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) i

Re: [tor-dev] [GSoC 2014] Revamp GetTor: Send HTTP links for downloading TBB

2014-06-09 Thread michael
a difference in this regards? Sorry for so many questions, I'm not in the 'difficult' category so have no idea. >In the meanwhile we'll keep considering HTTPS links only. > Good choice, I hope you get the answer you're looking for. Cheers, Michael smime.p7s Desc

Re: [tor-dev] Question about HS code

2014-06-02 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 29/05/14 19:36, Nick Mathewson wrote: >> So what's the effect of REND_HID_SERV_DIR_REQUERY_PERIOD? > > > Hello, Michael! > > This looks like a possible bug to me. Could you open a ticket at > trac.torproject.

[tor-dev] Question about HS code

2014-05-27 Thread Michael Rogers
ories have been tried for the descriptor, allowing the same directories to be tried again before REND_HID_SERV_DIR_REQUERY_PERIOD elapses. So what's the effect of REND_HID_SERV_DIR_REQUERY_PERIOD? Thanks for any guidance, Michael -BEGIN PGP SIGNATURE- Ver

Re: [tor-dev] RFC: obfs4 (Name not final)

2014-05-23 Thread Michael Rogers
fixed-length frames, or using the decrypted length field before checking whether it's been tampered with. Cheers, Michael -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBCAAGBQJTf2xRAAoJEBEET9GfxSfMdPIH/0YQ+9d0HBl2Nj4imSKwe6tz 6OWKqgL5Vqd/Qvq7/vSwtHVY+yY/+C1dmHGLFAO+6W

Re: [tor-dev] Code review request for bug #9701

2014-05-15 Thread michael
ould be necessary to test on the actual OS as long as the feature >can be exercised on the test rig. If the feature is not covered by >a test case it wouldn't help to run it on the actual OS. > I don't know of a test rig that middle clicks, but I'm kind of new here. So you don&

  1   2   >