Re: [tor-talk] Tor and P2P

2012-09-26 Thread Mike Perry
Thus spake adrelanos (adrela...@riseup.net): > grarpamp: > > Given that these services are surely coming in force... and from > > directions that see these networks more as a raw transport than > > say, primarily for the purposes outlined on their respective web > > pages... it seems the usual ech

Re: [tor-talk] Tor and P2P

2012-09-26 Thread grarpamp
>> My question is, how would it scale and what would be the implications >> of such a system (every user would be a hidden service and would be >> constantly connected to other hidden services it wants to interact >> with)? > thrash the HS > directory system excessively, and probably overload the

Re: [tor-talk] Tor and P2P

2012-09-26 Thread adrelanos
grarpamp: > Given that these services are surely coming in force... and from > directions that see these networks more as a raw transport than > say, primarily for the purposes outlined on their respective web > pages... it seems the usual echo of "we're a nice project, don't > do that, too much lo

Re: [tor-talk] Tor and P2P

2012-09-26 Thread grarpamp
> While we don't need a very complex p2p design (in short, we are mostly > just talking about simple HTTP servers running on each device, behind > a hidden service .onion), I am concerned in the long run about > scalability and reliability of this. Is, or can Tor be, useful or optimal? On which pl

Re: [tor-talk] Tor and P2P

2012-09-26 Thread grarpamp
Allow me to combine some quotes from this recent thread alone... > I've had an idea for a while for a killer service for... > I'd be very much interested to see it in reality. I guess the > delays will be more then acceptable. > it would be cool to have a more general protocol for P2P use > thro

Re: [tor-talk] How to pin the SSL certificate for torproject.org?

2012-09-26 Thread adrelanos
adrelanos: > A malicious certificate for torproject.org has been given out at least > twice by broken certificate authorities. (Comodo, DigiNotar, who is next...) > > To prevent that in future, I'd like to pin the SSL certificate's > fingerprint. How can that be done? Running an own local CA or is

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread grarpamp
> When one phone connects to another, it "knows" that the device it's > connecting to is running the hidden service that it is trying to send > a message to. However, the other phone, (the one running the hidden > service), has no idea who is connecting to it. You can use ping pong handshakes. Or

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread Nathan Freitas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 09/26/2012 08:53 PM, Ted Smith wrote: > Further, SMS is basically real-time. An SMS app that had > hidden-service type delays (which would be especially bad when > roaming between network connections, causing you to rebuild all of > your circuits) w

Re: [tor-talk] Tor and P2P

2012-09-26 Thread Mike Perry
Thus spake Nathan Freitas (nat...@freitas.net): > On 09/26/2012 10:08 AM, meh. wrote: > > > > After implementing the torchat protocol and seeing how bad it is, > > but how nice the idea is, I started thinking it would be cool to > > have a more general protocol for P2P use through hidden services

Re: [tor-talk] Tor and P2P

2012-09-26 Thread Jérémy Bobbio
On Wed, Sep 26, 2012 at 02:08:06AM -0400, Robert Ransom wrote: > On 9/26/12, meh. wrote: > > > After implementing the torchat protocol and seeing how bad it is, but > > how nice the idea is, I started thinking it would be cool to have a > > more general protocol for P2P use through hidden service

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread Andreas Krey
On Wed, 26 Sep 2012 19:50:56 +, meh. wrote: > On Wed, Sep 26, 2012 at 07:17:32PM +0200, Bernd wrote: ... > > No, these few string replaces do not waste any time or resources, this > > claim is totally ridiculous. > > They do, you have to go over the whole packet Yes, over all typically 100 by

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread meh.
On Wed, Sep 26, 2012 at 07:17:32PM +0200, Bernd wrote: > 2012/9/26 meh. : > > > It's not pragmatist at all, it wastes time and resources doing > > replaces when it could have just been really binary and prepend the > > length of the packet, which is the sane way to do something like that > > inste

Re: [tor-talk] Tor and P2P

2012-09-26 Thread adrelanos
Nathan Freitas: > On 09/26/2012 10:08 AM, meh. wrote: > >> After implementing the torchat protocol and seeing how bad it is, >> but how nice the idea is, I started thinking it would be cool to >> have a more general protocol for P2P use through hidden services. > > This is something we have defin

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread adrelanos
Ted Smith: > On Wed, 2012-09-26 at 11:42 +0100, t...@lists.grepular.com wrote: >> >> This is not the same as using XMPP over Tor. XMPP requires a trusted >> third party server to handle the relaying. This is P2P direct >> communication using hidden services. It's not real-time IM chat. It's >> SMS

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread Bernd
2012/9/26 meh. : > It's not pragmatist at all, it wastes time and resources doing > replaces when it could have just been really binary and prepend the > length of the packet, which is the sane way to do something like that > instead of using an end of packet separator. No, these few string repla

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread Ted Smith
On Wed, 2012-09-26 at 11:42 +0100, t...@lists.grepular.com wrote: > > This is not the same as using XMPP over Tor. XMPP requires a trusted > third party server to handle the relaying. This is P2P direct > communication using hidden services. It's not real-time IM chat. It's > SMS style chat (with

Re: [tor-talk] Tor and P2P

2012-09-26 Thread meh.
On Wed, Sep 26, 2012 at 02:36:34PM +0530, Nathan Freitas wrote: > I am concerned in the long run about > scalability and reliability of this. It is not unheard of for apps > that work well and do something cool to suddently have 1M+ users, and > already are nearing half that with Orbot. That is ex

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread meh.
On Wed, Sep 26, 2012 at 03:17:39PM +0200, Bernd wrote: > 2012/9/26 : > > >>> After implementing the torchat protocol and seeing how bad it > >>> is, but how nice the idea is > > What is bad about the torchat protocol? Is it its pragmatism and the > fact that it does not use xml and other bloat?

Re: [tor-talk] Tor and P2P

2012-09-26 Thread meh.
On Wed, Sep 26, 2012 at 02:08:06AM -0400, Robert Ransom wrote: > On 9/26/12, meh. wrote: > > > After implementing the torchat protocol and seeing how bad it is, but > > how nice the idea is, I started thinking it would be cool to have a > > more general protocol for P2P use through hidden service

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread Bernd
2012/9/26 : >>> After implementing the torchat protocol and seeing how bad it >>> is, but how nice the idea is What is bad about the torchat protocol? Is it its pragmatism and the fact that it does not use xml and other bloat? ___ tor-talk mailing list

[tor-talk] Obfsproxy Bridges in the Amazon Cloud

2012-09-26 Thread Runa A. Sandvik
Hi everyone, The Tor Cloud images [1] for all the seven regions have been updated to fix a bug found in the unattended-upgrades configuration. The normal bridge images have also been updated to include obfsproxy [2], which attempts to help users circumvent censorship by transforming the Tor traffi

Re: [tor-talk] how to know which IP(host) a TOR client is using as tor nodes?

2012-09-26 Thread esolve esolve
ah,below the connection-status there are usually 5 items, and when I click on one item, the details will be shown on the right, the details usually include 3 hosts. so this means the items are actually circuits and the 3 hosts are the entry, middle and exit node respectively? is it right? when I o

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 26/09/12 10:06, Nathan Freitas wrote: >> After implementing the torchat protocol and seeing how bad it >> is, but how nice the idea is, I started thinking it would be cool >> to have a more general protocol for P2P use through hidden >> services.

Re: [tor-talk] VPS provider

2012-09-26 Thread Fabio Pietrosanti (naif)
On 9/25/12 7:31 PM, Webmaster wrote: > Can anyone suggest a vps provider that is friendly to tor hidden > services. This would not be for an exit node. Consider that on a VPS the Tor Hidden Service RSA Private Key will be fully exposed to the VPS provider. That means that the VPS provider would

[tor-talk] DNS query enforcement not working

2012-09-26 Thread Raviji
Hello list, I like to use tor Dnsport (port 53) . I have configure iptables to do the same as below iptables -F iptables -X iptables -Z iptables -t nat -Z 2>/dev/null iptables -t mangle -Z iptables -t nat -F iptables -t mangle -F iptables -P INPUT DROP iptables -P FORWARD DROP iptab

Re: [tor-talk] Tor and P2P

2012-09-26 Thread Nathan Freitas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 09/26/2012 10:08 AM, meh. wrote: > > After implementing the torchat protocol and seeing how bad it is, > but how nice the idea is, I started thinking it would be cool to > have a more general protocol for P2P use through hidden services. This is s

Re: [tor-talk] Tor and P2P

2012-09-26 Thread Paul Syverson
On Tue, Sep 25, 2012 at 11:01:14PM -0700, Seth David Schoen wrote: > meh. writes: > > > After implementing the torchat protocol and seeing how bad it is, but > > how nice the idea is, I started thinking it would be cool to have a > > more general protocol for P2P use through hidden services. > >