[tor-dev] BridgeDB's email server rewrite; NEED CODE REVIEW

2014-05-12 Thread isis
Hi everyone!

If someone who is comfortable with Twisted Python and SMTP could look over my
rewrite of BridgeDB's email servers, that would be great!

The servers currently online (they are mostly down, and they keep falling
over) had so many bugs that I spent a week and a half trying to stabilise
them. Then I spent a mere day and a half rewriting them completely, fixing the
following bugs: #5463 #7547 #7550 #8241 #11475 #11753, among others.

The relevant branch is my `fix/5463-7547-7550-8241-11475-11753-email-rewrite`
branch, [0] and most of the new code can be found in the `lib/bridgedb/email`
tree. [1] The relevant ticket for providing feedback would be #5463, where
most of the discussion is happening. [2] 

Since I've already waited about a week for review, and the servers are
currently broken and people are complaining at me a lot, I'm giving y'all 48
hours to speak up, else forever hold your pisces. Thanks in advance for
reviewing! :)

[0]: 
https://gitweb.torproject.org/user/isis/bridgedb.git/shortlog/refs/heads/fix/5463-7547-7550-8241-11475-11753-email-rewrite
[1]: 
https://gitweb.torproject.org/user/isis/bridgedb.git/tree/refs/heads/fix/5463-7547-7550-8241-11475-11753-email-rewrite:/lib/bridgedb/email
[2]: https://trac.torproject.org/projects/tor/ticket/5463

-- 
 ♥Ⓐ isis agora lovecruft
_
GPG: 4096R/A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt


signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Installing obfsproxy from wheezy-backports

2014-05-12 Thread irregulator
Hello there,

tl;dr obfsproxy from wheezy-backports raises exception about not finding
Twisted although Twisted-core is installed.

I want to install obfsproxy from wheezy-backports on a wheezy machine.

The package currently in wheezy-backports [1] depends on : python (=
2.7), python ( 2.8), python-pkg-resources, python-crypto,
python-twisted-core (= 13.2)

After installation i get:

$ obfsproxy
Traceback (most recent call last):
  File /usr/bin/obfsproxy, line 5, in module
from pkg_resources import load_entry_point
  File /usr/lib/python2.7/dist-packages/pkg_resources.py, line 2707,
in module
working_set.require(__requires__)
  File /usr/lib/python2.7/dist-packages/pkg_resources.py, line 686, in
require
needed = self.resolve(parse_requirements(requirements))
  File /usr/lib/python2.7/dist-packages/pkg_resources.py, line 584, in
resolve
raise DistributionNotFound(req)
pkg_resources.DistributionNotFound: Twisted

obfsproxy explicitly requires twisted:

$ cat /usr/lib/python2.7/dist-packages/obfsproxy-0.2.7.egg-info/requires.txt

PyCrypto
Twisted
argparse
pyptlib = 0.0.5
pyyaml

But in /usr/lib/python2.7/dist-packages/ there is only:

twisted
Twisted_Core-13.2.0.egg-info

Meaning obfsproxy doesn't seem to find Twisted, cause there is no
Twisted*.egg-info in dist-packages/ directory.

Interestingly obfsproxy wheezy package from deb.torproject.org [2]
depends on : python (= 2.7), python ( 2.8), python-pkg-resources,
python-crypto, python-twisted, python-pyptlib (= 0.0.4), python-yaml
(The same goes for obfsproxy in debian testing.)

Notice it's 'python-twisted' and not 'python-twisted-core'. So the
package from deb.torproject ends up installing a Twisted*.egg-info in
/dist-packages and obfsproxy does not complain.

So i'm wondering, is this a bug? Should i file a debian bug for the
debian package in wheezy-backports? Does obfsproxy need all of twisted
dependencies or 'python-twisted-core' suffices? If the latter how may we
fix the original exception?

Cheers,
Alex

[1]: https://packages.debian.org/wheezy-backports/obfsproxy
[2]:
https://deb.torproject.org/torproject.org/dists/wheezy/main/binary-amd64/Packages



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] GSoC: Ahmia.fi - Search Engine for Hidden Services

2014-05-12 Thread Juha Nurmi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

Some updates. Ahmia have now fresh new YaCy back-end installed.
Unfortunately, I messed up with Solr and eventually we might have to
destroy and re-crawl everything again. At the moment, it at least works.

Then some good news. I created a milestone to github. There are all
the main features and I try to develop them as fast as I can :)

https://github.com/juhanurmi/ahmia/issues?milestone=1page=1state=open

Currently, I have worked some code to gather popularity stats and new
domains from tor2web nodes and saving them to ahmia.fi. Furthermore, I
have built a tool that checks backlinks from the public WWW! This data
is useful for the popularity measurements.

I am already pushing code to github :)

Cheers,
Juha
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTcRgHAAoJELGTs54GL8vA2jAH/j2aIV158GSpS+udWM62PfsM
3RxTkzfnfxRT5JPC/BtVNqzDCwnyePskK3FVR6etd+rA9XD55He6Kb9EAFypfkK4
QI/2/IVViWOZzL/S55bz97/DbBPPCpIoesd20cUNC08qK57FnZZOKrQFCVtyL11i
MskET/TMIZLFgXjLlCoGCsGvCt386OjbN1A0aAJkEwvKf9EfWEZdDED12nj4jaMB
s6+dKr8+4jJt8hBKsrPSw1Kcb7UNBBzFGUL/N75Rl4fVToE9YJyLtNHhogy7z2JH
d9JFuIcoSl/ZK/Ly1W/91DcJgZQwVU4fUedQ/aWocPO/HSxaUXsgIir88BoX89M=
=2TIk
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Missing days in Bridge users by transport

2014-05-12 Thread David Fifield
Do you know what is the cause of the missing data between April 14 and
April 22 in this graph? I'd like to be able to account for it when I
present the graph.

https://metrics.torproject.org/users.html?graph=userstats-bridge-transporttransport=meek#userstats-bridge-transport

I don't suppose it is a problem with the bridge, because other
transports show the same gap.

https://metrics.torproject.org/users.html?graph=userstats-bridge-transporttransport=obfs3#userstats-bridge-transport
https://metrics.torproject.org/users.html?graph=userstats-bridge-transporttransport=fte#userstats-bridge-transport

David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Introduction Points and their rotation periods (was Re: Hidden Service Scaling)

2014-05-12 Thread grarpamp
On Sun, May 11, 2014 at 11:33 AM, Michael Rogers
mich...@briarproject.org wrote:
 However, that might require all three nodes in the circuit to be
 picked from the high-uptime pool.

Can't be certain but I think Phantom picks the entire
circuit and then camps on it till it breaks somewhere.
Their paper might give other views/ideas on such things.

Another thought, the benefits of 'longer' camping
on an entry seem sound to me (you're either safe
or not straight away, vs likely not safe sometime
in the future or even straight away.) Does the EG camp
time come down to estimating the number of EG's in the
environment that are unsafe? Also, if you camp on a whole
circuit your usage is more timeable by a PA who might catch
your tail. So perhaps making the circuit be an anchored
flagellum, farther from the EG, more flipping about.
Sometimes with just a shimmy in the middle.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Finding the catch probability

2014-05-12 Thread Sukhbir Singh
Hi,

Everything you need to know about running experiments on Shadow:

https://github.com/shadow/shadow/wiki

(Including installation)
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Finding the catch probability

2014-05-12 Thread saurav dahal
Hi,

I have installed the shadow(v 1.9.2) and ran it also. Then I perform the
following process:

 I will first use any of the four examples included in the scallion
directory.

2. In shadow.config.xml file, numbers of clients, guard, middle, exit and
webservers are configured.

3. Lets suppose that I added certain number of guard or exit nodes with
high bandwidth in this shadow.config.xml file and run the simulation. The
clients will try to download a file from the webserver by selecting three
nodes, according to path selection algorithm, among these all nodes
including mine inserted nodes also.

4. Now I want to observe the probability of selection of my inserted nodes
as entry or exit nodes by the clients* (catch probability)*.

5. Again I will change the number of nodes to be inserted and run the
simulation and find the catch probability.

After running the simulation, a log file will be created, scallion.log.
 So using this log file, how to find the catch probability by using the
analyze.py script?

Thanks,


On Tue, May 13, 2014 at 12:50 PM, Sukhbir Singh sukhbir...@gmail.comwrote:

 Hi,

 Everything you need to know about running experiments on Shadow:

 https://github.com/shadow/shadow/wiki

 (Including installation)

 ___
 tor-dev mailing list
 tor-dev@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev




-- 

Saurav Dahal,
Wireless communication and Networking lab,
Dept. of Computer Engineering,
Chosun University,
309 Pilmun-daero, Dong-gu
Gwangju, 501-759 S.KOREA
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev