Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2013-12-12 Thread Nicholas Hopper
/discussion from the tor-dev community ahead of publishing this as a Tor Project tech report. -- ---- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Minnesota Visiting Re

Re: [tor-dev] On the security of a commit-and-reveal solution for #8244

2013-12-12 Thread Nicholas Hopper
t a random group element Q, and publishes a signed document containing the decryption shares and Q. -- Nicholas Hopper Associate Professor, C

Re: [tor-dev] (Draft) Proposal 224: Next-Generation Hidden Services in Tor

2013-12-16 Thread Nicholas Hopper
n solve the DDH problem in the Curve25519 group. This property could be useful depending on the eventual scaling designs supported. (There is a typo that confused me several paragraphs later: s/faileds/fields/ ) -- Nichola

Re: [tor-dev] On the security of a commit-and-reveal solution for #8244

2014-01-10 Thread Nicholas Hopper
On Thu, Dec 12, 2013 at 11:11 PM, Nicholas Hopper wrote: > Your analysis looks correct to me. But what's wrong with using > threshold crypto or secret sharing? Since you're already assuming > some sort of bounded delay synchronization, I think we can eliminate > any advant

Re: [tor-dev] A threshold signature-based proposal for a shared RNG

2014-01-17 Thread Nicholas Hopper
On Fri, Jan 10, 2014 at 1:07 PM, Ian Goldberg wrote: > On Fri, Jan 10, 2014 at 10:38:06AM -0600, Nicholas Hopper wrote: >> We'll need a hash function H that can output elements of the subgroup >> generated by B with unknown discrete logarithms. For Curve25519, it >>

Re: [tor-dev] Estimating Traffic Correlation Attack ?

2014-01-21 Thread Nicholas Hopper
conf/ccs/EdmanS09.pdf ---- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Minnesota Visiting Research Director, The Tor Project ___ tor

Re: [tor-dev] A threshold signature-based proposal for a shared RNG

2014-01-21 Thread Nicholas Hopper
when parties claim *not* to have received messages from others. (e.g. imagine that floor(n/2) authorities are corrupted and claim that an uncorrupted party did not send them any input) -- ---

Re: [tor-dev] Key revocation in Next Generation Hidden Services

2014-01-29 Thread Nicholas Hopper
y authorities... [1] http://freehaven.net/anonbib/bibtex.html#ccs09-shadowwalker [2] http://freehaven.net/anonbib/bibtex.html#ccs09-torsk [3] http://freehaven.net/anonbib/bibtex.html#camenisch2002da for example. -- -------- Ni

Re: [tor-dev] [Discussion] 5 ^H 3 hops rendezvous circuit design

2014-02-11 Thread Nicholas Hopper
n connection attempts. This sounds like a great way to DoS your least favorite hidden service at low cost. -- ---- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Minnesota

Re: [tor-dev] Guard node security: ways forward (An update from the dev meeting)

2014-02-25 Thread Nicholas Hopper
guard threshold" becomes an interesting attack. Another thought: we also should investigate how various thresholds affect the relationship between the cumulative guard weight total and the total exit weight. -- ---- Nicholas

Re: [tor-dev] Guard node security: ways forward (An update from the dev meeting)

2014-02-25 Thread Nicholas Hopper
On Tue, Feb 25, 2014 at 5:04 PM, Nicholas Hopper wrote: > Another thought: we also should investigate how various thresholds > affect the relationship between the cumulative guard weight total and > the total exit weight. Well, that turns out not to be a real issue: even if we set

Re: [tor-dev] Implications of switching to a single guard node: some conclusions

2014-03-25 Thread Nicholas Hopper
the threshold beyond 2MB/s doesn't really help much) (This data is based on the consensus documents from 13 February 2014, chosen pretty much arbitrarily from the most recent month of archived consensus documents and relay descriptors) -- ---

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-03-26 Thread Nicholas Hopper
ion period, then its weight for some other position should be k*(weight with the guard flag) + (1-k)*(weight without the guard flag) -- Nich

Re: [tor-dev] Implications of switching to a single guard node: some conclusions

2014-03-26 Thread Nicholas Hopper
;t have any way to simulate the CBT logic: http://torps.github.io/ -- -------- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Mi

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-07 Thread Nicholas Hopper
ndwidth for these connections. But if a relay has only fraction k of its "guard bandwidth" used up this way, then (1-k) of this bandwidth should go back into the pool for other positions. I think that's what the formula does, but I could have it wrong. Does that make sense? --

Re: [tor-dev] Proposal 230: How to change RSA1024 relay identity keys

2014-04-08 Thread Nicholas Hopper
possible a relay operator could shoot themselves in the foot here by causing some inconsistent state between these three files. I guess at worst, though, this should again be a case where the window of vulnerability is small, so very few (or possibly no) relays would lose their history this way. --

Re: [tor-dev] Proposal 230: How to change RSA1024 relay identity keys

2014-04-09 Thread Nicholas Hopper
On Tue, Apr 8, 2014 at 2:15 PM, Nicholas Hopper wrote: > To clarify here: does "router[s] descriptors signed by the old > identity" include the old-id field? That is, in case an identity key > is compromised is there a race to claim the old-id mapping? If not, > how

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-11 Thread Nicholas Hopper
been a guard for 0.25 of the rotation period => 0.25 of the clients weight the relay as a guard." Since we don't actually want to partition the network this way, the (weighted) average of the two weights will produce the same behavior. -- -----

Re: [tor-dev] [RFC] Proposal draft: The move to a single guard node

2014-04-17 Thread Nicholas Hopper
guard-node.patch -- ---- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Minnesota Visiting Research Director, The Tor Project ___

Re: [tor-dev] Proposal 236, Single-guard designs, and directory guards

2014-05-06 Thread Nicholas Hopper
ests through circuit guards to avoid this? -- ---- Nicholas Hopper Associate Professor, Computer Science & Engineering, University of Minnesot

Re: [tor-dev] Hidden Service Scaling

2014-05-06 Thread Nicholas Hopper
#x27;t learn what HS it's serving if it doesn't know the descriptor, but any HS server that knows the secret key (x) can compute the IP secret key x*t. -- Nicholas Ho

Re: [tor-dev] Proposal 236, Single-guard designs, and directory guards

2014-06-06 Thread Nicholas Hopper
clients by enabling the DirPort option.". This would make sense, but note that nothing in the config file tells a relay that it's a guard. So it won't notice this without looking for its entry in the network status. -- --

Re: [tor-dev] Proposal 236 and the guardiness of a guard

2014-07-31 Thread Nicholas Hopper
5], so their weight percentage gets smaller. This doesn't sound right - total guard weight shouldn't change. All the proposal does is re-allocate some fraction of the weight of a guard back to the middle (M) category. -- ---

Re: [tor-dev] Easy research tasks

2015-01-06 Thread Nicholas Hopper
k at http://www.cs.okstate.edu/~chantin/ARES2013.pdf before working further on this topic. -- -------- Nicholas Hopper Associate Professor, Computer Science & E

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-15 Thread Nicholas Hopper
This proposal doubles the default number of IPs and reduces the "cost" of being an IP since the probability of being selected is no longer bandwidth-weighted. Is this a fair tradeoff for the performance improvement? -- ---

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-20 Thread Nicholas Hopper
only local changes in the topology, so if the client is using a different version of the consensus they can still locate one of the responsible HSDirs. (Note: I do not claim this cannot be done; it just seems like an important detail to sort out...) -- -------

Re: [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points

2015-07-27 Thread Nicholas Hopper
r each location, track how many distinct relays would be responsible for that location for one calendar day. The simulation was run for 7/1/15 through 7/7/15. With Aaron's algorithm, the average hash ring location mapped to 9.96 disti

Re: [tor-dev] Proposal 300: Walking Onions: Scaling and Saving Bandwidth

2019-02-06 Thread Nicholas Hopper
quot; but not a >"consensus directory", since it doesn't list any relays.) > > > 4. Putting it all together > >[This is the section where, in a later version of this proposal, I >would specify the exact behavior and data formats to be used here. >Right now, I'd say we'

Re: [tor-dev] [RFC] Proposal: "Res tokens: Anonymous Credentials for Onion Service DoS Resilience"

2021-02-11 Thread Nicholas Hopper
could choose a key to match another issuer's keys) Because you can generate an RSA key with a targeted most- or least-significant bytes value in roughly the same amount of work that it takes to