Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-03-23 Thread Yawning Angel
Hello all, Just a quick heads up for where this is going: * 'GET_ONIONS' was changed to be 'GETINFO' subcommands for consistency. * Code is in 'needs_review', for the 2nd round. As a proof of concept I wrote: https://github.com/Yawning/onionwrap It's a dumb quick and dirty hack that works like

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-03-11 Thread Yawning Angel
On Wed, 11 Mar 2015 02:35:10 + Yawning Angel wrote: > The code: https://github.com/Yawning/tor/compare/feature6411 > The spec: https://github.com/Yawning/torspec/compare/feature6411 Minor updates to both over the course of yesterday, thanks to all that gave useful feedback and corrections.

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-03-10 Thread Yawning Angel
On Wed, 25 Feb 2015 16:14:47 + Yawning Angel wrote: > Anyway now that master is 0.2.7.x, I'm looking to revisit this in the > form of: [snip] I talked to a few people at Valencia about this, including discussing the outstanding issues and made the following changes since the last discussion:

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-28 Thread David Stainton
> > FWIW this is already how Debian (and presumably other distros') tor packages > work: tor runs as a dedicated user. Already it is possible to grant other > users > access to the control port (from which they can already create and remove > hidden services). The reason why HS applications that c

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-28 Thread Leif Ryge
On Sat, Feb 28, 2015 at 02:40:29PM +0100, carlo von lynX wrote: > Thanks "Angel", appreciate your effort. > > On Thu, Feb 26, 2015 at 09:29:05AM +0100, Andreas Krey wrote: > > On Wed, 25 Feb 2015 13:51:59 +, carlo von lynX wrote: > > ... > > > What is useful here is if I can use existing $app

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-28 Thread carlo von lynX
Thanks "Angel", appreciate your effort. On Thu, Feb 26, 2015 at 09:29:05AM +0100, Andreas Krey wrote: > On Wed, 25 Feb 2015 13:51:59 +, carlo von lynX wrote: > ... > > What is useful here is if I can use existing $app with existing > > tor router and just have a shell script drop the glue inst

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-26 Thread Andreas Krey
On Wed, 25 Feb 2015 13:51:59 +, carlo von lynX wrote: ... > What is useful here is if I can use existing $app with existing > tor router and just have a shell script drop the glue instructions > into the tor unix socket. One way to do that would be to tie the hidden service to the existence of

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-25 Thread Yawning Angel
Hello, Not sure about the renaming thing. I'm open to doing so, but a lot of the user facing stuff (the torrc configuration variables etc) use the HS terminology, so I'm not sure if being inconsistent is good. On Wed, 25 Feb 2015 13:51:59 +0100 carlo von lynX wrote: > On Wed, Feb 25, 2015 at 07

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-25 Thread carlo von lynX
On Wed, Feb 25, 2015 at 07:41:01AM +0100, Andreas Krey wrote: > The AF_TOR listener would go away with closing the listener socket > as well (and thus is bound to the lifetime of the process); so binding > a hidden service to the control connection is the obvious analogy. Yes, but as it stands AF_

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-24 Thread Andreas Krey
On Wed, 25 Feb 2015 05:06:37 +, carlo von lynX wrote: > the advantages of that aren't obvious to me. why would i need to > make every networking app hold the hand of its router to let it > know it's still needed? You answer your question yourself: > tor is on its way to becoming an AF_TO

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-24 Thread carlo von lynX
> > Concerning the "ephemerality" of it, I can imagine services > > being configured en passant by a cat >> socket from a shell > > script or so, [..] > On Tue, Feb 24, 2015 at 09:05:38PM +0400, meejah wrote: > You still need to authenticate. I do like the simplicity, but it will be > a little mo

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-24 Thread meejah
carlo von lynX writes: I like your suggestion, and while we're bikeshedding ;) what if we use the recently-proposed naming system and call it "ADD_ONION"? > Concerning the "ephemerality" of it, I can imagine services > being configured en passant by a cat >> socket from a shell > script or so,

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread Dave Huseby
On Fri, Feb 13, 2015, at 04:45 PM, Yawning Angel wrote: > Yes, this means that if you run "kittensomgmewmew.onion" and are scared > of the NSA's persistent attempts to extract your hidden service key, > via ultrasonic laser beamed from their satellites, ...or the backdoor in the firmware on your

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread carlo von lynX
Let me chime in on saying that this looks to me like a great development. I even imagine that in a couple of years most end-to-end encrypted services on the Internet may be using this interface, so for the sake of accessibility for future devs, I would suggest something totally superficial: On Sa

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread Yawning Angel
On Tue, 17 Feb 2015 02:22:54 +0400 meejah wrote: > From my perspective, the entire point of this feature is to allow > applications to use "the system Tor" (or, at least "some > already-running tor") to put their hidden services on. The design the way it is with more isolation than usual also al

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Fabio Pietrosanti (naif) - lists
On 2/16/15 11:22 PM, meejah wrote: > > I guess to put another way: I can't see a use-case to keep the hidden- > service around if the application that added it went away. +1 from globaleaks perspective -naif ___ tor-dev mailing list tor-dev@lists.torpr

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread meejah
>From my perspective, the entire point of this feature is to allow applications to use "the system Tor" (or, at least "some already-running tor") to put their hidden services on. (Or, looking at it another way, if you don't want to share a tor instance with other applications, you can do that eas

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread David Stainton
> As an app developer this strikes me as the right approach. But having > said that, I wouldn't actually need this feature because Briar already > uses __OwningControllerProcess to shut down Tor if the control > connection is closed. I imagine the same would apply to any app that > manages its own

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
On Mon, 16 Feb 2015 19:35:58 + Michael Rogers wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > (CCing the hidden-services list.) (Wonder if my reply will bounce.) > On 16/02/15 16:11, Leif Ryge wrote: > >> If someone has a suggestion for an alternative interface that > >> can

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 (CCing the hidden-services list.) On 16/02/15 16:11, Leif Ryge wrote: >> If someone has a suggestion for an alternative interface that >> can handle applications crashing (possibly before they persist >> the list of HSes they need to clean up), appl

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
On Mon, 16 Feb 2015 16:11:55 + Leif Ryge wrote: [snippity] > However, it seems like in the case of applications which are not > HS-specific this will necessitate keeping another process running > just to keep the HS alive. I'd rather see two modes: one as you > describe, and another in which t

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Leif Ryge
On Mon, Feb 16, 2015 at 03:47:07PM +, Yawning Angel wrote: > On Mon, 16 Feb 2015 10:17:51 -0500 > David Goulet wrote: > [snip] > > A hidden service is created using the key and list of > > port/targets, that will persist till configuration reload or the > > termination of the tor process.

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread Yawning Angel
On Mon, 16 Feb 2015 10:17:51 -0500 David Goulet wrote: [snip] > A hidden service is created using the key and list of > port/targets, that will persist till configuration reload or the > termination of the tor process. > > Now, an HS bound to a control connection might be a good idea, I'm n

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-16 Thread David Goulet
On 14 Feb (00:45:24), Yawning Angel wrote: Hey Yawning, great stuff btw! I have a questions below regarding meejah's comment and https://trac.torproject.org/projects/tor/ticket/6411#comment:32 "Ephemeral hidden services are tied to the control port connection that created them. This means, that w

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-14 Thread Yawning Angel
On Sat, 14 Feb 2015 13:46:04 -0800 Damian Johnson wrote: > One gotcha to think about is that ADD_EPH_HS is using a variable > number of positional arguments. This will limit your ability to expand > this command in the future with new arguments. Also, I'd suggest > renaming addrPort to addrTarget

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-14 Thread Damian Johnson
Hi Yawning, nice addition! As requested moving from irc to here. One gotcha to think about is that ADD_EPH_HS is using a variable number of positional arguments. This will limit your ability to expand this command in the future with new arguments. Also, I'd suggest renaming addrPort to addrTarget

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-14 Thread meejah
Yawning Angel writes: Cool! I added a quick try at using this in txtorcon, with an example; see the following branch: https://github.com/meejah/txtorcon/tree/yawning-feature-6411 (Most of that example code would actually end up in the endpoint.listen() code and be hidden from most users of the

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-14 Thread Fabio Pietrosanti (naif) - lists
On 2/14/15 1:45 AM, Yawning Angel wrote: > Hi, > > The Warning: DO NOT USE MY BRANCH YET, IT HAS HAD MINIMAL TESTING AND > REVIEW. IT IS NOT DONE. IT WILL BROADCAST YOUR SECRETS > TO THE NSA'S ORBITAL SPACE STATION. > > Trac Ticket: https://trac.torproject.org/projects/

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-13 Thread Nathan Freitas
On Fri, Feb 13, 2015, at 07:45 PM, Yawning Angel wrote: > Yes, this means that if you run "kittensomgmewmew.onion" and are scared > of the NSA's persistent attempts to extract your hidden service key, > via ultrasonic laser beamed from their satellites, you could run your > tor instance entirely in

[tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-13 Thread Yawning Angel
Hi, The Warning: DO NOT USE MY BRANCH YET, IT HAS HAD MINIMAL TESTING AND REVIEW. IT IS NOT DONE. IT WILL BROADCAST YOUR SECRETS TO THE NSA'S ORBITAL SPACE STATION. Trac Ticket: https://trac.torproject.org/projects/tor/ticket/6411 Branch: https://github.com/Yawning/tor