Re: [tor-dev] Proposal 334: A flag to mark Relays as middle-only

2021-09-16 Thread s7r
Tor Relays wrote: David Goulet: However, I'm not sure we should always let 1 authority dictate that flag regardless of what the others think. I think we need to enforce majority here and not have one single authority dictate it. Thoughts? +1 I can compromise one authorit

Re: [tor-dev] Proposal 334: A flag to mark Relays as middle-only

2021-09-07 Thread s7r
Neel Chauhan wrote: I believe it shouldn't affect these scenarios, but have mentioned we should look out for them. P.S. Rendezvous point is NOT a less powerful position (at least from an onion service server/operator point of view), unless you are using vanguards plugin by Mike with rendguar

Re: [tor-dev] Proposal 334: A flag to mark Relays as middle-only

2021-09-07 Thread s7r
Neel Chauhan wrote: Hi, As asked in the torspec MR [1] (42) for ticket [2] (40448), I propose a MiddleOnly dirauth flag for relays. The proposal, #334, is attached to this email, and is titled "A dirauth flag to mark Relays as Middle-only". Please comment and review it. Best, Neel Chauha

Re: [tor-dev] onionbalance useful on same server / for high-spec non-location hidden servers?

2020-06-03 Thread s7r
Patrick Schleizer wrote: > Would it be useful to run multiple Tor instances and onionbalance on the > very same server? Or does that totally defeat the purpose of onionbalance? > > In my case, it's not a location hidden service. Just an alternative way > to connect to a server which is available o

Re: [tor-dev] Proposal 320: Removing TAP usage from v2 onion services

2020-05-13 Thread s7r
Nick Mathewson wrote: > ``` > Filename: 320-tap-out-again.md > Title: Removing TAP usage from v2 onion services > Author: Nick Mathewson > Created: 11 May 2020 > Status: Open > ``` > > (This proposal is part of the Walking Onions spec project. It updates > proposal 245.) > > # Removing TAP from

Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses

2020-02-04 Thread s7r
Mirimir wrote: > On 02/03/2020 02:17 PM, s7r wrote: > > > >> In the current form of this proposal, it looks kind of optional ("We >> propose this optional change, to improve..."). I propose removing the >> line which contains "this optional change&q

Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization

2020-02-04 Thread s7r
juanjo wrote: > Since no one is posting it here and talking about it, I will post it. > > https://nvd.nist.gov/vuln/detail/CVE-2020-8516 > > The guy: > http://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html > > > Is this real? > > Are we actually not verifying

Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses

2020-02-03 Thread s7r
Hi teor, teor wrote: > Hi s7r, > > Thanks for bringing up IPv6 address privacy extensions. > >> On 30 Jan 2020, at 02:19, s7r wrote: >> > > I read RFCs 4941 and 3041, looked at the tor directory spec, and did some > analysis: > * tor clients get new relay

Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses

2020-01-29 Thread s7r
relay descriptor. s7r wrote: > Hi teor, > > Thanks for this epic work, some lecture for me to deeply go over this > weekend. > > By briefly reviewing I've noticed something important is missing that > should be a part of this proposal. > > I am not sure under

Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses

2020-01-29 Thread s7r
Hi teor, Thanks for this epic work, some lecture for me to deeply go over this weekend. By briefly reviewing I've noticed something important is missing that should be a part of this proposal. I am not sure under which section it should go under. I guess `3.2.2. Use the Advertised ORPort IPv4 an

Re: [tor-dev] Probability of Guessing a v3 Onion Address

2019-12-11 Thread s7r
proc...@riseup.net wrote: > Hi I was wondering what the mathematical probability of guessing an > onion v3 address that is kept secret. > > Or asked differently: what is the entropy of v3 addresses if an > adversary decides to bruteforce the entire keyspace? > > I am struggling to come up with a

Re: [tor-dev] Timing of opening pre-emptive circuits?

2019-09-18 Thread s7r
> Hi Tor-Dev, > > I'm curious what the timing is of Tor's opening of preemptive circuits. > Specifically, consider the following attack: > > 1. A new stream is assigned to a clean circuit. > 2. Because of the above, that clean circuit is now a dirty circuit. > 3. Because of the above, the number

Re: [tor-dev] Per-peer stream isolation for Bitcoin clients

2019-06-27 Thread s7r
Roger Dingledine wrote: > On Fri, Jun 28, 2019 at 07:53:54AM +1000, teor wrote: >> And you're right, Tor Browser can use lots more than 8 circuits, so >> I wouldn't worry about it. >> >> Do you know how much load Bitcoin places on the Tor network? >> >> If it's a lot, one good answer is to encourag

Re: [tor-dev] Proposal Waterfilling

2018-03-07 Thread s7r
Hello Florentin Rochet wrote: > Hello, > > > On 2018-03-07 14:31, Aaron Johnson wrote: >> Hello friends, >> >>> 1) The cost of IPs vs. bandwidth is definitely a function of market >>> offers. Your $500/Gbps/month seems quite expensive compared to what >>> can be found on OVH (which is hosting a

Re: [tor-dev] How about capping single operators to max. 10% exit capacity of the network?

2017-12-10 Thread s7r
Hi, teor wrote: > > On 11 Dec 2017, at 09:25, nusenu wrote: > >>> And I think we should focus our efforts on expanding the pool of exits, >>> and improving bandwidth measurement, rather than limiting operators >>> who are helping the network. (New automatic limits will likely be seen >>> as a r

Re: [tor-dev] Proposal 287: Reduce circuit lifetime without overloading the network.

2017-12-03 Thread s7r
Hello, Fernando Fernández Mancera wrote: [...] > Motivation: > > Currently Tor users are reusing a given circuit for ten minutes (by default) > after it's first used. This time is too long because a malicious Exit relay > can > trace a user's pseudonymous profile, especially if connections from

Re: [tor-dev] Open topics of prop247: Defending Against Guard Discovery Attacks using Vanguards

2017-07-04 Thread s7r
Hi George, George Kadianakis wrote: > Hello s7r, > > and thanks for helping with this and approaching it from a different > direction. > > Personally, I'd be really surprised if any solution that statistically > marks relays or paths as "suspicious" will eve

Re: [tor-dev] Open topics of prop247: Defending Against Guard Discovery Attacks using Vanguards

2017-07-04 Thread s7r
Hello Tim, Thank you very much for the comments. Please see my inline answers as I think I didn't explain good enough, most of the issues are not actually a problem. teor wrote: >> ... >> >> A rendezvous relay is considered suspicious when the number of >> successfully established circuits in the

Re: [tor-dev] Open topics of prop247: Defending Against Guard Discovery Attacks using Vanguards

2017-07-02 Thread s7r
George Kadianakis wrote: > Hello, > > here is some background information and summarizing of proposal 247 > "Defending Against Guard Discovery Attacks using Vanguards" for people > who plan to work on this in the short-term future. > Hello, I have discussed in Amsterdam briefly with David about

Re: [tor-dev] [RFC] Directory structure of prop224 onion services

2017-01-30 Thread s7r
Hi, David Goulet wrote: > On 30 Jan (16:16:07), George Kadianakis wrote: >> David Goulet writes: >> >>> On 26 Jan (15:05:26), George Kadianakis wrote: Hey list, >>> >>> Hi! >>> >>> First, big thanks for this write up! >>> with service-side prop224 implementation moving forward, we

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-30 Thread s7r
Hello, George Kadianakis wrote: > grarpamp writes: > >> Skimming thread... >> >> Version or not is fine, provided if you want versions you >> know you must store the bits somewhere, or ensure regex >> parser rules to recognize and match an intrinsic version >> represented by entire address forma

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-24 Thread s7r
Hello, David Goulet wrote: > >> >> OK thanks for the useful discussion. I identified at least three feedback >> points: >> >> + Screw base58 it's not gonna work. We stick to base32. Usability will >> be "restored" with a proper name system. >> >> + Move version byte to the end of the address t

Re: [tor-dev] [RFC] Proposal for the encoding of prop224 onion addresses

2017-01-23 Thread s7r
Hello George, George Kadianakis wrote: > Hello list, > > we've had discussions over the past years about how to encode prop224 onion > addresses. Here is the latest thread: > https://lists.torproject.org/pipermail/tor-dev/2016-December/011734.html > > Bikeshedding is over; it's time to finally

Re: [tor-dev] sketch: An alternative prop224 authentication mechanism based on curve25519

2016-12-06 Thread s7r
hat will >> make the life of our users harder if we can avoid it. > > I believe it can be addressed by a good UI in TBB mostly to fit this client > authorization proposal. Answers below. > >> >> s7r: >>> George Kadianakis wrote: >>>> I ha

Re: [tor-dev] [PATCH] torspec: Keep proposal-status.txt up to date

2016-12-01 Thread s7r
George Kadianakis wrote: > Hello, > > I was in a train yesterday and decided to do some torspec > housekeeping. So I updated the proposals/proposal-status.txt file which > includes a summary of every proposal. > > You can find my changes here: > > https://gitweb.torproject.org/user/asn/torsp

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-25 Thread s7r
Hi, David Goulet wrote: > On 24 Nov (11:13:06), teor wrote: >> >>> On 24 Nov. 2016, at 11:04, Yawning Angel wrote: >>> >>> On Thu, 24 Nov 2016 01:43:15 +0200 >>> s7r wrote: >>>> I agree that this would be "the technical way" t

Re: [tor-dev] sketch: An alternative prop224 authentication mechanism based on curve25519

2016-11-25 Thread s7r
Hello, George Kadianakis wrote: > Nick Mathewson writes: > >> [ text/plain ] >> Hi! I thought I'd write this up while it was fresh in my mind. It >> could be used as an alternative method to the current proposed client >> authentication mechanism. We could implement both, or just this, or >>

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
On 11/24/2016 2:24 AM, Jesse V wrote: > On 11/23/2016 07:04 PM, Yawning Angel wrote: >> Our fix: "Add another command, that does essentially the same thing, >> because people picked the wrong options, then later deal with the >> fallout from people getting used to the temporary command, and crying

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: > No-one is proposing we abolish ADD_ONION with v2 services straight away. > > What we will do is make BEST mean v3, rather than v2. > RSA1024 will continue to mean v2, as it always has. > > ADD_ONION has always had an explicit BEST option, if clients don't want > the BEST type of key

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: > >> >> Very good. We can add a new torrc option for ed25519 key based >> authentication for clients (v3) so the current >> HiddenServiceAuthorizeClient (v2) will not break old torrc's until >> everyone upgrades. >> >> However, we could just add an auth-type value after >> HiddenServi

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
teor wrote: >>> >>> How does ADD_ONION fit in? >> >> It's forward compatible by design, since you have to specify a key type >> when you handle key management, and Tor gets to do whatever it wants if >> you ask it to generate a key with the `BEST` algorithm. >> >> Assuming people who use it aren't

Re: [tor-dev] prop224: What should we do with torrc options?

2016-11-23 Thread s7r
Hello David, David Goulet wrote: > Hi everyone! > > We are soon at the stage of implementing the service part of proposal 224 > (next gen. hidden service.). Parent ticket is #20657 but I'll be discussing > here ticket #18054. > > In a nutshell, we need to figure out the interface for the torrc f

Re: [tor-dev] Revisiting prop224 client authorization

2016-11-02 Thread s7r
teor wrote: > >> On 3 Nov. 2016, at 10:37, s7r wrote: >> >> I am very happy with the torspec patch. >> >> Not quoting entirely, only want to add something wrt randomizing the >> value for fake clients based on David's and teor's comments: >

Re: [tor-dev] Revisiting prop224 client authorization

2016-11-02 Thread s7r
I am very happy with the torspec patch. Not quoting entirely, only want to add something wrt randomizing the value for fake clients based on David's and teor's comments: David Goulet wrote: [SNIP] > > - I think "superencrypted" -> "super-encrypted" would be nicer as everything > in the descrip

Re: [tor-dev] Revisiting prop224 client authorization

2016-10-19 Thread s7r
Hello George, Inline comments: > Hello again, > > I read the feedback on the thread and thought some more about this. Here > are some thoughts based on received feedback. A torspec branch coming > soon if people agree with my points below. > > I'd also like to introduce a new topic of discussio

Re: [tor-dev] Proposal 273: Exit relay pinning for web services

2016-10-16 Thread s7r
teor wrote: > >> On 7 Oct 2016, at 00:22, s7r wrote: >> >> I don't care about location anonymity because my >> website is clearnet public anyway and I want my website to handle many >> Tor users, just setup a bridge Tor instance on localhost (127.0.0.1) no

Re: [tor-dev] Revisiting prop224 client authorization

2016-10-14 Thread s7r
Hi David, David Goulet wrote: > > Personally, I would really like to be able to hide the fact that a service is > using client authorization. Both could hide that but not that trivially. > > I would pick double encryption for the simple fact that I really want to us to > expose as little as we c

Re: [tor-dev] Revisiting prop224 client authorization

2016-10-13 Thread s7r
Hi, George Kadianakis wrote: [SNIP] > >Some further questions here: > >i) Should we fake the client-auth-desc-key blob in case client > authorization > is not enabled? Otherwise, we leak to the HSDir whether client auth is > enabled. The drawback here is the desc size increa

Re: [tor-dev] Proposal 273: Exit relay pinning for web services

2016-10-06 Thread s7r
Won't comment on the entire content because I have one big comment which refers to the entire proposal or better say the concept of the proposal. I would reject this proposal's concept, because we have o excuse to over-engineer and complicate things in this manner. This is just too complicated for

Re: [tor-dev] Potential regression when binding sockets to interface without default route

2016-09-19 Thread s7r
Hello, On 9/19/2016 4:14 PM, René Mayrhofer wrote: [SNIP] > Problem: This worked nicely with Tor 0.2.5.12-1 on Debian Jessie. We > upgraded about two weeks ago to 0.2.8.7-1 from the Tor apt repositories > (mostly in response to > https://blog.torproject.org/blog/tor-0287-released-important-fixes a

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-13 Thread s7r
On 9/13/2016 6:13 PM, Razvan Dragomirescu wrote: > I disagree with your approach, for comparison's sake, let's say v2 is > IPv4 and v3 is IPv6. When IPV6 was introduced, IPv4 was kept around (and > still is to this day, although IPv6 is arguably a much better solution > in a lot of areas). Expecti

Re: [tor-dev] "old style" hidden services after Prop224

2016-09-13 Thread s7r
On 9/13/2016 3:27 PM, David Goulet wrote: [SNIP] > Hello! > > So I 100% share Ivan's concerns. The Hidden Service subsytem of Tor is quite > complex, lots of pieces need to be glued together and prop224 will add a lot > of new code (in the 10 of thousand+). > > We decided a while back to have the

Re: [tor-dev] is the consensus document unpredictable / unique?

2016-06-25 Thread s7r
Hello again, I am sorry, too tired and written something wrong: On 6/26/2016 1:29 AM, s7r wrote: > Very soon Tor will include an unique random value we call "Consensus > Shared Randomness [SRVALUE]" in every consensus, you can just use that. > This is proposal 250. This

Re: [tor-dev] is the consensus document unpredictable / unique?

2016-06-25 Thread s7r
Hello, If you hash the consensus entirely, yes that should produce unique hashes every time that are unpredictable until the consensus is available. However, you cannot guarantee it will be the same value for everyone at a given time, because consensus documents overlap and two clients/relays mig

Re: [tor-dev] estimating traffic/bandwidth needed to run a Tor node

2016-05-22 Thread s7r
Razvan, Your email is confusing. To host a Hidden Service you do not need to be a Tor node - we call them relays in the common terminology. So, a relay relays traffic for Tor clients. This will consume as much as you give. You can throttle the relay bandwidth rate / burst or limit the traffic con

Re: [tor-dev] prop224: HSDir caches question with OOM

2016-04-16 Thread s7r
Hello, On 4/16/2016 4:11 PM, David Goulet wrote: [snip] >> >> >> A third alternative is that we can iterate through each time period: >> Set K to the oldest expected descriptor age in hours, minus 1 hour >> Deallocate all entries from Cache A that are older than K hours >> Deallocate all entries

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-03-27 Thread s7r
Hi, On 3/27/2016 1:00 PM, George Kadianakis wrote: >>[snip] >> >> https://lists.torproject.org/pipermail/tor-dev/2015-November/009871.html >> > > Hmm, this seems like something worth considering. > > IIUC you are basically suggesting using a single guardlist instead of having > two. And then al

Re: [tor-dev] Proposal 259: New Guard Selection Behaviour

2016-03-26 Thread s7r
Hello, teor, asn, see comments inline. On 3/24/2016 5:00 PM, Tim Wilson-Brown - teor wrote: [snip] >>> The number of directory guards will increase when 0.2.8-stable is >>> released and relays and clients upgrade. >>> In 0.2.8, relays accept tunnelled directory connections even if they >>> do not

Re: [tor-dev] Latency measurement from exits

2016-03-10 Thread s7r
Hello, I haven't measured that, but maybe this is helpful: I have measured some time ago was the latency in a hidden service (rendezvous) circuit: Client - guard - middle - rendezvous -- middle - middle - guard - HS [6 hops] I did the test by installing an OpenVPN TCP server on the hidden servi

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-24 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi teor, On 1/24/2016 6:33 AM, Tim Wilson-Brown - teor wrote: > Please read the tor man page documentation for the option > Tor2webRendezvousPoints. It's implemented in the function > pick_tor2web_rendezvous_node(). > > Under this proposal, what i

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Sorry for posting 2 times, want to highlight something which doesn't read clear. On 1/24/2016 4:44 AM, s7r wrote: > Consider this. We set the REND_FILTER_TOLERANCE to 4. This means > that any relay, regardless of its middle probabili

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello Mike, Answers inline. On 1/24/2016 1:56 AM, Mike Perry wrote: >>> A) Can I deny service to a hidden service by methodically >>> pretending to attack it from each honest relay, one at a time, >>> causing it to become upset at each of these r

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/24/2016 1:51 AM, Tim Wilson-Brown - teor wrote: > >> On 24 Jan 2016, at 09:28, s7r > <mailto:s...@sky-ip.org>> wrote: >> >>> * This will break some Tor2Web installations, which >>> deliberately c

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi teor, On 1/24/2016 12:11 AM, Tim Wilson-Brown - teor wrote: > Hi s7r, > > Great proposal, I really like it - I think it targets the actual > behaviour we want to prevent in a less complex manner than the HS > 3rd-hop alt

Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/24/2016 12:10 AM, Roger Dingledine wrote: > > A few more details about "this is not always enough" would be > helpful here. In particular, is it not always enough because > sometimes even 3 hops is not safe enough, or not always enough > besi

[tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side

2016-01-23 Thread s7r
- will do better next time. Filename: xxx-malicious-rendezvous-point-filter.txt Title: Filtering malicious rendezvous points at hidden service server side Authors: s7r [ 0x837FA52C81265B11 ] Created: 23 January 2016 Status: Draft 0. Definitions client = an user running Tor as a client, which con

Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network

2016-01-14 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, I think the solution to change the consensus format - section 3.3 is by far superior vs changing the ports on directory authorities or disabling old link protocols at relays side. Changing the consensus format is the cleanest way to do it an

Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points

2016-01-13 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, I am not a big fan of prop 246. I don't have a mindblowing counter argument that it's bad in some way, but I don't like the tradeoffs vs benefits ratio so much. It is a small performance improvement indeed, so clients will not cache descripto

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-03 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/3/2016 11:24 PM, Ryan Carboni wrote: > > Given the slow time it takes to roll things out, a timeline which > begins with trusted directory keys include post-quantum crypto > first, and which ends in enabling clients to use post-quantum > crypt

Re: [tor-dev] tor ignores --SigningKeyLifetime when keys exist

2015-11-28 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/28/2015 2:26 PM, nusenu wrote: > The important info for me here is: How is "about to expire" > defined? x days before expiry or I think 24 hours before expiry. > 80% of its lifetime is over? No. > Can it be configured? No. This would not

Re: [tor-dev] tor ignores --SigningKeyLifetime when keys exist

2015-11-28 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/28/2015 1:48 PM, nusenu wrote: > (thread split from [1]) > > reproducer: mkdir tdata tor --PublishServerDescriptor 0 --orport > 1234 --datadirectory tdata --list-fingerprint --quiet > > (new signing key with default expiry created) > > atte

Re: [tor-dev] documentation for new offline master key functionality (--keygen is undocumented)

2015-11-23 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I have actually tried this in practice to see what happens. If you replace the ed25519 medium term singing key and certificate in $datadirectory/keys, Tor will re-read keys from disk even if you don't send a SIGHUP when it outputs: [notice] It

Re: [tor-dev] OfflineMasterKey / ansible-relayor

2015-11-19 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/19/2015 6:02 PM, nusenu wrote: > > thanks for the feedback! > > Are secret_onion_* files required at all when restoring a relay? > (it doesn't look like it) > > If you confirm that I would simply remove them from the list and > never copy

Re: [tor-dev] Shared random value calculation edge cases (proposal 250)

2015-11-19 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/19/2015 3:57 PM, George Kadianakis wrote: > s7r writes: > > I'm not sure exactly what you are suggesting here. That the > participation flag should not simply be 0 or 1, and that it should > have more purposes? >

Re: [tor-dev] OfflineMasterKey / ansible-relayor

2015-11-19 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/19/2015 12:19 AM, nusenu wrote: >> background: I might want to integrate offline master key >> functionality into ansible-relayor [1]. > > I added (preliminary) OfflineMasterKey support to ansible-relayor > [1] - in fact it will become the on

Re: [tor-dev] Shared random value calculation edge cases (proposal 250)

2015-11-17 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Saw the content of this section in master was corrected, yet the subtitle is little confusing: 4.1.6. Including the ed25519 shared randomness key in votes [SRKEY] - From the content of this section I understand that we are going to include

Re: [tor-dev] possible to run --keygen non-interactively?

2015-11-15 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Oh, right - sorry, misunderstood. In this case not using --keygen might be a workaround. I do understand the use of --nopass, I'll include it in the ticket and maybe we can have it along with --master-key and --out. On 11/15/2015 5:36 PM, nusenu wr

Re: [tor-dev] documentation for new offline master key functionality (--keygen is undocumented)

2015-11-15 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/13/2015 8:51 PM, nusenu wrote: > Hi, > > since tor 0.2.7.5 is apparently not very far [1] from being > released I was wondering whether there is any documentation about > the new offline master key functionality? (or is this undocumented > be

Re: [tor-dev] possible to run --keygen non-interactively?

2015-11-15 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The "Enter passphrase" request when manually calling --keygen is optional, not mandatory. If you just leave it blank and proceed it will just create an unencrypted master identity key. On 11/14/2015 10:18 AM, nusenu wrote: > Hi, > > is there a way

Re: [tor-dev] Alternate Single Onion Service Designs

2015-11-07 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi teor, I like RSOS more and it removes 2 hops from a circuit which is quite A LOT. This is a significant step for operators that require latency. RSOS combined with OnionBalance or rendezvous approval feature which will allow scaling beyond what's

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-07 Thread s7r
PM, George Kadianakis wrote: > George Kadianakis writes: > >> s7r writes: >> >>> Hello, >>> >>> >>> >>> 4.1.1. Computing commitments and reveals [COMMITREVEAL] "The >>> value REVEAL is computed as follows: >&g

Re: [tor-dev] [proposal] New Entry Guard Selection Algorithm

2015-11-05 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi isis, I am also not sure if we should have DYSTOPIC_GUARDS and UTOPIC_GUARDS sets disjoint. It hurts the already fragile load balancing for Guards and will cause lighter load on FascistFirewall Guards (ports 80/443). I think usually users behind

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 asn, Is it possible to add a field called 'NOTARY' in the COMMIT and REVEAL values where we include the SR pubkey + certificates and everything we need so that we can validate each COMMIT / REVEAL value and tie it to the identity of a directory auth

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Epic work. I agree that the code enforcing commit majority was not making a difference in the partition attack. I also agree that the partition attack is (almost) useless, expensive and very noisy. An attacker can get the same result if, inst

Re: [tor-dev] adding smartcard support to Tor

2015-10-17 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello Razvan, What you try to achieve is possible. It can be done, but requires code to be written. If you are really interested about this feature you can either sponsor someone to write the code for it either code it yourself. The 1024 bit RSA pr

[tor-dev] Effect of padding on end to end correlation false positive rate

2015-10-16 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, I have an idea which I want to put into a proposal, but need a clarification first so I won't be working on something which doesn't make a big difference. I am describing something like a Sybil attack where the adversary runs relays, gets lu

Re: [tor-dev] Proposal: End-to-end encrypted onion services for non-Tor clients

2015-09-17 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, I like the idea of having a secure way for the non Tor users to browse hidden service content. Given the design presented, someone who wants to do it will need to rely on third parties: domain name registers, DNS providers, hosting providers

Re: [tor-dev] Proposal 247 (Hidden Service Vanguards) Overhaul

2015-09-14 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I like this very much. See comments inline. On 9/14/2015 2:07 AM, Mike Perry wrote: > I spent some time trying to clean up proposal 247 based on > everyone's comments, as well as based on my own thoughts. Please > have a look if you commented o

Re: [tor-dev] Partitioning Attacks on Prop250 (Re: Draft Proposal: Random Number Generation During Tor Voting)

2015-09-09 Thread s7r
a > specific authority and a specific timestamp, without requiring the > whole vote signature. This is required to do shared-rand-conflict > and might be useful in any case in the future. > > I made a patch that implements this for prop250 at: > > https://gitweb.torproject.

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-09-08 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I disagree. can you describe how exactly? What exactly can be gamed, if we use the protection described by me? It will provide the same security as directory authorities already have for voting about relays. It's true that ultimately anything can be

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-09-07 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Sending the comments from #tor-dev here as well. This is related to the attack where exactly half of the directory authorities commit to some values, and the last directory authority can send different values to both camps, and have the ultimat

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Worth mentioning, after #15745 we rotate the introduction points after between 16384 and 32768 (random) introductions and/or a lifetime of 18 to 24 hours (random). If we merge introduction points with HSDirs, we have no option but to use the sa

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Thanks for the input! On 8/20/2015 4:59 PM, l.m wrote: > >> "b) ..." > > Retrying guards is the crux of the problem. If you blindly retry > guards, even to prevent rotation, you eventually come to a hard > place where this will backfire badly

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
20/2015 3:27 PM, s7r wrote: > Hi, > > On 8/20/2015 2:28 PM, George Kadianakis wrote: >> Hello there, > >> recently we've been busy specifying various important >> improvements to entry guard security. For instance see proposals >> 250, 241 and ticket #1

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, On 8/20/2015 2:28 PM, George Kadianakis wrote: > Hello there, > > recently we've been busy specifying various important improvements > to entry guard security. For instance see proposals 250, 241 and > ticket #16861. > > Unfortunately, the c

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-11 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Things look good in ed25519_keygen - git-018082ef88b688e2. I can confirm the last defect was fixed (now it saves to disk ed25519_master_id_public_key if it only has ed25519_signing_cert - valid and ed25519_signing_secret_key). Log messages are

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
sh descriptors, relay traffic, save the world. On 8/7/2015 12:18 AM, s7r wrote: >>> Thanks; this is incredibly helpful! > >>> I've started a branch to do a test case to demonstrate all >>> these bugs ; it's called "ed25519_keygen" in my public >

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >> Thanks; this is incredibly helpful! > >> I've started a branch to do a test case to demonstrate all these >> bugs ; it's called "ed25519_keygen" in my public repository. It >> also adds a couple more features to '--keygen'. It does cases >>

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-06 Thread s7r
_cert and signing_secret_key and/or even if it has the ed25519_master_id_secret_key unencrypted). These commands would be useful as well: --getpubkey; --encryptkey; - --decryptkey; --newpass; --gensignkey. On 8/6/2015 4:14 AM, Nick Mathewson wrote: > On Tue, Aug 4, 2015 at 8:24 PM, s7

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 8/4/2015 5:42 PM, Nick Mathewson wrote: > Hi, s7r! > > This is an impressive writeup; thanks! > > One thing that makes it hard for me to follow this document is > that I'm not sure which parts are describing how things

[tor-dev] Tor's default behavior for ed25519 identities

2015-08-03 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Tor 0.2.7.x will support Ed25519 router identities along with the traditional 1024-bit RSA ones which will be used simultaneously for some time, until we will completely deprecate RSA router identities. I would like to document what Tor needs t

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-19 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 7/19/2015 9:26 AM, Roger Dingledine wrote: > On Sat, Jul 18, 2015 at 03:11:26AM +0300, s7r wrote: >> I still see the third hop (speaking from hidden service server >> start point) is the weak part here. An attacker can connect

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-18 Thread s7r
ed third guards would be a reasonable solution, in my > opinion. I would not be part of that consensus, but figuring out > the speed and size of the adversaries we care about is > unfortunately educated guessing at this point. > > Best, Aaron > > >> On Jul 17, 2015, at 8:11 PM, s7r

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-17 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 7/18/2015 12:49 AM, A. Johnson wrote: > > Not having the third guards be selected by every second guard makes > sense when you consider that the adversary may not be able to > compromise all relays equally. That was not a consideration I had > in

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-16 Thread s7r
Comments inline. On 7/16/2015 7:26 AM, Mike Perry wrote: > George Kadianakis: >> Hello, >> >> I'm attaching a proposal draft that should help us defend against >> guard discovery attacks. >> >> There are a few pieces left unfinished (see the XXXs) but I decided to >> release early and release ofte

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-12 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 arma - isn't prop 246 already taken? Filename: 246-hs-guard-discovery.txt Title: Defending Against Guard Discovery Attacks using Vanguards Author: George Kadianakis Created: 2015-07-10 Status: Draft On 7/13/2015 1:12 AM, Roger Dingledine wrote: >

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-11 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I find it better to add a new consensus flag called 'Vanguard' which will be assigned to relays with lower requirements than the 'Guard' (less bandwidth, just the Stable flag). We will then select second_guard_set and third_guard_set from relays havi

Re: [tor-dev] Proposal 246: Defending Against Guard Discovery Attacks using Vanguards

2015-07-11 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Estimations look good. I think second_guard_set & third_guard_set should not have the same requirements like how any Tor client chooses the guard (first hop). We can select second guards and third guards by requiring for example just Stable

[tor-dev] update obfs4proxy in deb.torproject.org

2015-06-21 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, An update is needed in http:// deb.torproject.org/torproject.org obfs4proxy main to version 0.0.5 (we currently have 0.0.4). armel and amrhf packages for obfs4proxy would be nice too, for mobiles/tablets/raspberrys etc. Also, why do we have

Re: [tor-dev] valid MyFamily syntax variations ('$FP=nick' ?)

2015-05-31 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, That would be invalid. I know there are some families which do it. You are free to enter a nickname at MyFamily parameter in your torrc, but it won't actually work for clients. Tor will still start on relay side and go on with it. It used to wo

  1   2   >