Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-27 Thread George Kadianakis
Robert Ransom writes: > On 2012-01-17, Nick Mathewson wrote: >> On Sun, Nov 6, 2011 at 9:12 PM, George Kadianakis >> wrote: > > > >> Marking this proposal needs-revision. Not sure what the actual >> solution is though. One option might be to look for a way to signal >> (undetectably) to the c

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-18 Thread Robert Ransom
On 2012-01-18, Nick Mathewson wrote: > On Tue, Jan 17, 2012 at 1:28 PM, Robert Ransom > wrote: > >> With that hack on top of the v3 protocol, any client able to detect >> that a bridge is not being MITMed can impersonate the bridge through >> the TLS handshake, until after the (honest, victim) cl

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-18 Thread Nick Mathewson
On Tue, Jan 17, 2012 at 1:28 PM, Robert Ransom wrote: > With that hack on top of the v3 protocol, any client able to detect > that a bridge is not being MITMed can impersonate the bridge through > the TLS handshake, until after the (honest, victim) client speaks the > Tor protocol at the fake bri

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-18 Thread Ian Goldberg
On Wed, Jan 18, 2012 at 07:07:08AM +, Robert Ransom wrote: > On 2012-01-17, Ian Goldberg wrote: > > On Tue, Jan 17, 2012 at 08:43:00PM +0200, George Kadianakis wrote: > >> [0]: Did the Telex people clean up the patch, generalize it, and post > >> it in openssl-dev? Having configurable {Server,

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-17 Thread Robert Ransom
On 2012-01-17, Ian Goldberg wrote: > On Tue, Jan 17, 2012 at 08:43:00PM +0200, George Kadianakis wrote: >> [0]: Did the Telex people clean up the patch, generalize it, and post >> it in openssl-dev? Having configurable {Server,Client}Hello.Random in >> a future version of OpenSSL would be neat. >

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-17 Thread Ian Goldberg
On Tue, Jan 17, 2012 at 08:43:00PM +0200, George Kadianakis wrote: > [0]: Did the Telex people clean up the patch, generalize it, and post > it in openssl-dev? Having configurable {Server,Client}Hello.Random in > a future version of OpenSSL would be neat. At USENIX Security, Adam opined that opens

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-17 Thread George Kadianakis
Nick Mathewson writes: > On Sun, Nov 6, 2011 at 9:12 PM, George Kadianakis wrote: > >> 3.2. AUTHORIZE cell format >> >>   In shared-secret-based authorization, the MethodFields field of the >>   AUTHORIZE cell becomes: >> >>       'shared_secret'               [10 octets] >> >>   where: >> >>  

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-17 Thread Robert Ransom
On 2012-01-17, Nick Mathewson wrote: > On Sun, Nov 6, 2011 at 9:12 PM, George Kadianakis > wrote: > >> 3.2. AUTHORIZE cell format >> >> In shared-secret-based authorization, the MethodFields field of the >> AUTHORIZE cell becomes: >> >> 'shared_secret' [10 octets] >> >>

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2012-01-17 Thread Nick Mathewson
On Sun, Nov 6, 2011 at 9:12 PM, George Kadianakis wrote: > 3.2. AUTHORIZE cell format > >   In shared-secret-based authorization, the MethodFields field of the >   AUTHORIZE cell becomes: > >       'shared_secret'               [10 octets] > >   where: > >   'shared_secret', is the shared secret

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2011-11-06 Thread George Kadianakis
Let's try again this proposal with a more Keep It Simple, Stupid! approach. After deciding that MITM is not in our threat model at the moment, this new proposal 190 doesn't even try to protect against an MITM adversary! It's slicker, faster and maybe even better. Inlining: Filename: 190-shared-se

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2011-11-04 Thread Robert Ransom
On 2011-11-04, Robert Ransom wrote: > On 2011-11-04, George Kadianakis wrote: >>To avoid problems associated with the human condition, schemes >>based on public key cryptography and certificates can be used. A >>public and well tested protocol that can be used as the basis of a >>

Re: [tor-dev] Proposal 190: Password-based Bridge Client Authorization

2011-11-04 Thread Robert Ransom
On 2011-11-04, George Kadianakis wrote: > > Filename: 190-password-bridge-authorization.txt > Title: Password-based Bridge Client Authorization > Author: George Kadianakis > Created: 04 Nov 2011 > Status: Open > > 1. Overview > >Proposals 187 and 189 introduced the AUTHORIZE and AUTHORIZED cel

[tor-dev] Proposal 190: Password-based Bridge Client Authorization

2011-11-04 Thread George Kadianakis
Filename: 190-password-bridge-authorization.txt Title: Password-based Bridge Client Authorization Author: George Kadianakis Created: 04 Nov 2011 Status: Open 1. Overview Proposals 187 and 189 introduced the AUTHORIZE and AUTHORIZED cells. Their purpose is to make bridge relays scanning res