Re: [tor-dev] Proposal 338: Use an 8-byte handshake in NETINFO cells

2022-03-20 Thread Jim Newsome
On 3/14/22 11:44, Nick Mathewson wrote: > Currently Tor relays use a 4-byte timestamp (in seconds since the Unix > epoch) in their NETINFO cells. Notoriously, such a timestamp will > overflow on 19 January 2038. > > Let's get ahead of the problem and squash this issue now, by expanding > the t

Re: [tor-dev] Interoperation with libp2p

2022-03-20 Thread Jorropo
Hey, I work for protocol labs (however not in the libp2p team) and I am a go-libp2p contributor. > Thinking out loud: NAT traversal can use a rendezvous node, hidden services are an intriguing option Yes there have been people who already thought that however, tor doesn't need to do anything. I'

Re: [tor-dev] Proposal 338: Use an 8-byte handshake in NETINFO cells

2022-03-20 Thread Jim Newsome
On 3/14/22 14:40, Nick Mathewson wrote: On Mon, Mar 14, 2022 at 3:18 PM Jim Newsome > wrote: On 3/14/22 11:44, Nick Mathewson wrote:  > Currently Tor relays use a 4-byte timestamp (in seconds since the Unix  > epoch) in their NETINFO ce

Re: [tor-dev] Client identification for authenticated onions

2022-03-20 Thread Shannon via tor-dev
unsubscribe Regards, Shannon Sent with ProtonMail Secure Email. ‐‐‐ Original Message ‐‐‐ On Tuesday, December 7th, 2021 at 9:21 AM, wrote: > On 2021-08-23 20:56, cho8jeiv4aus at paperboats.net wrote: > > > Hi there. I had an idea recently for an onion service to improve the UX > > > >

[tor-dev] compiling torsocks

2022-03-20 Thread lejeczek via tor-dev
Hi guys A complete non-dev/programmer here so please go easy on me. I'm trying to compile torsocks with 'mock', while 'tor' compiles okey for 'torsock' I fail with: ... configure.ac:20: comes from Automake 1.16.1.  You should recreate configure.ac:20: aclocal.m4 with aclocal and run automake

Re: [tor-dev] Relay "Ping" Functionality

2022-03-20 Thread Alexander Mages
I appreciate all the suggestions! Thanks, Alex On Sat, Feb 12, 2022 at 3:59 AM wrote: > Hey, > > On 21.01.22 14:57, Alexander Mages wrote: > > Right now we're exploring latency-based attacks but are having trouble > > achieving a particular goal: a way to “ping” an arbitrary node in a > > clie

Re: [tor-dev] Gosling onion-to-onion specifications

2022-03-20 Thread Richard Pospesel
Hi everyone! tldr: Is there any reason why one should not use the same ed25519 public key to authenticate with multiple, unrelated ClientAuthV3 onion services? Lots of progress has been made on building the foundation for Gosling over the past few months (rust/C FFI, cryptographic primi

Re: [tor-dev] The case for Tor-over-QUIC

2022-03-20 Thread Ali Clark
Sections 3 and 6 of the Quux paper have some relevant discussion [1] > Unfortunately, it appears that the Quux QUIC paper studied QUIC at the > wrong position - between relays, and the QuTor implementation is > unclear. This means that it may still be an open question as to if > QUIC's congestion

[tor-dev] [dappy] Willing to chat with tor devs, about name system issues/solutions

2022-03-20 Thread Raphaël Fabre
Hello I'm Raphaël (fr) I just joined the tor dev mailing list. I would like to chat with tor developers, particularly if they have worked, or are interested in the issues regarding a name system for tor. I'm the lead developer of dappy https://dappy.tech , we'll launch in 2022 and I do think w

[tor-dev] Fine Tunneling For Tor Network | Tor Browser

2022-03-20 Thread Alessandro Greco via tor-dev
Dear Tor-Dev, My name is Alessandro Greco and I am an Italian computer science student, I am finishing my studies and therefore I am working with my thesis and, as a topic, my supervisor and I have chosen the Tor network. The work done focuses entirely on the Tor Browser torrc configuration fil