[tor-dev] Re: New idea

2025-07-17 Thread George Hartley via tor-dev
ll-meaning idea, and the concerns behind it are valid - > > but the approach would likely introduce more problems than it solves. The > > current design of Tor reflects a lot of hard lessons about trust, > > decentralization, and threat modeling that we’ve learned the hard w

[tor-dev] Re: New idea

2025-07-17 Thread George Hartley via tor-dev
uld likely introduce more problems than it solves. The current design of Tor reflects a lot of hard lessons about trust, decentralization, and threat modeling that we’ve learned the hard way over the past few years. Thank you, - George On Wednesday, July 16th, 2025 at 11:45 AM, Khaled Roomi

[tor-dev] New idea

2025-07-16 Thread Khaled Roomi via tor-dev
become slower but more anonymous. And that’s my idea, I hope you guys are safe and goodbye. ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Re: ORB - Onion Reply Block

2025-06-04 Thread Stefan Claas via tor-dev
com/Ch1ffr3punk/pluto > > I post it here, because on the regular Tor forum > it did not yet received any attention, in form of replies. > > Best regards > Stefan ___________________ tor-dev mailing list -- tor-dev@lists.torproject.org To

[tor-dev] ORB - Onion Reply Block

2025-06-04 Thread Stefan Claas via tor-dev
___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 363: Required/recommended protocols for onion services

2025-05-07 Thread Nick Mathewson via tor-dev
on gitlab, or to discuss here. Discussion on the forum is also okay! peace, -- Nick ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 364: CreateOnehop handshake to replace CREATE_FAST

2025-05-07 Thread Nick Mathewson via tor-dev
___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 362: Update onion service proof-of-work control loop

2025-05-06 Thread Wesley Aptekar-Cassels via tor-dev
. :w ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 361: Onion Association SANs in Certificates (OASIC)

2025-05-06 Thread Micah Anderson via tor-dev
orproject.org> _______ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 361: Onion Association SANs in Certificates (OASIC)

2025-05-06 Thread Micah Anderson via tor-dev
Onion Association authentication. This proposal was written by Paul Syverson, I'm announcing it on his behalf. -- Micah Anderson (he/him) Director of Engineering The Tor Project, Inc. <https://torproject.org> _______ tor-dev mailing list -- tor-dev@list

[tor-dev] [GSoC 2025] Graph-Based Relay Partitioning – Proposal and Repository

2025-04-22 Thread Valentina Schiavon via tor-dev
,Austria https://www.linkedin.com/in/valentinaschiavon1/ https://github.com/valentinaschiavon99 valentinaschiavo...@gmail.com ___________ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 360: Limiting HSDesc size and amplification

2025-04-09 Thread Nick Mathewson via tor-dev
scuss here. Discussion on the forum is also okay! best wishes, -- Nick ___________ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 359: Counter Galois Onion, Updated

2025-04-09 Thread Nick Mathewson via tor-dev
ikely to be _worse_ than our current malleable relay encryption. Please feel free to open tickets on gitlab, or to discuss here. Discussion on the forum is also okay! cheers, -- Nick _______ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe

[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?

2025-04-08 Thread nusenu via tor-dev
I added this as: https://gitlab.torproject.org/tpo/core/tor/-/issues/41046 kind regards, nusenu -- https://nusenu.github.io ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?

2025-04-08 Thread Roger Dingledine via tor-dev
On Tue, Apr 08, 2025 at 08:32:24AM -0400, Nick Mathewson via tor-dev wrote: > > Is tor able to use secondary groups? > > Hm. In src/lib/process.setuid.c, it looks like we're only calling > setgroups() with a single gid from the password database, not with any > additio

[tor-dev] Call for comments on proposals 346, 354, and 358.

2025-04-08 Thread Nick Mathewson via tor-dev
we're going to change their state from "Open" to "Accepted" in about a week. If anybody would like to comment, either here or on the bugtracker (https://gitlab.torproject.org/tpo/core/torspec/), that would be great! best wishes, -- Nick _________

[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?

2025-04-08 Thread Nick Mathewson via tor-dev
On Thu, Apr 3, 2025 at 6:29 PM nusenu via tor-dev wrote: > > Hi, > > given the following example, tor fails to access the familykeydir folder. > > familykeydir has the following permissions: > > drwxr-x--- 2 root tor_reader > > id _tor > uid=996(_tor) gid=993(_tor

[tor-dev] can tor use secondary groups to read FamilyKeyDirectory?

2025-04-03 Thread nusenu via tor-dev
_tor manually, it is possible to read files in that folder without problems. The problem does not happen when _tor's primary group is set to 'tor_reader'. Tested on debian. kind regards, nusenu -- https://nusenu.github.io ___________ tor-d

[tor-dev] Proposal 358: Unifying circuit handshake extensions

2025-03-27 Thread Nick Mathewson via tor-dev
the forum is also okay! cheers, -- Nick ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 356: Increasing netdoc strictness not considered (very) harmful

2025-03-27 Thread Nick Mathewson via tor-dev
tickets on gitlab, or to discuss here. Discussion on the forum is also okay! cheers, -- Nick ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 355: Options for postquantum circuit extension handshakes

2025-03-27 Thread Nick Mathewson via tor-dev
discuss here. Discussion on the forum is also okay! cheers, -- Nick ___ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 357: Circuit key exporters: A better way to use KH

2025-03-27 Thread Nick Mathewson via tor-dev
scuss here. Discussion on the forum is also okay! cheers, -- Nick ___________ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Re: Make torsocks mutli-arch ready

2025-03-27 Thread Hefee via tor-dev
e pages on a daily basis ;) So in case if it not a time critical, we get the information about a new release without any need from your side to inform me :) Regards hefee signature.asc Description: This is a digitally signed message part. _______ tor-dev

[tor-dev] Re: Make torsocks mutli-arch ready

2025-03-26 Thread Jim Newsome via tor-dev
s more processes, possibly of different archs (e.g. `torsocks bash -c "wget ..."`) Yes it would be nice, if torsocks could detect the arch correctly, but I also thought at these complications about subprocesses. Regards, hefee Thanks for reaching out! -Jim ________

[tor-dev] Re: Make torsocks mutli-arch ready

2025-03-26 Thread Hefee via tor-dev
sibly of different archs (e.g. `torsocks bash > -c "wget ..."`) Yes it would be nice, if torsocks could detect the arch correctly, but I also thought at these complications about subprocesses. Regards, hefee signature.asc Description: This is a digitally signed message part.

[tor-dev] Re: Make torsocks mutli-arch ready

2025-03-12 Thread Jim Newsome via tor-dev
This looks basically ok to me. More below: On 3/10/25 8:50 AM, Hefee via tor-dev wrote: Hey, in Debian we want to enable mutli-arch support for torsocks. To be able to run different binaries of different archs. We already splitted libtorsocks into own package, so you can now install e.g

[tor-dev] Make torsocks mutli-arch ready

2025-03-10 Thread Hefee via tor-dev
ure.asc Description: This is a digitally signed message part. _______________ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Proposal 354: Relaxing Path Restrictions in Arti

2025-03-05 Thread Mike Perry via tor-dev
.torproject.org/tpo/core/torspec/-/issues/307 Comment here is also acceptable. -- Mike Perry ___________ tor-dev mailing list -- tor-dev@lists.torproject.org To unsubscribe send an email to tor-dev-le...@lists.torproject.org

[tor-dev] Re: About the key derivation algorithm used in the Control Port password authentication

2025-03-04 Thread Alexander Hansen Færøy via tor-dev
On 01/03/2025 17.33, techmetx11 via tor-dev wrote: Are there any plans to revamp the algorithm for newer Tor versions? I don't think so. All the focus right now is on getting Arti into a state where it can replace all of Tor's current usage. Arti has just gotten an RPC layer that

[tor-dev] About the key derivation algorithm used in the Control Port password authentication

2025-03-03 Thread techmetx11 via tor-dev
. Theoretically, an attacker can expose this to autheticate into a Tor Control Port without having to know the password. Are there any plans to revamp the algorithm for newer Tor versions? [1]: https://shattered.io/ ___ tor-dev mailing list -- tor-dev

[tor-dev] Metadata Cleaner is looking for a new co-maintainer

2025-01-23 Thread intrigeri via tor-dev
o-maintainer of Metadata Cleaner, please get in touch at mat-...@boum.org (public mailing list). Thanks in advance, and many thanks to Romain Vigier for creating Metadata Cleaner! -- intrigeri, for the Tails Team jvoisin, mat2 developer _______ tor-dev

[tor-dev] New BUG() call and stack-trace seen in the wild on 0.4.8.13 exit relay.

2024-11-18 Thread George Hartley via tor-dev
nds / colleagues place, otherwise I would have likely opened a Gitlab ticket, given I figured out the actual bug behind it, if any. However, as I am unable right now and also not at my usual workplace, I included tor-dev in the recipients. Thanks. -GH publickey - hartle

[tor-dev] [tor-project] Reminder: mailman 3 upgrade imminent (TPA-RFC-71)

2024-10-30 Thread Antoine Beaupré
I will have tried. :)) Phew! a. -- Antoine Beaupré torproject.org system administration ___ tor-project mailing list tor-proj...@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project _________

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-29 Thread stifle_savage042--- via tor-dev
On Tuesday, October 22nd, 2024 at 11:24 PM UTC, Watson Ladd wrote: > > > On Tue, Oct 22, 2024, 4:15 PM wrote: > > On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote: > > > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev > > tor-

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread stifle_savage042--- via tor-dev
On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote: > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev > tor-dev@lists.torproject.org wrote: > > > Hi all, > > > > I want to promote some recent work of mine in the hope that someone here >

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread Watson Ladd
On Tue, Oct 22, 2024, 4:15 PM wrote: > On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote: > > > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev > > tor-dev@lists.torproject.org wrote: > > > > > Hi all, > > > > > >

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread Watson Ladd
On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev wrote: > > Hi all, > > I want to promote some recent work of mine in the hope that someone here will > find it interesting or useful. In my most concise language, it is a > "decentralized, asynchronous ent

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread Holmes Wilson
.@torproject.org> wrote: > stifle_savage042--- via tor-dev: >> Hi all, >> >> I want to promote some recent work of mine in the hope that someone here >> will find it interesting or useful. In my most concise language, it is a >> "decentralized, asynchronous en

Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread Georg Koppen
stifle_savage042--- via tor-dev: Hi all, I want to promote some recent work of mine in the hope that someone here will find it interesting or useful. In my most concise language, it is a "decentralized, asynchronous entropy generator protocol." I've made a somewhat complete demo

[tor-dev] Sharing Circuits Between Onion Servers and Clients

2024-10-22 Thread stifle_savage042--- via tor-dev
GP MESSAGE- gpg.key Description: Binary data _______________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Proposal: Handling Complex DNS Traffic for VPN usage in Tor

2024-10-21 Thread Alexander Færøy
seen using: $ dig blog.cloudflare.com -t TYPE65 If you have `drill` installed with modern HTTPS/SVCB support, you can also query it with a nicer response using: $ drill HTTPS blog.cloudflare.com This should make it easier to test the feature. --- snip --- -- Alexander Færøy ____

Re: [tor-dev] Tor over QUIC

2024-10-11 Thread David Schinazi
amount of padding inside the encryption and get a bunch of other details right. If you do end up writing that spec, I'd be happy to help review it. David On Fri, Oct 11, 2024 at 12:48 PM Q Misell via tor-dev < tor-dev@lists.torproject.org> wrote: > Moin David, > > Thanks for se

Re: [tor-dev] Tor over QUIC

2024-10-10 Thread David Goulet
see a summary here: https://lists.torproject.org/pipermail/tor-dev/2018-March/013026.html Deconstructing the above to see if still holds today could be a good start imo. Cheers! David -- OIA801GlIC38M7YQhAY3ojyedelKPpxaBcjfGrWKhDo= signature.asc Descrip

Re: [tor-dev] Tor over QUIC

2024-10-10 Thread Nick Mathewson
On Fri, Oct 4, 2024 at 3:57 AM Q Misell via tor-dev wrote: [...] > What are people's thoughts on this? Hi, Q! I think migrating to QUIC over time might help a lot, particularly in relay-to-relay communications where we have a large number of circuits to multiplex. ## Design points *

Re: [tor-dev] Tor over QUIC

2024-10-10 Thread George Hartley via tor-dev
t, but that's not for c-tor/arti to do (and ECH needs proper DNS > support over Tor, which could be considered a child item of UDP over Tor, or > something we can already do with DNS over tcp/tls/https, or something > orthogonal where a client could query directly the DNS of an ex

Re: [tor-dev] Tor over QUIC

2024-10-08 Thread trinity pointard
proper DNS support over Tor, which could be considered a child item of UDP over Tor, or something we can already do with DNS over tcp/tls/https, or something orthogonal where a client could query directly the DNS of an exit node with more than A//PTR). On Tue, 8 Oct 2024 at 10:

Re: [tor-dev] Tor over QUIC

2024-10-08 Thread George Hartley via tor-dev
ick thoughts on this. On Friday, October 4th, 2024 at 9:56 AM, Q Misell via tor-dev wrote: > Hi all, > > I know the discussion on how best to support UDP applications over Tor has > dragged on for a long time, so I thought what better to do than to throw > another item t

[tor-dev] Tor over QUIC

2024-10-04 Thread Q Misell via tor-dev
lauca Digital and the Glauca logo are registered trademarks in the UK, under № UK3718474 and № UK3718468, respectively. smime.p7s Description: S/MIME Cryptographic Signature ___________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torpro

[tor-dev] Rewriting to e.as207960.net (was: When RFC 7686 and transparent proxies collide)

2024-09-28 Thread Matt Traudt
Your email client, I presume, is rewriting links to first go through e.as207960.net. I'm curious why that is. Matt On 9/25/24 04:23, Q Misell via tor-dev wrote: Moin, I've posted my thoughts on a potential solution to this in GitLab: https://gitlab.torproject.org/tpo/core/torspe

Re: [tor-dev] When RFC 7686 and transparent proxies collide

2024-09-25 Thread Q Misell via tor-dev
or > > transparent-proxy name resolution is relentlessly moving towards being > > actively painful. I feel that now would be a good time to embrace a > > different, ideally standards-compliant / more-futureproof approach. > > > > -a > > > > [1] Fun

Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-16 Thread Michael Rogers
C527CC.asc Description: OpenPGP public key OpenPGP_signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-12 Thread Roger Dingledine
re is some other state we still share between isolated circuits (in both C-Tor and Arti), for example guards including vanguards. Hope this helps, --Roger ___________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-12 Thread Nick Mathewson
rt, but I don't know if we'll get it built in the earliest versions of our FFI embedding logic. There is a _lot_ of code to write, and a _lot_ of functionality to support -- so please poke us again (maybe on the bugtracker?) if this isn't easily do-able in the first supported FFI emb

Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-12 Thread Michael Rogers
convenient cross-platform way AFAIK, so it probably isn't going to be any portable application's first resort. - Sorry for all the text! But I do hope it's at least somewhat interesting. best wishes, It was very interesting! Thanks for all the ideas. Looks li

[tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)

2024-09-11 Thread Nick Mathewson
#x27;t use: OS-specific restrictions Because somebody will mention it if I don't: you could probably cobble something together using OS specific restrictions, like containers or selinux. Of course, this isn't really something you can ship in a convenient cross-platform way AFAIK, so it prob

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-11 Thread Michael Rogers
d in the Arti RPC protocol to associate a SOCKS request with some existing Client object, or with a preexisting DataStream. ___________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-d

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-10 Thread Nick Mathewson
he `RpcDataStream` internally to create a new `DataStream`, /// and to store that `DataStream` in itself. /// The `RpcDataStream` with Object ID `STREAM-1` /// is now an alias for the newly created `DataStream`. /// Arti proxies the application's SOCKS connection through that `DataStream`. /// ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-10 Thread Jim Newsome
onnection including an RPC object ID, and to reject any as-yet-unspecified isolation mechanisms. [^ObjectId]: An ObjectId is used in the Arti RPC protocol to associate a SOCKS request with some existing Client object, or with a preexisting DataStream. _

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-10 Thread Nick Mathewson
On Tue, Sep 10, 2024 at 9:25 AM Q Misell via tor-dev wrote: > > Is there a reason why this proposal extends the existing username/password > auth, instead of defining a new SOCKS5 authentication type? c.f. > https://datatracker.ietf.org/doc/html/rfc1928#section-3 Indeed there is

Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-10 Thread Q Misell via tor-dev
entations > that do not support non-ASCII username/password values. > > > > ## C Tor migration > > When this proposal is accepted, > we *should* configure C tor to implement it as follows: > > - To reject any SOCKS5 Username starting with `` > unless it is exactly `0`. > > This behavior is sufficient to g

[tor-dev] changes in user-agent spoofing in the Tor Browser 14.0 series

2024-09-09 Thread Morgan
A5EA28FAE.asc Description: OpenPGP public key OpenPGP_signature.asc Description: OpenPGP digital signature ___________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible

2024-09-09 Thread Nick Mathewson
[^ObjectId]: An ObjectId is used in the Arti RPC protocol to associate a SOCKS request with some existing Client object, or with a preexisting DataStream. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-09-02 Thread Alessandro Greco via tor-dev
contribute but trivially don't know how to do it... Snowflake also comes to mind... -- Aleff publickey - alessandro.greco.1@protonmail.com - 0x1D14CC10.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___________________

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-30 Thread boldsuck via tor-dev
On Donnerstag, 29. August 2024 08:40:08 CEST George Hartley via tor-dev wrote: > 1. You MUST have read the manual, at least the entries explaining the > settings in your Tor configuration file. Please take a look at it here: > https://2019.www.torproject.org/docs/tor-manual.html.en

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-30 Thread Q Misell via tor-dev
Digital and the Glauca logo are registered trademarks in the UK, under № UK3718474 and № UK3718468, respectively. On Fri, 30 Aug 2024 at 11:27, George Hartley via tor-dev < tor-dev@lists.torproject.org> wrote: > We want people to be knowledgeable, and these "do it one time an

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-30 Thread George Hartley via tor-dev
t created the > package (Turris routers) doesn't interestd in this anymore. > > For a desktop distros loke Ubuntu you may find a similar tool called Webmin > that can be used for remote administration. Maybe you can create a plugin for > it. > > > 26 авг. 2024 г. 12:56:09

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-28 Thread Sergey Ponomarev
. 12:56:09 Alessandro Greco via tor-dev : > Hello everyone, > > I have been thinking about creating a web app that generates a script to > configure a Tor node based on the settings defined by the user. Let me > explain a bit further. > > This web app could work either en

Re: [tor-dev] terminology explaination: identifier.

2024-08-26 Thread Georg Koppen
behind the "> data"-buttons). E.g. one is http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/bridgedb-distributor.csv where the "indentifier" is "bridgedb-distributor". Georg Cheers, Carlos. _________________

[tor-dev] terminology explaination: identifier.

2024-08-26 Thread eff_03675549
examples) @ *http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/stats.html Cheers, Carlos.___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-26 Thread boldsuck via tor-dev
On Sonntag, 25. August 2024 15:07:48 CEST Alessandro Greco via tor-dev wrote: > I have been thinking about creating a web app that generates a script to > configure a Tor node based on the settings defined by the user. > I'm not sure if something like this already exists, but I thi

[tor-dev] Proposal for a New Web App to Configure Tor Nodes

2024-08-26 Thread Alessandro Greco via tor-dev
escription: OpenPGP digital signature ___________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Cancel

2024-08-22 Thread George Hartley via tor-dev
Cancel what exactly? You can unsubscribe from the list by logging in to the account that you have created. Sincerely, George On Wednesday, August 21st, 2024 at 2:38 PM, tj wrote: > Sent from my iPhone > ___ > tor-dev mailing list

[tor-dev] Cancel

2024-08-21 Thread tj
Sent from my iPhone ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] txtorcon 24.8.0

2024-08-20 Thread meejah
ing the following 4 lines in a shell wherever you have the files downloaded: cat <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-14 Thread Sam
System wrote via Tor Project :Feedback: Please submit the proposal also to tor-dev: tor-dev Info PageIntroducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes https://www.reddit.com/r/TO

[tor-dev] Tor community papers at Usenix Security

2024-07-26 Thread Roger Dingledine
y; Nick Feamster, University of Chicago https://www.usenix.org/conference/usenixsecurity24/presentation/hoang ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Some Gosling Updates!

2024-07-05 Thread Richard Pospesel
Hi Everyone! It's been a minute since the last time I posted to this list about Gosling (December, 2021 what the actual heck: https://lists.torproject.org/pipermail/tor-dev/2021-December/014684.html ). Well, since then I have been quite busy leading the applications team and shi

Re: [tor-dev] Proposal 350: A phased plan to remove TAP onion keys

2024-05-31 Thread Nick Mathewson
And also: If you like, you can see a rendered version of this proposal at https://spec.torproject.org/proposals/350-remove-tap.html . ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Proposal 350: A phased plan to remove TAP onion keys

2024-05-31 Thread Nick Mathewson
sh-dummy-tap-key` consensus parameter, so that relays will no longer include TAP keys in their router descriptors. [proposal 216]: ./216-ntor-handshake.txt [proposal 245]: ./245-tap-out.txt [hsv2-deprecation]: https://support.torproject.org/onionservices/v2-deprecation/ [relays in Arti]: https:/

Re: [tor-dev] Key Blinding Secrets

2024-05-04 Thread Nick Mathewson
ping `s` secret didn't actually achieve anything that couldn't be achieved just as easily by keeping KP_hs_id secret. best wishes, -- Nick ___________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

[tor-dev] Key Blinding Secrets

2024-04-30 Thread Bellebaum, Thomas
) this would be relevant. If you have any insights, please let me know. Also I am new to the TOR-Dev world, so feel free to send me to a different mailing list, should I have chosen the wrone one for this topic :) Thanks in advance, Thomas -- ``` M.Sc. Thomas Bellebaum Applied Privacy

Re: [tor-dev] Proposal for Tor (Relay) Watchdog (Telegram) Bot

2024-04-29 Thread Hiro/Silvia
On 2024-04-24 14:58, Alessandro Greco via tor-dev wrote: > Dear Tor Project Developers, > > I hope this email finds you well. I am writing to share with you a project > [1] I have been working on called Tor Watchdog Bot [2], and I believe it may > be of interest to you. &g

[tor-dev] Proposal for Tor (Relay) Watchdog (Telegram) Bot

2024-04-25 Thread Alessandro Greco via tor-dev
ject (torproject.org) - Signal (signal.org) publickey - alessandro.greco.1@protonmail.com - 0x1D14CC10.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org h

[tor-dev] Proposal #349: Command state validation (for dropmark attacks)

2024-03-07 Thread Mike Perry
epend upon full parsing and protocol context, as opposed to just relay message command. This work is part of Sponsor 112; arti-client support is due by EOY 2024. C-Tor will not implement this proposal. -- Mike Perry _______ tor-dev mailing list to

Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication

2024-02-25 Thread David Fifield
s://gitlab.torproject.org/tpo/core/torspec/-/blob/33308845cec54bfc0096b8ea0339a8ff183aa1b1/tor-spec.txt#L622 The new mdbook style makes it a little harder to refer to a specific section. Since this is the only reference to tor-spec we have, I guess what we'll do is change the bib entry to r

Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication

2024-02-15 Thread Roger Dingledine
lls. (For extra fun, I don't think anything promises that "2.3.1" will still be the number of this section in the future.) --Roger ___________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] UDP Application Support in Tor

2024-02-13 Thread Roger Dingledine
ttps://www.caida.org/catalog/papers/2005_fingerprinting/KohnoBroidoClaffy05-devicefingerprinting.pdf (I bet there are many more papers published after that one, but our design means we have mercifully not needed to keep up with the remote device fingerprint literature.) --Roger ________

Re: [tor-dev] UDP Application Support in Tor

2024-02-12 Thread Micah Elizabeth Scott
On 2/8/24 05:02, Vilgot Bergquist via tor-dev wrote: Hi, I looked at the suggested solutions and I think there is another approach, which is much easier. I C it's pretty easy to encapsulate UDP segments inside TCP segments. Hence there is no need to re-organize the connection logic o

Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication

2024-02-09 Thread David Fifield
2B280B23E1107BB62ABFC40DDCC8824814F80A72 + > 1zOHpg+FxqQfi/6jDLtCpHHqBTH8gjYmCKXkus1D5Ko. > [warn] Problem bootstrapping. Stuck at 14% (handshake): Handshaking with a > relay. (Unexpected identity in router certificate; IDENTITY; count 1; > recommendation warn; host 111

[tor-dev] Announcing Onionspray 1.6.0 with a SECURITY fix for Onion Services rewriting proxies

2024-02-09 Thread rhatto
onspray/-/issues Finally, I'd like to thank Alec Muffett for his important work with EOTK and for promoting Onion Services all these years :) Thanks! -- Silvio Rhatto pronouns he/him signature.asc Description: PGP signature ___________________ tor-dev mailing

Re: [tor-dev] UDP Application Support in Tor

2024-02-08 Thread Vilgot Bergquist via tor-dev
uards, when receiving an UDP packet, to just add a TCP header and then it goes through the normal process. The exit nodes than removed the TCP header and pass the UDP segment on. Regards Vilgot tor-dev-requ...@lists.torproject.org schrieb am Donnerstag, 25. Januar 2024 um 18:49: > >

[tor-dev] docker bridge suddenly fails startup with "Directory /var/lib/tor cannot be read: Permission denied"

2024-02-01 Thread gentle . luck4713
Hi tor-dev@, I have been running a bridge following the instructions at <https://community.torproject.org/relay/setup/bridge/docker/> on a Debian 12.4 system but when I just tried to make sure everything is up to date I got the following error message from docker-compose logs: obfs4-br

[tor-dev] New Proposal - UDP Application Support in Tor

2024-01-25 Thread Micah Elizabeth Scott
Hello tor-dev folks! Late last year I started taking a close look at what it would take to support applications on Tor which rely on UDP networking. This was originally to be based on Nick's proposal, 339-udp-over-tor. The scope of this work so far has been specifically focused on end

Re: [tor-dev] Timers in Arti?

2024-01-15 Thread Michael Rogers
so Tor would either need to signal to the controller that an alarm was needed, or the controller could just assume this whenever hidden services were published, and wake the device every fifteen minutes without explicitly communicating with Tor about alarms. Cheers, Michael

Re: [tor-dev] When RFC 7686 and transparent proxies collide

2024-01-15 Thread kaizushi
d of last resort. Are we already there? Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc ___________________ tor-dev mailing list t

Re: [tor-dev] Timers in Arti?

2024-01-13 Thread Holmes Wilson
a Java API, so > Tor would either need to signal to the controller that an alarm was > needed, or the controller could just assume this whenever hidden > services were published, and wake the device every fifteen minutes > without explicitly communicating with Tor about alarms. > > Cheers, > Michael >> _

Re: [tor-dev] Timers in Arti?

2024-01-10 Thread Michael Rogers
arm was needed, or the controller could just assume this whenever hidden services were published, and wake the device every fifteen minutes without explicitly communicating with Tor about alarms. Cheers, Michael ___________________ tor-dev mailing

Re: [tor-dev] Timers in Arti?

2024-01-10 Thread Michael Rogers
on about what's likely to happen if the timers are arbitrarily delayed? Thanks, Michael ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev ___

Re: [tor-dev] Timers in Arti?

2024-01-09 Thread Nick Mathewson
iance between scheduled wakeup and actual wakeup can be bounded, or if there's any way to mark a timer as high-priority vs low-priority or something. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Timers in Arti?

2024-01-09 Thread Micah Elizabeth Scott
or Arti. Could anyone give me an overview of how these local timers are handled in Arti, or any information about what's likely to happen if the timers are arbitrarily delayed? Thanks, Michael ___ tor-dev mailing list tor-d

  1   2   3   4   5   6   7   8   9   10   >