Re: [tor-dev] Named pipes with tor

2014-04-15 Thread grarpamp
> I have the opposite wish case were I would like to have a terminal > show me the addresses my tor is connecting to in real-time. The debug log output isn't very useful for logging the final condition of successful "connection 'requests' in realtime". As you can see, only the initial 'Client ask

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
On 15/04/14 19:36, David Fifield wrote: > On Tue, Apr 15, 2014 at 02:03:43PM +0100, Ximin Luo wrote: >> ## The problem >> >> The problem with the above structure, is that it is incompatible with the >> metaphor of connecting to a specific endpoint. This is what the PT spec is >> about, even though

Re: [tor-dev] Named pipes with tor

2014-04-15 Thread Nick Mathewson
On Mon, Apr 14, 2014 at 5:32 AM, carlo von lynX wrote: [...] > So the question is, would it be okay to catch ESPIPE in > all cases, thus having it ignored in tor_fd_seekend, > or just catch it in add_file_log? Or is there a reason to > impede the use of unix named pipes under all circumstances?

Re: [tor-dev] Named pipes with tor

2014-04-15 Thread Nick Mathewson
On Tue, Apr 15, 2014 at 2:27 PM, Nick Mathewson wrote: > On Mon, Apr 14, 2014 at 5:32 AM, carlo von lynX > wrote: > [...] >> So the question is, would it be okay to catch ESPIPE in >> all cases, thus having it ignored in tor_fd_seekend, >> or just catch it in add_file_log? Or is there a reason t

Re: [tor-dev] Proposal 230: How to change RSA1024 relay identity keys

2014-04-15 Thread Ian Goldberg
On Tue, Apr 08, 2014 at 02:15:12PM -0500, Nicholas Hopper wrote: > > 4. Interface > > > >To use this feature, a router should rename its secret_id_key > >file to secret_id_key_OLD. The first time that Tor starts and > >finds a secret_id_key_OLD file, it generates a new ID key if one >

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread David Fifield
On Tue, Apr 15, 2014 at 02:03:43PM +0100, Ximin Luo wrote: > ## The problem > > The problem with the above structure, is that it is incompatible with the > metaphor of connecting to a specific endpoint. This is what the PT spec is > about, even though it does not explicitly mention this viewpoint.

Re: [tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
On 15/04/14 14:03, Ximin Luo wrote: > (3, not-ideal) Bridge flashproxy (dummy addr) (fingerprint) > > Option (3) is quite nice, since in indirect PTs the actual address is > irrelevant - the Tor client never tries to connect to it. I suggest that we > have a special syntax for it though, to explic

[tor-dev] Improving the structure of indirect-connection PTs (meek/flashproxy)

2014-04-15 Thread Ximin Luo
## Background Pluggable Transports are proxy programs that help users bypass censorship. [App client] -> XXX EVIL CENSOR HAS YOU XXX ACCESS DENIED XXX [App client] -> [PT client] -> (the cloud!) -> [PT server] -> [App server] The structural design, on the client side, is roughly: 1. App client

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-15 Thread George Kadianakis
Nicholas Hopper writes: > On Fri, Apr 11, 2014 at 7:45 AM, George Kadianakis > wrote: >> I see. That makes sense, I think. > > Good. > >> I will ponder on this a bit more, and then edit the proposal. > > When/if you become convinced, let me know if you want me to draft a patch. > I think it ma

[tor-dev] Named pipes with tor

2014-04-15 Thread carlo von lynX
Hiya. Been around the tor dev community a bit, but today is my first day on the legendary tor-dev mailing list. I am asking if it makes sense to apply a minor patch to Tor source, but first, the use case: tor is very adamant at scrubbing the addresses that are being connected to in the logs, but I