Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-26 Thread Jeremy Rand
teor: > >> On 12 Oct 2016, at 09:29, Jesse V wrote: >> >> On 10/11/2016 12:53 AM, Jeremy Rand wrote: >>> It's also worth noting that it's been hard enough to get IETF to accept >>> .bit (that effort stalled) -- adding a bunch of other TLD's would >>> probably annoy IETF significantly (and destroy

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-18 Thread grarpamp
On Wed, Jan 18, 2017 at 3:31 AM, George Kadianakis wrote: > What do you mean by "develop an IPv6 layer"? prop224 destroys the one to one bidirectional binary mapping that makes onioncat possible, and fails to provide a replacement for it :-( Any "human naming" layer (whether under prop224 or curr

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-18 Thread teor
> On 12 Oct 2016, at 09:29, Jesse V wrote: > > On 10/11/2016 12:53 AM, Jeremy Rand wrote: >> It's also worth noting that it's been hard enough to get IETF to accept >> .bit (that effort stalled) -- adding a bunch of other TLD's would >> probably annoy IETF significantly (and destroy whatever goo

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-18 Thread George Kadianakis
grarpamp writes: > Always wondered how naming is relevant, > for example, IPv6 with OnionCat as a deterministic > form of naming. So now we propose a 'naming' layer. > Which should not also support IPv6 addressing? > Is not IPv6, subsequent to the 80bit scheme, > merely a name on top of onions? i

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2017-01-17 Thread grarpamp
Always wondered how naming is relevant, for example, IPv6 with OnionCat as a deterministic form of naming. So now we propose a 'naming' layer. Which should not also support IPv6 addressing? Is not IPv6, subsequent to the 80bit scheme, merely a name on top of onions? ie: If we develop a 'naming' lay

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-11 Thread Jesse V
On 10/11/2016 12:53 AM, Jeremy Rand wrote: > It's also worth noting that it's been hard enough to get IETF to accept > .bit (that effort stalled) -- adding a bunch of other TLD's would > probably annoy IETF significantly (and destroy whatever good will exists > at IETF right now), and I fully under

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-10 Thread Jeremy Rand
Jesse V: > On 10/08/2016 08:50 AM, 61wxg...@vfemail.net wrote: >> How about specifying whether the Namecoin domain should point to .onion >> or clearnet in the domain? We can require that TLDs for such service >> must end in either: >> >> o o: The name points to a .onion name. >> >> o i: The name

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-10 Thread Jeremy Rand
i9nvr...@tutanota.com: > Hi, > > Why run a separate process instead of using unix socket or TCP socket? > >> Since a Namecoin domain can point to IP addresses and ICANN-based DNS >> names in addition to onion service names, and a Namecoin domain owner >> might wish to switch between these configu

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-10 Thread Tom Ritter
The minorest of comments. On 7 October 2016 at 15:06, George Kadianakis wrote: >For example here is a snippet from a torrc file: >OnionNamePlugin 0 .hosts /usr/local/bin/local-hosts-file >OnionNamePlugin 1 .zkey /usr/local/bin/gns-tor-wrapper >OnionNamePlugi

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-08 Thread Hugo Maxwell Connery
Hi, I think that this work is extremely important, and I applaud the authors and contributors for their work. It seems that it will also be complicated, semantically. What lies where, and which thing does what? The example recently about what is sent in the Host header is a good example of this

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-08 Thread Jesse V
On 10/08/2016 08:50 AM, 61wxg...@vfemail.net wrote: > How about specifying whether the Namecoin domain should point to .onion > or clearnet in the domain? We can require that TLDs for such service > must end in either: > > o o: The name points to a .onion name. > > o i: The name points to an IP

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-08 Thread 61wxgp60
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Why run a separate process instead of using unix socket or TCP socket? Since a Namecoin domain can point to IP addresses and ICANN-based DNS names in addition to onion service names, and a Namecoin domain owner might wish to switch between th

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-08 Thread i9nvrppj
Hi, Why run a separate process instead of using unix socket or TCP socket? > Since a Namecoin domain can point to IP addresses and ICANN-based DNS > names in addition to onion service names, and a Namecoin domain owner > might wish to switch between these configurations without causing > downtime

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread Jeremy Rand
David Fifield: > So here, the browser thinks it is connecting to debian.zkey (the URL bar > says "debian.zkey"). But Tor is really connecting to sejnfjrq6szgca7v.onion > in the background. What name does the browser put in its Host header? It > can't be the onion name, because there's no feedback f

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread Jeremy Rand
Hi George, Here are my comments: 2.3.1 > If there are multiple name plugins that correspond to the requested > address, Tor queries all relevant plugins sorted by their priority > value, until one of them returns a successful result. It's unclear whether the sort operation referred to here is a

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread meejah
George Kadianakis writes: I have skimmed over this proposal, and it all sounds plausible. This: >In the beginning, name plugins should be third-party applications that can >be installed by interested users manually or through package managers. > Users >will also have to add the appr

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread David Fifield
On Fri, Oct 07, 2016 at 04:06:51PM -0400, George Kadianakis wrote: >In particular, onion addresses are currently composed of 16 random base32 >characters, and they look like this: > > 3g2upl4pq6kufc4m.onion > vwakviie2ienjx7t.onion >

Re: [tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread Arthur D. Edelstein
Hi George, A nice proposal! A question that occurs to me is how the name plugin will interact with the network. Presumably it will make requests over Tor, either periodically to update its local database, or just-in-time, whenever a RESOLVE request is made. If name resolution requires a just-in-t

[tor-dev] Proposal 274: A Name System API for Tor Onion Services

2016-10-07 Thread George Kadianakis
Hello list, we've been busy discussing secure name systems for the past few months, and how we could integrate them with Tor. We had a few people ask us for precise interfaces, so here is an attempt for a modular name system API. It's largely based on the PT API, which has been pretty successful.