Fantastic work. Will test it. Xinwen Fu
> On Aug 8, 2015, at 2:45 AM, Jesse V <kernelc...@riseup.net> wrote: > > Happy Saturday everyone, > > At long last, 310 commits later, I am pleased to present a release of the > Onion Name System (OnioNS), a DNS for Tor hidden services. This release is a > usability test; it offers reliable behind-the-scenes integration with the Tor > Browser, a friendly command-line dialog for claiming domain names and > subdomains, and many options for hosting and configuring a server. The system > utilizes two servers: a single Quorum node which hidden services upload their > claims to and another server which clients query against. I am looking for > feedback as to how usable the system is and areas where it could be improved. > Most of the changes going forward will be behind-the-scenes. > > The software is divided into three primary pieces, OnioNS-client, OnioNS-HS, > and OnioNS-server. These all have OnioNS-common (a shared library) as a > dependency. You can install whichever one you'd like, or all of them. This > software is currently Linux-only, and Debian 7 and 8, Ubuntu 14.04 - 15.10, > Mint 17 - 17.2, and Fedora 21 - 23 are supported. I provide packages for > Debian 7 and a software repository for currently-supported versions of Ubuntu > and Mint on 32-bit, 62-bit, and ARM systems. If possible, please use the > repository. > > Please see the READMEs in the following repositories for more information, > including installation, initialization, and configuration procedures. > Manpages are also included for your convenience. > https://github.com/Jesse-V/OnioNS-common > https://github.com/Jesse-V/OnioNS-client > https://github.com/Jesse-V/OnioNS-HS > https://github.com/Jesse-V/OnioNS-server > Please star the repository if it works well for you. > > I have claimed "example.tor" for my project's HS and claimed the > "arma.example.tor" subdomain that points to Roger's site, so you can test > this from the client. Please open a ticket if you find a new bug, or contact > me if you don't have a Github account. > > A brief FAQ: > > Q: How does one pronounce "OnioNS"? > A: As one would pronounce the lowercase form: "onions", the plural of "onion". > > Q: It only takes a couple of minutes to claim a domain name, isn't that too > easy? > A: In this release, I have set a very small difficulty level. It will > certainly be harder in the future and more counter-measures are being > considered. Also, since the claims are not yet saved to disk, I offer no > guarantee of their long-term survival. > > Q: Should I use this on production hidden services? > A: No, this software is not ready. This release introduces _features_, not > security. Tor circuits are used on both the client and HS side, but I can't > guarantee that my SOCKS use is leak-proof, for example. I'm asking for help > with finding bugs that may compromise anonymity. > > Q: I'm running Windows/OSX/BSD/Arch/Gentoo/LFS/etc, can I test OnioNS? > A: Yes, but I'm not currently supporting that environment, so you're mostly > on your own. However, if you can give me compilation instructions, I may be > able to. I am also looking to coordinate with anyone familiar with RPM or > Windows development. > > Q: Is there security on your network communications? > A: Client and HS communication occurs over Tor circuits, and there are some > integrity checks, but simply getting everything to work is the priority here. > Most of the infrastructure is set up so adding signatures and such will be > easy, but that is next on the list. Once that occurs, the name server > (Mirror) the client uses can be malicious with no significant impact. > > Q: Where can I learn more about this project? > A: The normal project page, onions55e7yam27n.onion, is currently being > rewritten. A simple page is in its place, so "example.tor" is still there. > Literature on this project may be found at > https://github.com/Jesse-V/OnioNS-literature. Please see the PDFs under the > respective folders. Note that the distributed design will be changing to use > George's commit-and-reveal scheme. > > Q: Are the servers reliable enough to run under Comcast? > A: I have not tested them in production or otherwise under > https://github.com/tylertreat/comcast, but I may in the future. I welcome > help in this area. > > Enjoy, > Jesse V. > > > > > _______________________________________________ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev