Re: [tor-talk] Tor and HTTPS graphic

2012-03-19 Thread Martin Hubbard
Mike Perry wrote on 03/12/12 01:57 PM: > Thus spake coderman (coder...@gmail.com): > > > a lot of infrastructure to build; call it Tor 2.0: > > > > combine LEDBAT edge management[0] with SCTP multi-homed[1] > > endpoints over ORCHID overlay[2] provided by IPsec telescopes[3] > > with reliable mul

Re: [tor-talk] Tor and HTTPS graphic

2012-03-13 Thread coderman
On Mon, Mar 12, 2012 at 11:57 AM, Mike Perry wrote: > ... > Your ideas intrigue me and I wish to subscribe to your newsletter. my last comment for this sad, confused tangent of a thread; it has been accosted via conjecture with too much frequency *grin* SCTP for congestion control of transpar

Re: [tor-talk] Tor and HTTPS graphic

2012-03-12 Thread Mike Perry
Thus spake coderman (coder...@gmail.com): > a lot of infrastructure to build; call it Tor 2.0: > > combine LEDBAT edge management[0] with SCTP multi-homed[1] endpoints > over ORCHID overlay[2] provided by IPsec telescopes[3] with reliable > multicast gradients[4] and stochastic fair queuing[5] and

Re: [tor-talk] Tor and HTTPS graphic

2012-03-10 Thread coderman
On Fri, Mar 9, 2012 at 9:55 PM, The23rd Raccoon wrote: > ... > If you want me to analyze active timing attacks using similar Bayesian > analysis, that might be a taller order. as amused as i am by our favorite dumpster diver, this does bring to mind the need for datagram transport with multiplexe

Re: [tor-talk] Tor and HTTPS graphic

2012-03-09 Thread The23rd Raccoon
On Fri, Mar 9, 2012 at 8:52 PM, Paul Syverson wrote: > On Thu, Mar 08, 2012 at 06:41:25AM +, The23rd Raccoon wrote: >> has blinded the tor devs to a very serious type of active attack >> that actually will: the crypo-tagging attack. > > Nobody's blinded to the possibility. Many of us knew long

Re: [tor-talk] Tor and HTTPS graphic

2012-03-09 Thread Paul Syverson
On Thu, Mar 08, 2012 at 06:41:25AM +, The23rd Raccoon wrote: > On Thu, Mar 8, 2012 at 1:39 AM, Mansour Moufid > wrote: > > On Tue, Mar 6, 2012 at 11:55 PM, The23rd Raccoon > > wrote: > >> Now bear in mind that I'm just a Raccoon, but some time ago I scrawled > >> a proof out that showed that

Re: [tor-talk] Tor and HTTPS graphic

2012-03-09 Thread Paul Syverson
On Tue, Mar 06, 2012 at 11:14:39PM -0500, Paul Syverson wrote: > On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson > > wrote: > > > I'm a mere four years behind in putting my work up on the web, and > > > this one wasn't co-authored

Re: [tor-talk] Tor and HTTPS graphic

2012-03-08 Thread Number Six
On Tue, Mar 6, 2012, at 04:20 PM, Seth David Schoen wrote: > and...@torproject.is writes: > > > The GPA is in every paper on the topic. But only Seth has the real > > answer. > > I was concerned that the graphic should not make people think that > _no one_ can ever associate them with their brows

Re: [tor-talk] Tor and HTTPS graphic

2012-03-08 Thread The23rd Raccoon
On Wed, Mar 7, 2012 at 9:54 PM, Mike Perry wrote: > You know, in hindsight, I don't want to sound like I'm hating on Steven > or his work. His work was quite clear along all of the dimensions I am > talking about, and was excellent research. > > He in fact did even compare 500 flows/hour to 50 fl

Re: [tor-talk] Tor and HTTPS graphic

2012-03-08 Thread grarpamp
> Thanks to Mark Klein, we know that the NSA wiretaps in the US are > passive in nature, not active. We know that *back then* *one* of their possible tap systems was passive. All thanks due of course. > But who knows what they do [...] ... today, to whoever. > I don't think The Man can correla

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread grarpamp
> I think that it is important to differentiate national security > and law enforcement here. Yes. They are two separate camps. Who now more regularly talk with each other to varying degrees, both in the office, and in the pub. It's likely only a legal question as to what tools either may use. Th

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread The23rd Raccoon
On Thu, Mar 8, 2012 at 1:39 AM, Mansour Moufid wrote: > On Tue, Mar 6, 2012 at 11:55 PM, The23rd Raccoon > wrote: >> Now bear in mind that I'm just a Raccoon, but some time ago I scrawled >> a proof out that showed that the correlation accuracy of a "dragnet >> GPA" goes down in proportion to the

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Mansour Moufid
On Tue, Mar 6, 2012 at 11:55 PM, The23rd Raccoon wrote: > Now bear in mind that I'm just a Raccoon, but some time ago I scrawled > a proof out that showed that the correlation accuracy of a "dragnet > GPA" goes down in proportion to the square of the number of concurrent > users using an anonymiza

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Mike Perry
Thus spake Seth David Schoen (sch...@eff.org): > Eva Galperin and I worked on this graphic (drawn by Hugh D'Andrade) > that tries to show the difference between the threats Tor addresses > and the threats HTTPS addresses. > > https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-pr

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Maxim Kammerer
On Wed, Mar 7, 2012 at 20:57, grarpamp wrote: > Going with the USA idea: what if the FBI, in the > normal course of business, calls up all their local cable/dsl/fiber/cell > providers and has a few lines run to each office and outhouse > nationwide. I think that it is important to differentiate n

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Mike Perry
Thus spake Mike Perry (mikepe...@torproject.org): > > But passive correlation is adequate anyway, even at very low sampling > > rates (cf. Murdoch and Zielinski, PETS 2007). This is long known and > > well understood. It's why we have always said that onion routing > > resists traffic analysis not

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Mike Perry
Thus spake Paul Syverson (syver...@itd.nrl.navy.mil): > > It's time the myth of the GPA was challenged. I don't think active > > correlation attacks can be defended against, but I think they can at > > least be detected. > > Actually there are many papers over the last several years (e.g., at > A

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread grarpamp
> The nodes must reside in commercial data centers Subject only to Tor's defenses, such as CIDR block restrictions, a node is a node. Going with the USA idea: what if the FBI, in the normal course of business, calls up all their local cable/dsl/fiber/cell providers and has a few lines run to each

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread Maxim Kammerer
On Wed, Mar 7, 2012 at 06:30, grarpamp wrote: > Setting aside the taps, what if half the 3000 nodes are 'The Man'? I think that's quite unlikely. The nodes must reside in commercial data centers and run untrusted software (including necessarily modified Tor clients), all of which exposes them to

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread The23rd Raccoon
On Wed, Mar 7, 2012 at 12:20 AM, Seth David Schoen wrote: > and...@torproject.is writes: > > I was concerned that the graphic should not make people think that > _no one_ can ever associate them with their browsing when they use > Tor.  I've been taught to think of the GPA threat (and other traffi

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Paul Syverson
On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson > wrote: > > I'm a mere four years behind in putting my work up on the web, and > > this one wasn't co-authored so nobody else did either. I'll try to do > > something about that in my

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread grarpamp
Nice graphic :) Some small details not worth including... site.com under HTTPS really means site-IP to various observers between user and webserver. site-IP may or may not mean site.com in the presence of virtual hosting schemes. At the exit and beyond, knowing a site user is using Tor could be

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Mansour Moufid
On Tue, Mar 6, 2012 at 7:27 PM, Ted Smith wrote: > On Tue, 2012-03-06 at 16:20 -0800, Seth David Schoen wrote: >> I was concerned that the graphic should not make people think that >> _no one_ can ever associate them with their browsing when they use >> Tor.  I've been taught to think of the GPA t

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Maxim Kammerer
On Wed, Mar 7, 2012 at 02:27, Ted Smith wrote: > I'm not a full-time PET researcher, but smarter people than myself in this > thread seem to think the GPA is > more of a myth than a reality. Using https://metrics.torproject.org/csv/relaycountries.csv: $ grep 2012-03-05 relaycountries.csv | cut

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Mansour Moufid
On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson wrote: > I'm a mere four years behind in putting my work up on the web, and > this one wasn't co-authored so nobody else did either. I'll try to do > something about that in my copious free time this week and send a > link. Please do, this attack you

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Ted Smith
On Tue, 2012-03-06 at 16:20 -0800, Seth David Schoen wrote: > and...@torproject.is writes: > > > The GPA is in every paper on the topic. But only Seth has the real > > answer. > > I was concerned that the graphic should not make people think that > _no one_ can ever associate them with their brow

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Seth David Schoen
and...@torproject.is writes: > The GPA is in every paper on the topic. But only Seth has the real > answer. I was concerned that the graphic should not make people think that _no one_ can ever associate them with their browsing when they use Tor. I've been taught to think of the GPA threat (and

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread andrew
On Tue, Mar 06, 2012 at 02:04:11PM -0500, te...@riseup.net wrote 3.5K bytes in 90 lines about: : The graphic here seems to be the EFF graphic from the OP in this thread. : Did you mean something else? Or did you mean to say, "there's already : one story using this graphic as proof that the NSA can

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Maxim Kammerer
On Tue, Mar 6, 2012 at 23:04, Paul Syverson wrote: > The suggestion was that people _stop_ working on > defeating the GPA, which is unrealistic as both too strong (global) > and too weak (passive). While this may be true in the theoretical sense, it doesn't mean that one can't make correlation at

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread andrew
On Tue, Mar 06, 2012 at 04:04:10PM -0500, syver...@itd.nrl.navy.mil wrote 1.5K bytes in 33 lines about: : Is that a typo? The suggestion was that people _stop_ working on Yes, I meant stop. When skynet achieves consciousness, the analysis of traffic on the Internet will be the least of our proble

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Paul Syverson
On Tue, Mar 06, 2012 at 12:22:16PM -0500, Andrew Lewman wrote: > > At PETS in 2009[0], Paul did a talk on 'why I'm not an entropist' and > suggested that people need to start working on defeating a mythical > global passive adversary. Maybe in the near future some government will > have the capabi

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Ted Smith
On Tue, 2012-03-06 at 12:22 -0500, Andrew Lewman wrote: > On Tue, 06 Mar 2012 11:22:33 -0500 > Ted Smith wrote: > > While I like the graphic overall, I think the "NSA as a global passive > > adversary" element is an example of the graphic being overloaded with > > information that will confuse/sca

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Andrew Lewman
On Tue, 06 Mar 2012 11:22:33 -0500 Ted Smith wrote: > While I like the graphic overall, I think the "NSA as a global passive > adversary" element is an example of the graphic being overloaded with > information that will confuse/scare away most people. So far, there is one story where Eva claims

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread ix4svs
On 6 March 2012 04:55, Seth David Schoen wrote: > https://www.eff.org/pages/tor-and-https Excellent stuff, thank you! In particular well done for keeping it at just the right level of complexity and not overloading it with information that will confuse/scare away most people. I like the idea o

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Ted Smith
On Tue, 2012-03-06 at 15:38 +, ix4...@gmail.com wrote: > > In particular well done for keeping it at just the right level of > complexity and not overloading it with information that will > confuse/scare away most people. While I like the graphic overall, I think the "NSA as a global passive

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread proper
Nice, I like it very much. It also demonstrates the need for DNSCrypt, then "site.com" would also disappear from a few places. Can you release the source code for the demonstration? That would allow other to build up on your work. Other things like DNSCrypt, distributed DNS, alternative web of

[tor-talk] Tor and HTTPS graphic

2012-03-05 Thread Seth David Schoen
Eva Galperin and I worked on this graphic (drawn by Hugh D'Andrade) that tries to show the difference between the threats Tor addresses and the threats HTTPS addresses. https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online The complete inter