[tor-dev] Proposal 243: Give out HSDir flag only to relays with Stable flag

2015-03-24 Thread George Kadianakis
Inlining the proposal written for #8243. Feedback is welcome. Thanks! -- Filename: 243-hsdir-flag-need-stable.txt Title: Give out HSDir flag only to relays with Stable flag Author: George Kadianakis Created: 2015-03-23 Status: Open 1. Introduction The descriptors of hidden services

Re: [tor-dev] Progress on hidserv-stats Metrics integration, request for code review

2015-03-12 Thread George Kadianakis
Karsten Loesing kars...@torproject.org writes: [Cc'ing tor-dev@, because why not.] On 11/03/15 19:13, Karsten Loesing wrote: Please let me know if I can help *reduce* confusion somehow. :) Looking forward, hidden-service statistics are now available on Metrics:

Re: [tor-dev] Suggestions for Hidden Services Statistics Project

2015-03-11 Thread George Kadianakis
Gautham Nekkanti gauthamn...@gmail.com writes: Hi, I have already shared my project idea on a Simple analytics tool for Hidden service providers. I am looking for suggestions and input from users who have had experience in hosting hidden services. Obviously, there would all useful

Re: [tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-02-18 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hello tor-dev, snip Two HS statistics that we (i.e. people working on Sponsor R) are interested in collecting are: 1. The number of descriptor fetches received by a hidden-service directory (HSDir) 2. The number of client

Re: [tor-dev] Tor Attack Implementations (Master's Thesis: Tor Mixes)

2015-02-08 Thread George Kadianakis
Florian Rüchel florian.ruechel@inexplicity.de writes: Hi everyone, I have taken some time and considered my topic for the Master's Thesis. I have finally decided to write it on integrating high-latency traffic with the Tor low-latency network (see also my initial mail and George's

Re: [tor-dev] Understanding the HS subsystem

2015-02-04 Thread George Kadianakis
[Declassifying this discussion and posting on [tor-dev]] David Goulet dgou...@ev0ke.net writes: Hello HS elves! I wrote a document to organize my thought and also list what we have in the bug tracker right now about HS behaviours that we want to understand/measure/assess/track. It's a

Re: [tor-dev] Hidden Service statistics coming soon!

2015-02-04 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: Hello people, for the past few months we've been working on getting better statistics for hidden services [0]. The questions we are trying to answer are Approximately how many hidden services are there? and Approximately how much traffic

Re: [tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-01-14 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hi George, Thanks for the really thoughtful comments. Two HS statistics that we (i.e. people working on Sponsor R) are interested in collecting are: 1. The number of descriptor fetches received by a hidden-service directory (HSDir) 2.

Re: [tor-dev] Two protocols to measure relay-sensitive hidden-service statistics

2015-01-09 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hello tor-dev, Hello, and thanks for posting this to the list. While helping design ways to publish statistics about hidden services in a privacy-preserving manner, it has become clear to me that certain statistics cannot be safely

[tor-dev] Hidden Service statistics coming soon!

2014-12-15 Thread George Kadianakis
review our design and code and provide us with feedback :) Thanks! George Kadianakis Karsten Loesing Aaron Johnson David Goulet [0]: https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR https://lists.torproject.org/pipermail/tor-dev/2014-October/007642.html [1]: see threads

Re: [tor-dev] What happens to my hidden service?

2014-12-14 Thread George Kadianakis
Liste lists...@tramacci.org writes: Hidden service is unavailable, but tor is running. Hello, thanks for this info. We need more feedback from HS operators who are encountering bugs or having problems. Here is a short email with some comments. Not very revealing unfortunately, but that's all

Re: [tor-dev] Proposal draft: Better hidden service stats from Tor relays

2014-12-09 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hi George, Hello! I recommend a change to the way that these statistics are obfuscated. The problem is that new noise is used every day, and from the distribution of the reported bins, the exact location within the bin (assuming the stat

Re: [tor-dev] Proposal draft: Better hidden service stats from Tor relays

2014-12-08 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: Hello there, I inline a copy of a proposal we've been working on lately. Discussion can be found in the Feedback on obfuscating hidden-service statistics thread. The proposal suggests that Tor relays add some stats about hidden service usage

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-26 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hi George, I posted an initial draft of the proposal here: https://lists.torproject.org/pipermail/tor-dev/2014-November/007863.html Any feedback would be awesome. OK, I’ll have a chance to look at this in the next few days. Specifically, I

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-25 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Roger's branch was a PoC that wrote stats on the log file. I don't think we have newer data than what is in #13192. It's unclear whether the relays stopped collecting statistics, or they just haven't updated the trac ticket. If we could check

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-11-25 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: Hello, this is an attempt to collect tasks that should be done for SponsorR. You can find the SponsorR page here: https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR FWIW, I skimmed the thread and collected all the tasks

Re: [tor-dev] high latency hidden services

2014-11-25 Thread George Kadianakis
Michael Rogers mich...@briarproject.org writes: On 09/11/14 18:33, Mansour Moufid wrote: Has there been research on integrating high-latency message delivery protocols with the hidden service model of location hiding? The SecureDrop or Pynchon Gate protocols sound like good starting points.

[tor-dev] Proposal draft: Better hidden service stats from Tor relays

2014-11-25 Thread George Kadianakis
be useful to Tor developers and to people who want to understand hidden services and the onionspace better. Any feedback is appreciated :) == Filename: 238-hs-relay-stats.txt Title: Better hidden service stats from Tor relays Author: George Kadianakis, David Goulet, Karsten Loesing, Aaron

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-25 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: Hello all, snip We put in some simple obfuscations in order to not reveal too sensitive data: we multiplied actual values with a random number in [0.9, 1.1] before including those obfuscated values in extra-info descriptors. Maybe there's

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-11-25 Thread George Kadianakis
Fabio Pietrosanti - lists li...@infosecurity.ch writes: On 10/20/14 3:37 PM, George Kadianakis wrote: Hello, this is an attempt to collect tasks that should be done for SponsorR. You can find the SponsorR page here: https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR [snip

Re: [tor-dev] How does a hidden service select introduction points

2014-11-24 Thread George Kadianakis
Richard Dennis mad_rap...@hotmail.com writes: Hi guys, i have been doing a bit of reading recently about hidden services, and i am just wondering how exactly a hidden service selects its introduction points, i understand there are two methods, one where the H.S picks its own set of I.P's

Re: [tor-dev] [PATCH] Pinning middle nodes for HSes: anti-guard-discovery

2014-11-24 Thread George Kadianakis
Nick Mathewson ni...@freehaven.net writes: On Sat, Nov 8, 2014 at 12:07 PM, George Kadianakis desnac...@riseup.net wrote: I don't expect this to be merged in mainline Tor, but if any HS operators feel like they need it, here it is. Make a ticket for it please, just in case? Done. Please

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-21 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: A response to George’s comment: The timeline here is that we are hoping the proposal _and_ the implementation to be ready by mid-December… I'm currently OK with the two statistics in:

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-20 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: George and I have been working on a small proposal to add two hidden-service related statistics: number of hidden services and total hidden-service traffic. Great, I’m starting to focus more on this project now. Well, actually I’m going on

Re: [tor-dev] Of CA-signed certs and .onion URIs

2014-11-18 Thread George Kadianakis
Tom Ritter t...@ritter.vg writes: There's been a spirited debate on irc, so I thought I would try and capture my thoughts in long form. I think it's important to look at the long-term goals rather than how to get there, so that's where I'm going to start, and then at each item maybe talk a

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-12 Thread George Kadianakis
Mike Perry mikepe...@torproject.org writes: A. Johnson: The idea would be that Guard_3 would rotate on the order of hours, Guard_2 would come from a set that is rotated on the order of days (based on the expected duration for the adversary to become Guard_3), and Guard_1 would rotate on

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-12 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: Mike Perry mikepe...@torproject.org writes: A. Johnson: The idea would be that Guard_3 would rotate on the order of hours, Guard_2 would come from a set that is rotated on the order of days (based on the expected duration for the adversary

Re: [tor-dev] HSDir Auth and onion descriptor scraping

2014-11-10 Thread George Kadianakis
Gareth Owen gareth.o...@port.ac.uk writes: Grarpamp I'm only not publishing it because of privacy concerns - ultimately some HS operators might not wish to have their existence publically known.. I would be open to supplying it to bona fide and verifiable tor project members if it is for a

[tor-dev] Hidden Service authorization UI

2014-11-09 Thread George Kadianakis
Hidden Service authorization is a pretty obscure feature of HSes, that can be quite useful for small-to-medium HSes. Basically, it allows client access control during the introduction step. If the client doesn't prove itself, the Hidden Service will not poroceed to the rendezvous step. This

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-11-08 Thread George Kadianakis
A. Johnson aaron.m.john...@nrl.navy.mil writes: As I've suggested before, I really really think you should also analyze an I2P-like scheme where HSs try really hard to maintain path persistence to their RPs for some fixed time period on the order of an hour (but which can be parameterized and

[tor-dev] [PATCH] Pinning middle nodes for HSes: anti-guard-discovery

2014-11-08 Thread George Kadianakis
Hello, inspired by the recent discussions on guard discovery, I went ahead and implemented a small patch for Tor that tries to help defend against Hidden Service guard discovery attacks. It basically allows the operator to specify a set of nodes that will be pinned as middle nodes in Hidden

[tor-dev] Stormy (was Re: Potential projects for SponsorR (Hidden Services))

2014-11-04 Thread George Kadianakis
Griffin Boyce grif...@cryptolab.net writes: Roger Dingledine wrote: snip - #8902 Rumors that hidden services have trouble scaling to 100 concurrent connections I've been curious about this ticket for a while, and happy to structurerun a follow-up test on a controlled server.

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 5th of November 2014)

2014-11-04 Thread George Kadianakis
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! ___ tor-dev mailing list

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-29 Thread George Kadianakis
Christopher Baines cbain...@gmail.com writes: On 20/10/14 14:37, George Kadianakis wrote: f) On a more researchy tone, this might also be a good point to start poking at the HS scalability project since it will really affect HS performance. We should look at Christopher Baines

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-22 Thread George Kadianakis
Virgil Griffith i...@virgil.gr writes: - Opt-in HS indexing service I offer to captain and lead development of this one. Thanks for offering to help! My main goal with this project would be to increase visibility of Hidden Services: make it easy for people to find Hidden Services that want

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 22nd of October 2014)

2014-10-21 Thread George Kadianakis
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! ___ tor-dev mailing list

[tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-20 Thread George Kadianakis
Hello, this is an attempt to collect tasks that should be done for SponsorR. You can find the SponsorR page here: https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR I'm going to focus only on the subset of those categories that Roger/David told me are the most important for the

Re: [tor-dev] Guardiness: Yet another external dirauth script

2014-10-09 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: George Kadianakis desnac...@riseup.net writes: ==Guardiness: Yet another external dirauth script== sniped FWIW, a weasel suggested to me a potentially better solution than the iffy summary files. He suggested parsing consensuses

[tor-dev] Pluggable transports meeting today (16:00UTC Wednesday 8th of October 2014)

2014-10-08 Thread George Kadianakis
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur today at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks for your attention! ___ tor-dev mailing list

[tor-dev] [PATCH] torspec/rend-spec-ng: Link to proof of the keyblinding scheme.

2014-10-06 Thread George Kadianakis
I attach a patch that adds a link to Nick Hopper's proof of the keyblinding scheme in rend-spec-ng.txt. Thanks! From 2bc39a9721ed9639220b9c94c62d52cc5affd12b Mon Sep 17 00:00:00 2001 From: George Kadianakis desnac...@riseup.net Date: Mon, 6 Oct 2014 21:29:14 +0100 Subject: [PATCH] rend-spec-ng

[tor-dev] On the visualization of OONI bridge reachability data

2014-10-04 Thread George Kadianakis
== What is bridge reachability data? == By bridge reachability data I'm referring to information about which Tor bridges are censored in different parts of the world. The OONI project has been developing a test that allows probes in censored countries to test which bridges are blocked and which

[tor-dev] Pluggable transports meeting today (16:00UTC Wednesday 24th of September 2014)

2014-09-24 Thread George Kadianakis
Hello! just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur today at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. As you see, the meeting day was recently changed from Fridays to Wednesdays:

Re: [tor-dev] Guardiness: Yet another external dirauth script

2014-09-22 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: ==Guardiness: Yet another external dirauth script== Introduction One well-known problem with Tor relays, is that Guards will suffer a big loss of traffic as soon as they get the Guard flag. This happens because clients pick guards

Re: [tor-dev] Guardiness: Yet another external dirauth script

2014-09-17 Thread George Kadianakis
Damian Johnson ata...@torproject.org writes: - Q: Why do you slow stem instead of parsing consensuses with Python on your own? This is another part where I might have taken the wrong design decision, but I decided to not get into the consensus parsing business and just rely on stem. This

Re: [tor-dev] Guardiness: Yet another external dirauth script

2014-09-17 Thread George Kadianakis
Sebastian Hahn sebast...@torproject.org writes: On 16 Sep 2014, at 16:15, George Kadianakis desnac...@riseup.net wrote: How guardiness works The idea was that the guardiness script will be an external script that is run by Tor in a similar fashion to the bandwidth auth scripts. We

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-09-13 Thread George Kadianakis
Paul Syverson paul.syver...@nrl.navy.mil writes: On Fri, Jul 11, 2014 at 08:31:05AM -0400, Ian Goldberg wrote: On Fri, Jul 11, 2014 at 01:44:36PM +0300, George Kadianakis wrote: Hey Nick, this mail is about the schemes we were discussing during the dev meeting on how to protect HSes

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-09-12 Thread George Kadianakis
Tim t_e...@icloud.com writes: On 13 Aug 2014, at 22:33 , George Kadianakis desnac...@riseup.net wrote: My plan was to make a Peach fuzzer to achieve this [0], but as I mentioned in a previous email I never got past the V3 link handshake since I actually had to implement Tor's crypto to get

Re: [tor-dev] [PATCH] Proposal 236 and voting

2014-08-31 Thread George Kadianakis
George Kadianakis desnac...@riseup.net writes: I inline a patch that specifies how voting should happen in proposal 236. The changes reflect a discussion I had yesterday with nickm during the Tor IRC meeting. BTW, while I like the simplicity of the new vote (just an integer), I'm afraid

[tor-dev] [PATCH] Proposal 236 and voting

2014-08-21 Thread George Kadianakis
and the number of months considered should also be mentioned somewhere in the votes? From de60f2daaab573912fcd78057a93bc7e12eda96c Mon Sep 17 00:00:00 2001 From: George Kadianakis desnac...@riseup.net Date: Thu, 21 Aug 2014 13:24:11 +0300 Subject: [PATCH] Specify how Guard Appearance Fraction voting

Re: [tor-dev] On picking Introduction Points in Next Generation Hidden Services

2014-08-17 Thread George Kadianakis
Matthew Finkel matthew.fin...@gmail.com writes: On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote: One missing piece of rend-spec-ng.txt [0] is a section on how HSes should pick their Introduction Points (IPs). There are three main questions here: - How many IPs should an HS

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-08-14 Thread George Kadianakis
Tim t_e...@icloud.com writes: On 13 Aug 2014, at 22:33 , George Kadianakis desnac...@riseup.net wrote: My plan was to make a Peach fuzzer to achieve this [0], but as I mentioned in a previous email I never got past the V3 link handshake since I actually had to implement Tor's crypto to get

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-08-13 Thread George Kadianakis
Tim t_e...@icloud.com writes: On 13 Aug 2014, at 0:10, George Kadianakis desnac...@riseup.net wrote: Gareth Owen gareth.o...@port.ac.uk writes: ... The framework implements the tor protocol so should be easy to modify to do fuzzing of the actual protocol but I'm skeptical how successful

[tor-dev] Guard nodes and network down events

2014-08-13 Thread George Kadianakis
Hello friends :) This is a post to discuss how Tor should treat its entry guards when its network goes down. This is part of ticket #12595 [0] which aims to design better interfaces and data structures for entry guards. This thread investigates what should happen when the network goes down and

[tor-dev] On picking Introduction Points in Next Generation Hidden Services

2014-08-12 Thread George Kadianakis
One missing piece of rend-spec-ng.txt [0] is a section on how HSes should pick their Introduction Points (IPs). There are three main questions here: - How many IPs should an HS have? - Which relays can be IPs? - What's the lifetime of an IP? ==Introduction Points attacks== Before exploring

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Wednesday 13th of August 2014)

2014-08-12 Thread George Kadianakis
Hola brothers and sisters, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. As you see, the meeting day was recently changed from Fridays to Wednesdays:

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-08-12 Thread George Kadianakis
Gareth Owen gareth.o...@port.ac.uk writes: Hi George Thanks for your reply and information+links. Tim (cc-ed) is leading the work on the fuzzer and is looking at a couple of different frameworks. I've set up a example that can do port-forwarding to a BEGIN_DIR service - so you can just

Re: [tor-dev] little-t tor projects in need of another keyboard

2014-08-11 Thread George Kadianakis
tibi...@riseup.net writes: Hi everyone, Is there any project in little-t tor that needs another hacker? I have (under another name) been writing tor unit tests, which I've finished. What should I work on next? Happy to work on either new code or more unit tests. FWIW, if you want to keep

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-08-11 Thread George Kadianakis
Gareth Owen gareth.o...@port.ac.uk writes: Hi all I thought I'd give you an update on where the Tor Research Framework is now at as there's been lots of development over the last few weeks. At present, the framework is a largely fully functional tor client with code that is easy to read,

[tor-dev] A change in the schedule of Pluggable Transport meetings

2014-08-09 Thread George Kadianakis
tl;dr: From now on, Tor PT meetings happen on Wednesdays. Same time. Next PT meeting: Wednesday 13th of August, at 16:00 UTC. Hello friends, I want to inform you of a schedule change that affects Pluggable Transport meetings. Because of the diverse set of timezones participating in the

[tor-dev] Needed improvements to the PT website

2014-08-03 Thread George Kadianakis
Hello list, in my monthly status report [0] I mentioned that some PT-related parts of the website are in need of improvement. As a response, a few people sent me a private email asking me what kind of improvements I was thinking about. Instead of replying individually, I decided to send a mail to

Re: [tor-dev] Proposal 236 and the guardiness of a guard

2014-08-01 Thread George Kadianakis
Nicholas Hopper hop...@cs.umn.edu writes: On Thu, Jul 31, 2014 at 11:24 AM, George Kadianakis desnac...@riseup.net wrote: - You can see that old guards (like RichardFeynman) see a shrinkage both on their guard and on their middle probabilities. This happens because both the total guard

[tor-dev] Pluggable transports meeting tomorrow (16:00UTC Friday 1st of August 2014)

2014-07-31 Thread George Kadianakis
Hello brothers and sisters, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks! ___ tor-dev mailing list

[tor-dev] Proposal 236 and the guardiness of a guard

2014-07-31 Thread George Kadianakis
One of the aims of proposal 236 is to reduce the period of inactiveness when a relay becomes a guard (see 'Phase three' of [0]). This phenomenon will become worse when the lifetime of the guard gets increased to 9 months, so we need to find a good fix. Proposal 236 tries to make young guards more

[tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-07-11 Thread George Kadianakis
Hey Nick, this mail is about the schemes we were discussing during the dev meeting on how to protect HSes against guard discovery attacks (#9001). I think we have some ideas on how to offer better protection against such attacks, mainly by keeping our middle nodes more static than we do

Re: [tor-dev] Defending against guard discovery attacks by pinning middle nodes

2014-07-11 Thread George Kadianakis
Sebastian G. bastik.tor bastik@googlemail.com writes: 11.07.2014 14:31, Ian Goldberg: On Fri, Jul 11, 2014 at 01:44:36PM +0300, George Kadianakis wrote: Hey Nick, this mail is about the schemes we were discussing during the dev meeting on how to protect HSes against guard discovery

[tor-dev] (Extra) roadmapping PT meeting this Friday (16:00UTC 11th of July 2014)

2014-07-08 Thread George Kadianakis
Hello friends, the PT meeting last week was a bit quiet because it was conflicting with the Tor dev meeting. To compensate for that, we are thinking of throwing an extra PT meeting this Friday. The agenda can be modified according to the participants, but we are planning to spend some time

[tor-dev] Journey to the core of Tor: Why does Roger has so many guards?

2014-06-23 Thread George Kadianakis
During our meeting in Iceland, we talked a lot about guard nodes. Some of that discussion eventually turned into proposal 236 [0]. During our discussions, we looked into the state file of Roger, and we noticed that there are 50 or so guard nodes in there. And that made us wonder: Why does Roger

[tor-dev] Pluggable transports meeting today (16:00UTC Friday 20th of June 2014)

2014-06-19 Thread George Kadianakis
Hello friends, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur today at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Thanks! ___ tor-dev mailing list tor-dev@lists.torproject.org

[tor-dev] Pluggable transports meeting today (Friday 6th of June 2014)

2014-06-06 Thread George Kadianakis
Hello friends, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur today at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Please note that we recently *changed* the time from 17:00 to 16:00 UTC. Thanks!

Re: [tor-dev] Proposal 236, Single-guard designs, and directory guards

2014-06-06 Thread George Kadianakis
Nicholas Hopper hop...@cs.umn.edu writes: On Mon, May 5, 2014 at 12:07 PM, Nick Mathewson ni...@torproject.org wrote: I noticed that proposal 236 doesn't mention directory guards. (See proposal 207, implemented in Tor 0.2.4.) I think that we should consider retaining multiple directory

Re: [tor-dev] Proposal 236, Single-guard designs, and directory guards

2014-06-05 Thread George Kadianakis
Nick Mathewson ni...@torproject.org writes: Hi, all! I noticed that proposal 236 doesn't mention directory guards. (See proposal 207, implemented in Tor 0.2.4.) I think that we should consider retaining multiple directory guards while going to a single guard for multi-hop circuits. My

Re: [tor-dev] obfs4 and ntor (question wrt node_id)

2014-06-02 Thread George Kadianakis
Ian Goldberg i...@cs.uwaterloo.ca writes: On Sat, May 31, 2014 at 05:51:16PM +0100, George Kadianakis wrote: Hello Ian, hope you are well :) I have a question wrt a new PT and ntor. Yawning Angel has been developing a new PT called obfs4 (temp name), which is basically scramblesuit

[tor-dev] obfs4 and ntor (question wrt node_id)

2014-05-31 Thread George Kadianakis
Hello Ian, hope you are well :) I have a question wrt a new PT and ntor. Yawning Angel has been developing a new PT called obfs4 (temp name), which is basically scramblesuit using ntor and elligator2. This results in better performance than UniformDH. You can find the spec of obfs4 here:

Re: [tor-dev] wfpadtools: comments about primitives

2014-05-30 Thread George Kadianakis
Marc Juarez marc.juarezm...@esat.kuleuven.be writes: Hi all, I am a GSoC student working in a new PT for the development of future Website Fingerprinting countermeasures in Tor. The PT is not targeting any specific defense, but to link padding defenses in general. The idea is to implement

[tor-dev] Pluggable transports meeting today (Friday 23rd of May 2014)

2014-05-23 Thread George Kadianakis
Hello friends, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur today at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Please note that we recently *changed* the time from 17:00 to 16:00 UTC. Thanks!

Re: [tor-dev] Introduction Points and their rotation periods (was Re: Hidden Service Scaling)

2014-05-11 Thread George Kadianakis
Michael Rogers mich...@briarproject.org writes: On 10/05/14 21:09, George Kadianakis wrote: It's interesting that you say this, because we pretty much took the opposite approach with guard nodes. That is, the plan is to extend their rotation period to 9 months (from the current 2-3 months

[tor-dev] Introduction Points and their rotation periods (was Re: Hidden Service Scaling)

2014-05-10 Thread George Kadianakis
waldo waldoalvare...@yahoo.com writes: El 02/05/14 02:34, Christopher Baines escribió: On 02/05/14 00:45, waldo wrote: El 30/04/14 17:06, Christopher Baines escribió: On 08/10/13 06:52, Christopher Baines wrote: I have been looking at doing some work on Tor as part of my degree, and more

[tor-dev] Pluggable transports meeting tomorrow (Friday 9th of May 2014)

2014-05-08 Thread George Kadianakis
Hello friends, just wanted to remind you that the regular biweekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in the OFTC network. Please note that we recently *changed* the time from 17:00 to 16:00 UTC. Thanks!

Re: [tor-dev] Hidden Service Scaling

2014-05-03 Thread George Kadianakis
Christopher Baines cbain...@gmail.com writes: On 08/10/13 06:52, Christopher Baines wrote: I have been looking at doing some work on Tor as part of my degree, and more specifically, looking at Hidden Services. One of the issues where I believe I might be able to make some progress, is the

Re: [tor-dev] Version bump of obfsproxy to 0.2.8 in TB breaks FTE

2014-04-28 Thread George Kadianakis
Kevin P Dyer kpd...@gmail.com writes: Hi Mike, It looks like [1] broke FTE [2]. Can you hold off on pushing any releases public, until we resolve #11629? George - Can we revert obfsproxy back to 0.2.4, to give me time to sort this out? Sure, that seems reasonable for now. Could you

Re: [tor-dev] GSoC: Ahmia.fi - Search Engine for Hidden Services

2014-04-25 Thread George Kadianakis
Juha Nurmi juha.nu...@ahmia.fi writes: On 22.04.2014 17:35, George Kadianakis wrote: Enjoy GSoC :) I will :) BTW, looking again at your proposal, I see that you are going to do both popularity tracking and backlinks. Yes, another crawler gathers backlinks from the public WWW and I

[tor-dev] Pluggable transports meeting tomorrow (Time changed!) (16:00 UTC Friday 24th of April 2014)

2014-04-24 Thread George Kadianakis
Hello friends, just wanted to remind you that the regular biewekly pluggable transports meeting is going to occur tomorrow at 16:00 UTC. Place is the #tor-dev IRC channel in OFTC. Please note that we *changed* the time from 17:00 to 16:00 UTC. Thanks!

Re: [tor-dev] GSoC: Ahmia.fi - Search Engine for Hidden Services

2014-04-22 Thread George Kadianakis
Juha Nurmi juha.nu...@ahmia.fi writes: Hi, I'm a student who is starting to work with ahmia.fi search engine as a part of Google Summer of Code. :) The proposal is online here https://ahmia.fi/gsoc/ In practise, I have now time and funding to develop my search engine. George is my

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-15 Thread George Kadianakis
Nicholas Hopper hop...@cs.umn.edu writes: On Fri, Apr 11, 2014 at 7:45 AM, George Kadianakis desnac...@riseup.net wrote: I see. That makes sense, I think. Good. I will ponder on this a bit more, and then edit the proposal. When/if you become convinced, let me know if you want me

[tor-dev] Pluggable transports meeting today (Friday 11th of April 2014)

2014-04-11 Thread George Kadianakis
Greetings humans, this is an email to remind you that the regular biweekly pluggable transports meeting is going to happen today. Place is the #tor-dev IRC channel in OFTC. Time is 17:00 UTC. Cheers! ___ tor-dev mailing list

[tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-11 Thread George Kadianakis
On Mon, Apr 7, 2014 at 11:34 AM, George Kadianakis So, based on your response, IIUC, the idea is that because young guards are underutilized, we want to increase the probability of them being chosen in non-guard positions, so that they become more utilized till more people pick them

Re: [tor-dev] ideas/xxx-pluggable-transports-through-proxy.txt

2014-04-11 Thread George Kadianakis
Yawning Angel yawn...@schwanenlied.me writes: Hello, The topic of routing pluggable transports through other proxys (SOCKS and HTTP CONNECT) has come up a few times recent, both as bug reports from users and as something that probably should be done to round out the pluggable transport

[tor-dev] Requesting trac components for some PT projects

2014-03-28 Thread George Kadianakis
Hello people of the Trac, could you make us some Trac components for some PT projects? Specifically, it would be great if you could make us the following components: a) meek b) FTE c) obfsclient Thank you! ___ tor-dev mailing list

[tor-dev] Pluggable transports meeting tomorrow (Friday 28th of March 2014)

2014-03-27 Thread George Kadianakis
Greetings humans, this is an email to remind you that the regular biweekly pluggable transports meeting is going to happen tomorrow. Place is the #tor-dev IRC channel in OFTC. Time is 17:00 UTC. Cheers! ___ tor-dev mailing list

Re: [tor-dev] Implications of switching to a single guard node: some conclusions

2014-03-26 Thread George Kadianakis
Roger Dingledine a...@mit.edu writes: On Thu, Mar 13, 2014 at 10:21:38PM +, George Kadianakis wrote: From {2}, we see that the Tor network has 6000MiB/s advertised guard bandwidth (orange line), but supposedly is only using the 3500MiB/s (yellow line). This means, that supposedly we

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-24 Thread George Kadianakis
Replying to some new additions in the proposal: Thanks asn! Ask help from organizations that are crawling Today I emailed to duckduckgo and asked is there an easy way to search new .onions using their search engine. Checking out the backlinks from public WWW With known onion address it is

Re: [tor-dev] Descriptor-id and responsible hidden service directorate. Changes in version 0.2.4.18-rc - 2013-11-16

2014-03-21 Thread George Kadianakis
Frank Young pfco...@gmail.com writes: I have noticed that since the release of version 0.2.4.18-rc - 2013-11-16, Attempts to fetch v2 rendezvous service descriptor are failing. The issue seems to get worse as many people are updating their clients. The calculation of decriptor ids based on

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-17 Thread George Kadianakis
Nurmi, Juha juha.nu...@ahmia.fi writes: Hi, Thank you George, Fabio and Giovanni! :) I gathered these comments to the Google Docs: https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing I have wrote a comment to the each comment. Furthermore, I

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-17 Thread George Kadianakis
Juha Nurmi juha.nu...@ahmia.fi writes: Also, are you sure that 1-3 workdays are sufficient to design implement a banned domain synchronizer between tor2web and ahmia? Well, I cannot know that. Let's put one workweek for that. I am hoping to spend a workday or two with Tor2web and we get

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-17 Thread George Kadianakis
Giovanni `evilaliv3` Pellerano giovanni.peller...@evilaliv3.org writes: I do not see any paricular risk in exposing the hashed list. the reason behind the hashed list is exactly that we want to allow publishing without any risk to publish direct link to child porn contents or other shit.

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-17 Thread George Kadianakis
Nurmi, Juha juha.nu...@ahmia.fi writes: Hi, Thank you George, Fabio and Giovanni! :) I gathered these comments to the Google Docs: https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing I have wrote a comment to the each comment. Furthermore, I

Re: [tor-dev] GSoC - Search Engine for Hidden services

2014-03-16 Thread George Kadianakis
Juha Nurmi juha.nu...@ahmia.fi writes: And what would you like to do over the summer so that: a) Something useful and concrete comes out of only 3 months of work. b) Your work will also be useful after the summer ends. I would be interested to see some areas that you would like to work on

[tor-dev] Pluggable transports meeting tomorrow (Friday 14th of March 2014)

2014-03-13 Thread George Kadianakis
Greetings humans, this is an email to remind you that the regular biweekly pluggable transports meeting is going to happen tomorrow. Place is the #tor-dev IRC channel in OFTC. Time is 17:00 UTC. Cheers! ___ tor-dev mailing list

[tor-dev] Implications of switching to a single guard node: some conclusions

2014-03-13 Thread George Kadianakis
tl;dr: analysis seems to indicate that switching to one guard node might not be catastrophic to the performance of Tor. To improve performance some increased guard bandwidth thresholds are proposed that seem to help without completely destroying the anonymity of the network. Enjoy the therapeutic

Re: [tor-dev] GoSC - Website Fingerprinting project

2014-03-12 Thread George Kadianakis
Roger Dingledine a...@mit.edu writes: On Mon, Mar 10, 2014 at 06:00:13PM +0100, Marc Juarez wrote: I'm a PhD student at COSIC (COmputer Security and Industrial Cryptography) in KU Leuven, Belgium. My research topic is related to network traffic analysis and I'm now focused in the more

<    1   2   3   4   5   >