Re: [tor-talk] Scaling Tor

2014-08-18 Thread Zenaan Harkness
On 8/19/14, isis wrote: > Mike Fikuart transcribed 4.8K bytes: >> A question raised in Tor-Design (section 9) is, "if clients can no longer >> have a complete picture of the network, how can they perform discovery >> while preventing attackers from manipulating or exploiting gaps in their >> knowl

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Scott MacLeod
Hi All, In thinking about scaling Tor, what plans do you have for all 7,106 + languages in the world? MIT OCW-centric, CC World University and School is planning to be in all of these languages - http://worlduniversity.wikia.com/wiki/Languages - as well as in all 242 countries - http://worldunive

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Prateek Mittal
On Mon, Aug 18, 2014 at 8:10 PM, isis wrote: > BTW, if anyone has found/written more recent, worthwhile papers on > this topic, we'd love to hear about them! > > The Pisces protocol was written in the context of scalable anonymity using unstructured social network topologies, but I think its idea

Re: [tor-talk] Scaling Tor

2014-08-18 Thread isis
isis transcribed 6.8K bytes: > Mike Fikuart transcribed 4.8K bytes: > > Thanks Virgil. I wasn’t directly what I was after; however it was an > > informative read and as with this subject grows the background knowledge > > that will come to use in the future. I did get an interesting link from

Re: [tor-talk] [tor-consensus-health] Consensus issues

2014-08-18 Thread isis
Sebastian Hahn transcribed 3.9K bytes: > Hi Sebastian, > > thanks for looking after the network! > > On 16 Aug 2014, at 22:56, Sebastian G. wrote: > > On Sat, 16 Aug 2014 19:46:15 + (UTC) the doctor said: > >> NOTICE: Consensus belonging to maatuska was missing the following > >> authority

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Mike Fikuart
Isis, brilliant response! Some good bedtime reading to do, but just the track I was needing. Thanks for the support! Yours sincerely Mike Fikuart > On 18 Aug 2014, at 23:58, "isis" wrote: > > Mike Fikuart transcribed 4.8K bytes: >> Thanks Virgil. I wasn’t directly what I was after; however

Re: [tor-talk] Scaling Tor

2014-08-18 Thread isis
Mike Fikuart transcribed 4.8K bytes: > Thanks Virgil. I wasn’t directly what I was after; however it was an > informative read and as with this subject grows the background knowledge that > will come to use in the future. I did get an interesting link from Johan > Pouweise on scalability that

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Mike Fikuart
Thanks Virgil. I wasn’t directly what I was after; however it was an informative read and as with this subject grows the background knowledge that will come to use in the future. I did get an interesting link from Johan Pouweise on scalability that his students published this year http://arxi

Re: [tor-talk] BadExit: 209.97.221.21 (SSL MITM)

2014-08-18 Thread Raymond Bordt
Thanks I will do that ASAP! I am using an Apple Airport, I already have a Genuis appt on Wed. In there anything I should do immediate or can it wait till Wed? Thanks again. On Aug 18, 2014, at 5:10 PM, Nusenu wrote: > Hi, > > looks like your tor exit relay running at 209.97.221.21:9030 > is "m

[tor-talk] BadExit: 209.97.221.21 (SSL MITM)

2014-08-18 Thread Nusenu
Hi, looks like your tor exit relay running at 209.97.221.21:9030 is "misconfigured". You are MITM'ing SSL connections (at least at TCP/465). Please fix this ASAP. thanks! https://atlas.torproject.org/#details/843EBCCCFFE17E0194C31204F21B72BC4115AE80 For the record: certificate observed: CN

Re: [tor-talk] Performance

2014-08-18 Thread Lunar
Martin S: > Considering the responses in this thread, I am now testing the Tor BB. > However the startup time for this is monstruous. Running through the > initial setup routine, the thing just seems to hang on connecting to > Tor network. What could be wrong? Please contact the Tor help desk: . I

[tor-talk] TCP Stealth - Improved Kernel-Based Port-Knocking in Linux

2014-08-18 Thread tor
Hi, This work could be of interest for the TOR project. https://gnunet.org/sites/default/files/ma_kirsch_2014.pdf Quote: "TCP Stealth replaces the traditional random TCP SQN number with a token that authenticates the client and (optionally) the first bytes of the TCP payload. Clients and server

Re: [tor-talk] Performance

2014-08-18 Thread Martin S
Considering the responses in this thread, I am now testing the Tor BB. However the startup time for this is monstruous. Running through the initial setup routine, the thing just seems to hang on connecting to Tor network. What could be wrong? 2014-08-16 15:23 GMT+02:00 Fabian Keil : > Roger Dingle

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Mike Fikuart
Thanks, George. Interesting proposal and an area I hadn’t considered to be an issue. I will look again at the HS process and review links in more detail. Yours sincerely Mike Fikuart IEng MIET Mobile: 07801 070580 Office: 020 33840275 Blog: mikefikuart Skype: mikefikuart Twitter: mikefikuart<

Re: [tor-talk] Scaling Tor

2014-08-18 Thread George Kadianakis
Mike Fikuart writes: > Hi Tor-Talk, > > I am interested in the scaling limits to Tor and what present the > bottlenecks to Tor’s future expansion. I have looked into the > documentation available and see that Tor has far exceeded initial > projections through structural changes to the relationsh

Re: [tor-talk] Scaling Tor

2014-08-18 Thread Virgil Griffith
This isn't exactly what you asked, but read the first few sections of this where it looks for bottlenecks. http://www.robgjansen.com/publications/kist-sec2014.pdf -V On Sunday, August 17, 2014, Mike Fikuart wrote: > Hi Tor-Talk, > > I am interested in the scaling limits to Tor and what present