Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)

2016-01-17 Thread coderman
On 1/14/16, Virgil Griffith wrote: > In our quantifications of relay diversity, knowing the IP addresses that > traffic exits from is important. Ways to have this information correctly > reported would be very helpful. i want to be very clear: asking relays to report their public exit IPs in cen

Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)

2016-01-13 Thread coderman
On 1/13/16, grarpamp wrote: > On Tue, Jan 12, 2016 at 9:58 AM, coderman wrote: >> ... only question is who would have a >> compelling use for separating outbound OR connections and outbound >> Exit traffic, as per #17975? > > Bandwidth peering contracts preferential

Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)

2016-01-12 Thread coderman
On 1/12/16, Tim Wilson-Brown - teor wrote: > ... > The current tor implementation simply calls connect() if OutBoundBindAddress > is not set for the destination address family. > This means that the connection will be made from a source address based on > the routing table entry for the destinatio

Re: [tor-dev] tor callgrinds

2015-08-21 Thread coderman
On 2/16/07, Christopher Layne wrote: > Thought you guys might find this interesting. I did a couple of callgrind > runs ... yes, really back to 2007 to find a callgrind on a relay. does anyone have a more recent profile of a busy relay, by chance? if none exist, what do i need to bribe you with

Re: [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)

2015-07-24 Thread coderman
On 7/24/15, Yawning Angel wrote: > ... > I have less objections towards people using tor-fw-helper for bridges > than for something like flashproxy or full fledged relays. > ... > IMO similar to relays with insufficient bandwidth, relays that can't > connect to any other relay on demand as require

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-06-12 Thread coderman
On 5/2/15, coderman wrote: > ... > we're soliciting feedback as part of a go / no-go decision on > continuing this effort. > > in particular, the design is intended to meet the scrutiny of Nick M., > Roger, and Mike P. as the focus on support for Tor Browser and Tor on

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-06 Thread coderman
On 5/4/15, Mike Perry wrote: > ... > In my opinion, the most interesting use case for these devices is where > Tor Launcher implements a peering mechanism whereby the user can click a > button at some point in the initial connection wizard that says "My > Router Knows My Tor Configuration." hi Mi

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-04 Thread coderman
On 5/4/15, Mike Perry wrote: > ... > In my opinion, the most interesting use case for these devices is where > Tor Launcher implements a peering mechanism whereby the user can click a > button at some point in the initial connection wizard that says "My > Router Knows My Tor Configuration." > > Wh

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-04 Thread coderman
On 5/4/15, coderman wrote: > ... > this deserves a longer answer, but you're right. if the attacker is > using Tor itself a Tor enforcing gateway can't protect against those > attacks. i have updated the document to make this more clear. it is hard to express the nuance

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-04 Thread coderman
On 5/4/15, Leif Ryge wrote: > ... > So, unlike a transparent tor router, this system is not intended to prevent > malicious software on client computers from being able to learn the client > computer's location, right? hello Leif! this deserves a longer answer, but you're right. if the attacker

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-04 Thread coderman
On 5/3/15, teor wrote: > ... > Some users will want as little logging as possible, as it can lead to > privacy leaks if the device is compromised - may I suggest you turn it off > by default? you are correct; the default should be no logging. i have updated the document, and noted that any loggin

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-03 Thread coderman
On 5/3/15, warms0x wrote: > ... > I am bored so I figured I would read this big document, here are some > comments from somebody who took the time to care: thanks! :) > 1.3 > Warning conditions: > > Is the "Client privacy leak detected" meaning the software would warn > in the case of a LAN cl

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-03 Thread coderman
On 5/3/15, intrigeri wrote: > ... > Just to clarify, the threat model explicitly doesn't include "Attacker > is able to reconfigure Tor on a client system to use an arbitrary set > of bridges", right? correct. neither bridges nor pluggable transports are supported. i have added a FAQ entry for t

[tor-dev] design for a Tor router without anonymity compromises

2015-05-02 Thread coderman
a friend and i are working on a Tor router design that doesn't compromise anonymity for convenience. [0][1][2][3][4] we're soliciting feedback as part of a go / no-go decision on continuing this effort. in particular, the design is intended to meet the scrutiny of Nick M., Roger, and Mike P. as

Re: [tor-dev] Trivial patch: avoid redundant calls to ENGINE_register_all_complete

2013-12-19 Thread coderman
On Wed, Dec 18, 2013 at 7:05 PM, Nick Mathewson wrote: > ... Is there any actual harm in the redundant invocation of > ENGINE_register_all_complete(), or is this about cleanliness/saving > cycles/something else? > > Assuming it's not actually harmful, I'd prefer to leave the call in, > with a comm

Re: [tor-dev] Trivial patch: avoid redundant calls to ENGINE_register_all_complete

2013-12-18 Thread coderman
, On Wed, Dec 18, 2013 at 9:57 AM, coderman wrote: > hello all, Nick, > > per the other thread in tor-talk about RDRAND, this is the minor fix > for OpenSSL 1.0.1+ mentioned. > > i don't know that this is useful, and i am still giving the engine > code a thorough review

[tor-dev] Trivial patch: avoid redundant calls to ENGINE_register_all_complete

2013-12-18 Thread coderman
hello all, Nick, per the other thread in tor-talk about RDRAND, this is the minor fix for OpenSSL 1.0.1+ mentioned. i don't know that this is useful, and i am still giving the engine code a thorough review per Nick's other feedback: "Above all, do not assume that you understand how OpenSSL works

Re: [tor-dev] Apple App Store Redux

2013-12-09 Thread coderman
On Sat, Nov 16, 2013 at 3:58 PM, Erinn Clark wrote: > ... > I tried to get the licensing agreements earlier this year and they are, as far > as I can tell, not available until you actually sign up. If someone reading > this has put something in the app store (which may or may not be different > f

Re: [tor-dev] Attentive Otter: Analysis of xmpp-client

2013-10-08 Thread coderman
On Tue, Oct 8, 2013 at 8:40 PM, Watson Ladd wrote: > ... > The _easy_ fix is to make go.crypto constant time, "You Keep Using That Word, I Do Not Think It Means What You Think It Means" ___ tor-dev mailing list tor-dev@lists.torproject.org https://list

Re: [tor-dev] Tor bufferbloat

2012-09-05 Thread coderman
On Wed, Sep 5, 2012 at 11:52 AM, David Goulet wrote: > ... the problem of "bufferbloat" which is encountered in network > bottlenecks. > > https://en.wikipedia.org/wiki/Bufferbloat > http://www.bufferbloat.net/ yup. particularly bad at the edges... > Anyhow, I looked around for some recent stud

Re: [tor-dev] SHA-3 isn't looking so hot to me (was: Draft sketch document with ideas for future crypto ops)

2011-11-01 Thread coderman
On Tue, Nov 1, 2011 at 1:20 PM, Zooko O'Whielacronx wrote: > ... > Therefore, in the context of whether we can expect SHA-3 and/or > SHA-256 circuits to come built into our chips in the future, the fact > that SHA-256 can be implemented in a smaller circuit means it would be > cheaper for a chip m

Re: [tor-dev] Running Real Tor Code Over Simulated Networks

2011-10-13 Thread coderman
On Tue, Sep 27, 2011 at 4:20 PM, Rob Jansen wrote: > ... > For the unaware, we have been working on the design and development of > Shadow, a simulator capable of running real binaries over a simulated > network, and a plug-in that runs real Tor. Shadow can simulate roughly 1000 > Tor nodes in 10

Re: [tor-dev] Tor and slow DOS attacks

2011-08-24 Thread coderman
On Wed, Aug 24, 2011 at 12:21 PM, Georg Koppen wrote: > ... > [blah blah] about the rise of slow DOS attacks and that Tor could play > an important role in it > ... I am wondering whether there is already some > effort under way to detect and ban such kind of traffic. Or should there > be such eff

Re: [tor-dev] Tor and BGP integration

2011-06-28 Thread coderman
On Thu, Jun 9, 2011 at 2:34 PM, Jacob Appelbaum wrote: > ... > We need a proposal for a circuit selection process that is BGP aware. I > guess we'll need it around the time that we want to support IPv6 entirely... why stop at BGP? at that point, might as well pay for a telegeography subscription