Just a gentle reminder that the PT meeting is today in few hours:
Friday - Oct 11 at
CEST: 18:00
BST (Summer GMT): 17:00
UTC: 16:00
EST: 12:00
MNT: 10:00
PST: 9:00
@ #tor-dev on irc.oftc.net
asn is going to moderate the session. (I have a very slow connection but
I'll try to join)
See you all
Hello PT devs,
We'll have our next meeting (almost) today
Friday - Sept 27 at
CEST: 18:00
BST (Summer GMT): 17:00
UTC: 16:00
EST: 12:00
MNT: 10:00
PST: 9:00
@ #tor-dev on irc.oftc.net
As last time asn is going to take us through this after identifying the
participant we go one by one and updat
Thanks for everybody who participated last week. The summary of the
meeting can be found here:
https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports/meetings/20130913BiWeeklyPT
We decided that we are going to have these meetings biweekly till we see
if we need more or less frequen
Hello pluggable transport devs,
As there was no objection to the proposed time, we are going to have our
first one today/tomorrow:
Friday - Sept 13
CEST: 18:00
BST (Summer GMT): 17:00
UTC: 16:00
EST: 12:00
MNT: 10:00
PST: 9:00
@ #tor-dev on irc.oftc.net
And stick to it in future. The format wil
> From: Yawning Angel
>
> Assuming not today (2013/09/16) isn't "soon", the times specified works
> for me and I will make an effort to attend.
>
No, I didn't mean today. I just wanted to send it as soon as found out
it hasn't been out. Perhapse it was better to wait few hours. But I
would like to
Hi Jeoren,
Thanks for your comments or tor-dev IRC channel. I thought I may as well
take my time and reply to them here so I can also include Zack, Vinod
and others into the discussion.
>I think the large chunks of commits without specific
>goals/descriptions what the commit fixes will be timeco
Hey Zack,
Thanks for replying so fast.
Zack Weinberg writes:
>and the retransmit of packet 1 ought to be happening on a
>*different* connection, if we have one. (Which steg are you using?)
I'm using nosteg steg. I thought if something is going to work, better, it
works with the simplest steg. n
Hello Zack,
In testing the retransmission algorithm, I encounter situations that
the ack/retransmission algorithm is unable to resolve by design. It
happens when the header of a packet gets deliver but the middle part
gets dropped. For example in the following scenario
Server sends packet 1 len 4
Hello TorDev,
Here, I'm reporting my recent progress on Stegotorus as well as
answering some questions from past.
During past month, I mainly worked in "retransmit = false" mode trying
to restore reliable browsing. I have resolved quite few bugs. Some of
them where due to incomplete implementatio
Hi Zack,
I added --drop-rate option to the tester-proxy and committed it to
f--bad-proxy-ack-tester branch. I confirm that Stegotorus fails
webpage-tester test when the drop-rate >= %10. Now, I'll go and look at
the problem in more depth.
Generally speaking, firefox is less successful in fetching
I summed up the discussion plus what I had in mind with in 15 tickets
that I put on the track.
https://trac.torproject.org/projects/tor/query?status=accepted&status=assigned&status=needs_information&status=needs_review&status=needs_revision&status=new&status=reopened&component=Stegotorus&order=pri
Hi Roger,
Thank you very much for replying to my appeal. I hope that other people
who are critical of Stegotorus jump-in along the line.
> 1) Like the FTE paper...
I'm going to discuss your first point at the end because it is not
criticism of Stegotorus per se, but of http transport in general.
Hello everybody,
I was talking to Roger yesterday on the IRC, and he mentioned that
"[S]tegotorus ... has a whole lot of problems". I have heard this many
times in different forms by now (in Florence, The sponsor F discussion,
etc). But I never saw these "lot of problems" are broken down in a lis
>The only issue with your trick, is that I'm not looking forward
>implementing a custom DH key exchange in Python (especially the DH
>parameter generation and public key validation parts).
>From the conversation of Zack with Steven at the breakfast table at
Hotel Cellai, I'm pretty sure that Stego
Hello Zack,
Sorry for being bit out of touch as I'm traveling and my access to Internet is
sporadic.
I'm still working on Stegonotorus. I developed the webpage_tester (now
on f--webpage-tester branch on github), that is curl using Stegotorus to
download anything on the web and compare it with th
Hello Tor-devers,
In last two weeks I was busy implementing the protocol by which the
st server sends a url dictionary to the client, so they the client can
communicate with server using this url code. It was bit tricky because
chop needed to be involved to distinguished between the data being
ser
Hey Zack,
I have pushed the working version of http_apache_steg_t. On server side
it asks apache for the load, on the client side it uses the url
dictionary and parameter values.
http_apache_steg_t is inherited from http_steg_t. But because of all
those macro hackish tricks (which expect you to i
Disc.:In the spirit of our discussion in Italy about unifying mailing list and
that we should submit our technical discussions on tor-dev instead of
tor-assistants, I'm moving my conversations with Zack here. If there's a
strong opposition I'll go back to the old model (but you should have
opposed
18 matches
Mail list logo