Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-08 Thread Tim Wilson-Brown - teor
> On 8 Nov 2015, at 05:39, s7r wrote: > > For all versions of the proposal, regardless if we use the conflict > code or not, I think we should require authorities to participate for > at least for 3 rounds of the reveal phase, otherwise not participate > in the shared randomness calculation for

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-07 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, I am fine with that.There is no sense going only half way here. So, without the conflict code, there is no sense keeping a SR key. The only source of authentication will be the normal signature of the vote. We should keep the older version of t

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-06 Thread David Goulet
On 06 Nov (15:35:50), George Kadianakis wrote: > George Kadianakis writes: > > > s7r writes: > > > >> Hello, > >> > >> > >> > >> 4.1.1. Computing commitments and reveals [COMMITREVEAL] > >> "The value REVEAL is computed as follows: > >> > >> REVEAL = base64-encode( TIMESTAMP || RN )" > >>

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-06 Thread George Kadianakis
George Kadianakis writes: > s7r writes: > >> Hello, >> >> >> >> 4.1.1. Computing commitments and reveals [COMMITREVEAL] >> "The value REVEAL is computed as follows: >> >> REVEAL = base64-encode( TIMESTAMP || RN )" >> >> * Maybe it is useful to also sign the REVEAL value with the SR key fo

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-06 Thread George Kadianakis
s7r writes: > Hello, > > Epic work. I agree that the code enforcing commit majority was not > making a difference in the partition attack. I also agree that the > partition attack is (almost) useless, expensive and very noisy. An > attacker can get the same result if, instead of a partition attac

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 asn, Is it possible to add a field called 'NOTARY' in the COMMIT and REVEAL values where we include the SR pubkey + certificates and everything we need so that we can validate each COMMIT / REVEAL value and tie it to the identity of a directory auth

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-04 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Epic work. I agree that the code enforcing commit majority was not making a difference in the partition attack. I also agree that the partition attack is (almost) useless, expensive and very noisy. An attacker can get the same result if, inst

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-11-01 Thread Tim Wilson-Brown - teor
> On 31 Oct 2015, at 01:07, George Kadianakis wrote: > > Jesse V writes: > >> David, >> >> I'm in the midst of reworking my OnioNS design around prop250 (and the >> security >> analysis therein) and as far as I can tell these changes make sense. I like >> the >> 00:00 -> 24:00 change as it'

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-30 Thread George Kadianakis
Jesse V writes: > David, > > I'm in the midst of reworking my OnioNS design around prop250 (and the > security > analysis therein) and as far as I can tell these changes make sense. I like > the > 00:00 -> 24:00 change as it's more intuitive as you said. I was at first very > concerned that you

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-29 Thread George Kadianakis
teor writes: >> On 29 Oct 2015, at 05:26, David Goulet wrote: >> >> Finally, we would like your opinion also on if we should keep the >> conflict mechanism or not?. Since those partition attacks are basically >> dumb, do not achive much result for an attacker and it's at a high cost >> of compr

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-28 Thread teor
> On 29 Oct 2015, at 05:26, David Goulet wrote: > > Finally, we would like your opinion also on if we should keep the > conflict mechanism or not?. Since those partition attacks are basically > dumb, do not achive much result for an attacker and it's at a high cost > of comprimising a directory

Re: [tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-28 Thread Jesse V
David, I'm in the midst of reworking my OnioNS design around prop250 (and the security analysis therein) and as far as I can tell these changes make sense. I like the 00:00 -> 24:00 change as it's more intuitive as you said. I was at first very concerned that you removed the majority requiremen

[tor-dev] Update of prop#250: Random Number Generation During Tor Voting

2015-10-28 Thread David Goulet
Hello Tor-Dev! We've almost completed the implementation [1] for prop#250 so we've reviewed part of the proposal to correct part of it to reflect reality (because you know a proposal is just wishful thinking until you implement it :). Attached is the new version that we've been working on. We wou