Re: [tor-dev] First release of OnioNS for beta testing

2015-08-10 Thread Jesse V
Thanks Dr. Fu, I look forward to your comments.

From the server log, apparently so far no one has tested the client, though 
someone has set up a server. I just want to highlight that I have servers up 
and running so the client and the HS functionality should work out of the box.

For the client, install the software then follow the instructions in the README 
to integrate it into the Tor Browser. My current approach is to rename the Tor 
binary from "tor" to "torbin" and then insert a symlink to the onions-tbb 
executable under the name "tor". Then the onions-tbb software lauches "torbin", 
"onions-client", and the Stem script in that order, thus allowing all the 
necessary software to start with the Tor Browser. I have also added some 
functionality to wait until Tor is fully bootstrapped before launching 
onions-client and the Stem script, thus this approach is fully compatible with 
Tor bridges.

Jesse V.

> Subject:
> Re: [tor-dev] First release of OnioNS for beta testing
> From:
> Xinwen Fu
> Date:
> 08/08/2015 04:25 AM
>
> To:
> "tor-dev@lists.torproject.org" 
>
>
> Fantastic work. Will test it.
>
> Xinwen Fu
>




signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] First release of OnioNS for beta testing

2015-08-08 Thread Xinwen Fu
Fantastic work. Will test it.

Xinwen Fu

> On Aug 8, 2015, at 2:45 AM, Jesse V  wrote:
> 
> Happy Saturday everyone,
> 
> At long last, 310 commits later, I am pleased to present a release of the 
> Onion Name System (OnioNS), a DNS for Tor hidden services. This release is a 
> usability test; it offers reliable behind-the-scenes integration with the Tor 
> Browser, a friendly command-line dialog for claiming domain names and 
> subdomains, and many options for hosting and configuring a server. The system 
> utilizes two servers: a single Quorum node which hidden services upload their 
> claims to and another server which clients query against. I am looking for 
> feedback as to how usable the system is and areas where it could be improved. 
> Most of the changes going forward will be behind-the-scenes.
> 
> The software is divided into three primary pieces, OnioNS-client, OnioNS-HS, 
> and OnioNS-server. These all have OnioNS-common (a shared library) as a 
> dependency. You can install whichever one you'd like, or all of them. This 
> software is currently Linux-only, and Debian 7 and 8, Ubuntu 14.04 - 15.10, 
> Mint 17 - 17.2, and Fedora 21 - 23 are supported. I provide packages for 
> Debian 7 and a software repository for currently-supported versions of Ubuntu 
> and Mint on 32-bit, 62-bit, and ARM systems. If possible, please use the 
> repository.
> 
> Please see the READMEs in the following repositories for more information, 
> including installation, initialization, and configuration procedures. 
> Manpages are also included for your convenience.
> https://github.com/Jesse-V/OnioNS-common
> https://github.com/Jesse-V/OnioNS-client
> https://github.com/Jesse-V/OnioNS-HS
> https://github.com/Jesse-V/OnioNS-server
> Please star the repository if it works well for you.
> 
> I have claimed "example.tor" for my project's HS and claimed the 
> "arma.example.tor" subdomain that points to Roger's site, so you can test 
> this from the client. Please open a ticket if you find a new bug, or contact 
> me if you don't have a Github account.
> 
> A brief FAQ:
> 
> Q: How does one pronounce "OnioNS"?
> A: As one would pronounce the lowercase form: "onions", the plural of "onion".
> 
> Q: It only takes a couple of minutes to claim a domain name, isn't that too 
> easy?
> A: In this release, I have set a very small difficulty level. It will 
> certainly be harder in the future and more counter-measures are being 
> considered. Also, since the claims are not yet saved to disk, I offer no 
> guarantee of their long-term survival.
> 
> Q: Should I use this on production hidden services?
> A: No, this software is not ready. This release introduces _features_, not 
> security. Tor circuits are used on both the client and HS side, but I can't 
> guarantee that my SOCKS use is leak-proof, for example. I'm asking for help 
> with finding bugs that may compromise anonymity.
> 
> Q: I'm running Windows/OSX/BSD/Arch/Gentoo/LFS/etc, can I test OnioNS?
> A: Yes, but I'm not currently supporting that environment, so you're mostly 
> on your own. However, if you can give me compilation instructions, I may be 
> able to. I am also looking to coordinate with anyone familiar with RPM or 
> Windows development.
> 
> Q: Is there security on your network communications?
> A: Client and HS communication occurs over Tor circuits, and there are some 
> integrity checks, but simply getting everything to work is the priority here. 
> Most of the infrastructure is set up so adding signatures and such will be 
> easy, but that is next on the list. Once that occurs, the name server 
> (Mirror) the client uses can be malicious with no significant impact.
> 
> Q: Where can I learn more about this project?
> A: The normal project page, onions55e7yam27n.onion, is currently being 
> rewritten. A simple page is in its place, so "example.tor" is still there. 
> Literature on this project may be found at 
> https://github.com/Jesse-V/OnioNS-literature. Please see the PDFs under the 
> respective folders. Note that the distributed design will be changing to use 
> George's commit-and-reveal scheme.
> 
> Q: Are the servers reliable enough to run under Comcast?
> A: I have not tested them in production or otherwise under 
> https://github.com/tylertreat/comcast, but I may in the future. I welcome 
> help in this area.
> 
> Enjoy,
> Jesse V.
> 
> 
> 
> 
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] First release of OnioNS for beta testing

2015-08-07 Thread Jesse V
Happy Saturday everyone,

At long last, 310 commits later, I am pleased to present a release of the Onion 
Name System (OnioNS), a DNS for Tor hidden services. This release is a 
usability test; it offers reliable behind-the-scenes integration with the Tor 
Browser, a friendly command-line dialog for claiming domain names and 
subdomains, and many options for hosting and configuring a server. The system 
utilizes two servers: a single Quorum node which hidden services upload their 
claims to and another server which clients query against. I am looking for 
feedback as to how usable the system is and areas where it could be improved. 
Most of the changes going forward will be behind-the-scenes.

The software is divided into three primary pieces, OnioNS-client, OnioNS-HS, 
and OnioNS-server. These all have OnioNS-common (a shared library) as a 
dependency. You can install whichever one you'd like, or all of them. This 
software is currently Linux-only, and Debian 7 and 8, Ubuntu 14.04 - 15.10, 
Mint 17 - 17.2, and Fedora 21 - 23 are supported. I provide packages for Debian 
7 and a software repository for currently-supported versions of Ubuntu and Mint 
on 32-bit, 62-bit, and ARM systems. If possible, please use the repository.

Please see the READMEs in the following repositories for more information, 
including installation, initialization, and configuration procedures. Manpages 
are also included for your convenience.
https://github.com/Jesse-V/OnioNS-common
https://github.com/Jesse-V/OnioNS-client
https://github.com/Jesse-V/OnioNS-HS
https://github.com/Jesse-V/OnioNS-server
Please star the repository if it works well for you.

I have claimed "example.tor" for my project's HS and claimed the 
"arma.example.tor" subdomain that points to Roger's site, so you can test this 
from the client. Please open a ticket if you find a new bug, or contact me if 
you don't have a Github account.

A brief FAQ:

Q: How does one pronounce "OnioNS"?
A: As one would pronounce the lowercase form: "onions", the plural of "onion".

Q: It only takes a couple of minutes to claim a domain name, isn't that too 
easy?
A: In this release, I have set a very small difficulty level. It will certainly 
be harder in the future and more counter-measures are being considered. Also, 
since the claims are not yet saved to disk, I offer no guarantee of their 
long-term survival.

Q: Should I use this on production hidden services?
A: No, this software is not ready. This release introduces _features_, not 
security. Tor circuits are used on both the client and HS side, but I can't 
guarantee that my SOCKS use is leak-proof, for example. I'm asking for help 
with finding bugs that may compromise anonymity.

Q: I'm running Windows/OSX/BSD/Arch/Gentoo/LFS/etc, can I test OnioNS?
A: Yes, but I'm not currently supporting that environment, so you're mostly on 
your own. However, if you can give me compilation instructions, I may be able 
to. I am also looking to coordinate with anyone familiar with RPM or Windows 
development.

Q: Is there security on your network communications?
A: Client and HS communication occurs over Tor circuits, and there are some 
integrity checks, but simply getting everything to work is the priority here. 
Most of the infrastructure is set up so adding signatures and such will be 
easy, but that is next on the list. Once that occurs, the name server (Mirror) 
the client uses can be malicious with no significant impact.

Q: Where can I learn more about this project?
A: The normal project page, onions55e7yam27n.onion, is currently being 
rewritten. A simple page is in its place, so "example.tor" is still there. 
Literature on this project may be found at 
https://github.com/Jesse-V/OnioNS-literature. Please see the PDFs under the 
respective folders. Note that the distributed design will be changing to use 
George's commit-and-reveal scheme.

Q: Are the servers reliable enough to run under Comcast?
A: I have not tested them in production or otherwise under 
https://github.com/tylertreat/comcast, but I may in the future. I welcome help 
in this area.

Enjoy,
Jesse V.






signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev