[tor-dev] Usability Improvements for Atlas (was Re: Globe is now retired)

2016-06-29 Thread Iain R. Learmonth
Hi All,

On 29/06/16 09:56, Karsten Loesing wrote:
> tl;dr: Globe is now retired in favor of an improved Atlas.

Atlas is improved, but I'd like to improve it further. I've been
tackling #6787 looking to improve the homepage and make Atlas easier to
use for someone that isn't already a Tor expert.

The changes I'm proposing in my fix for #6787 [1] do make some
noticeable UI changes and I just want to gather some opinions on whether
or not Atlas users feel that this is taking it in the right direction.

The "Top 10 Relays" page was added to Atlas in order to make sure that
functionality was not lost when shutting down globe. (See #5430 [2])

In my proposed patch, I'm also adding an "Authorities" page and adding
text to both of these pages to explain what you're seeing. These are
linked from the homepage, and from the top navbar.

I'm also moving the introduction and explanation of the Atlas features
from the About page to the homepage and introducing a new Help page that
explains the details that are found in the relay details pages.

You can find a live example of this patch at:

  https://irl.github.io/atlas/#/

and a full list of changes are detailed in #6787.

Please let me know if you can see any reason to not merge this, or if
you have any suggestions for small changes before merging.

Thanks,
Iain.

[1]: https://trac.torproject.org/projects/tor/ticket/5430
[2]: https://trac.torproject.org/projects/tor/ticket/6787
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] txtorcon 0.15.1

2016-08-12 Thread Iain R. Learmonth
Hi,

On Fri, Aug 12, 2016 at 02:40:10AM +0400, meejah wrote:
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> There was a small issue in 0.15.0 noticed by the Debian reproducible
> builds (thanks irl@debian for your packaging work!)

Will get this packaged over the weekend. (:

For those interested, I am also packaging txtorcon for jessie-backports and
for Ubuntu suites on deb.tpo, as this is a dependency of ooniprobe.

Thanks,
Iain.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] txtorcon 0.15.1

2016-08-15 Thread Iain R. Learmonth
On Fri, Aug 12, 2016 at 10:21:41PM +0400, meejah wrote:
> "Iain R. Learmonth"  writes:
> 
> > Will get this packaged over the weekend. (:
> 
> Sweet :)

Got distracted over the weekend but starting on this now.

> > For those interested, I am also packaging txtorcon for jessie-backports and
> > for Ubuntu suites on deb.tpo, as this is a dependency of ooniprobe.
> 
> FWIW, I have seen a few warnings recently about txtorcon being removed
> from testing because tor will be. But, I'm not sure that tor should be a
> *dependency* of txtorcon (just recommended). Obviously, it's not going
> to be super useful without a Tor to talk to ;) but you might have built
> tor yourself from source etc. (or even have it running on a different
> machine).

Everything in the Debian archive should be able to run with only things
installed from the Debian archive. Debian policy requires that Tor be a
dependency of txtorcon as without Tor, it's pretty useless.

The warnings do seem to have gone away now, so I guess Tor is fixed. (:

Thanks,
Iain.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Not enabling IPv6 on check.torproject.org?

2016-08-18 Thread Iain R. Learmonth
Hi,

On Thu, Aug 18, 2016 at 11:13:08AM +, isis agora lovecruft wrote:
>  - Patching Check [1] to use server descriptors (rather than networkstatus
>documents) and to additionally (in the Stem script) pull IPv6 addresses
>from stem.descriptor.server_descriptor.RelayDescriptor.or_addresses.

With IPv6 this can be more complicated, as relays may be using "Privacy
Extensions for Stateless Address Autoconfiguration in IPv6" (RFC4941) which
means that these IP addresses may change often.

We should probably give some advice to relay operators to ask them to
disable privacy extensions?

Thanks,
Iain.



signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Joining Tor Project's software infrastructure

2016-11-14 Thread Iain R. Learmonth
Hi,

On Tue, Oct 04, 2016 at 07:11:47PM -0400, Jesse V wrote:
> > I'm also not sure what's the exact policy on gitian and
> > deb.torproject.org, and whether third-party applications (like OnioNS)
> > can be placed there.
> 
> That's fine. It's not a big deal, but I would eventually like to have
> reproducible builds on the official system. For now I have a few ideas
> for reproducibility, so it's not a priority at present.

If the software is stable, and reproducibly built, I would aim for placing
it into the Debian archives. I maintain ooniprobe on deb.torproject.org, but
primarily for Ubuntu users and I would prefer that Debian users are using
the version from the Debian archive.

One issue we run into is that in trying to support older distributions, we
often then have to take on maintaining backports for various packages and in
some cases this is a lot of overhead and careful version number management.

If you wanted to set up your own Debian repository, that would also be an
alternative solution for the short-term.

> 1) I will finish all the primary components and ensure that they all
> mesh together nicely. This involves a lot of testing and changes on my
> end. This is currently where I am.
> 2) I will deploy an alpha build to the approximately dozen volunteers
> that have expressed interest so far. I will distribute RPMs, DEBs, and a
> build of the Tor Browser that includes my libraries. I will help run the
> servers and they can test out the components, particularly the onion
> service and client software.
> 3) Fix bugs and deploy into beta.
> 4) I'll post on tor-dev or tor-relays asking for volunteers to help test
> the server end. This is part where the system starts to become
> decentralized.
> 5) Fix bugs, grow based on interest, add more documentation, expand the
> project page, etc.
> 6) When everything seems stable and feature-complete, announce it so
> that everyone can test out the stable builds.

I cannot see that any of this actually requires the use of Tor Project
infrastructure. If you really cannot set up a Debian repository for
distributing pre-release packages, I can provide you with a simple
repository set up to use.

Thanks,
Iain.

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Tor and IP2Location LITE

2017-08-23 Thread Iain R. Learmonth
Hi,

On 23/08/17 03:45, KL Liew wrote:
>> How is your accuracy for data centres?
> 
> I don't aware of any research papers targeting data center only.
> IP2Location should be highly accurate because we are using network
> routing information to determine physical location instead of registrant
> address.
> 
> For example, IP2Location is reporting 185.56.163.144 as in France after
> reviewing the network routing information as below. However, if you
> search the same IP address in other geolocation providers, you might see
> it as reported as North Korea, a country with limited Internet access.

It is possible that this address is used by North Korea, they don't have
a massive IP allocation and I would expect that perhaps there are some
tunnels, but I can't figure out where MaxMind have got this idea from.

I think GeoIP is actually a far more difficult problem when it's not
typical residential customers. Satellite customers, for instance, may
use IP blocks that are spread across multiple countries.

I would expect that cloud providers and larger datacenter providers are
using tunnels of sorts between their datacenters. Tunnels kill any
visibility into the real routing path.

When attempting to perform GeoIP for routers, the problem is compounded
as you don't know who really owns the router based on IP addresses
alone, routers having multiple IP addresses, etc.

With the influx of new TLDs and TLDs being chosen for vanity purposes,
they are also not a useful indicator.

I fear its the smaller providers, the more Tor-friendly providers, that
are missing or inaccurately represented in the databases.

When it comes to measuring the accuracy of databases for datacenters, I
wonder if there could be some means for relay operators to self-report a
location and then we can compare this with different databases.

Is there a safe way for relay operators to prove that they control a
relay and self-report the location of the relay without us having to
have an extra field in relay descriptors or overload the contact field?
Some sort of out-of-band means?

Thanks,
Iain.





signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] UX improvement proposal: Onion auto-redirects using Alt-Svc HTTP header

2017-11-15 Thread Iain R. Learmonth
Hi,

On 15/11/17 11:35, Alec Muffett wrote:
> 8) So, to pass concrete advice on the basis of experience: rather than
> pursue novel headers and reinvent a bunch of established,
> widely-understood web redirection technologies, I would ask that Tor
> focus its efforts instead upon providing a service - perhaps a listener
> service embedded in little-t tor as an enable-able service akin to
> SOCKSListener - which can accept a request from ,
> receive an newline-terminated IP address, and return a set of flags
> associated with that IP (exit node, relay, whatever) - or "none" where
> the IP is not part of the tor network.  Riff on this protocol as you see
> fit.

Is this not what TorDNSEL does?

https://www.torproject.org/projects/tordnsel.html.en

Thanks,
Iain.



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev