Re: [tor-talk] Tor and solidarity against online harassment

2014-12-11 Thread Gregory Maxwell
On Thu, Dec 11, 2014 at 10:07 PM, Roger Dingledine a...@mit.edu wrote: I'd like to draw your attention to https://blog.torproject.org/blog/solidarity-against-online-harassment https://twitter.com/torproject/status/543154161236586496 One of our colleagues has been the target of a sustained

Re: [tor-talk] Tor and solidarity against online harassment

2014-12-11 Thread Gregory Maxwell
On Thu, Dec 11, 2014 at 11:04 PM, Ted Smith te...@riseup.net wrote: This sounds like a very flaky reason to be not okay with a denouncement of online harassment. You might want to reconsider the communities you're a member of, if they have to look for reasons so hard for why a commitment

Re: [tor-talk] Propsal for decentralization of the Tor network

2014-11-23 Thread Gregory Maxwell
On Mon, Nov 24, 2014 at 1:07 AM, bm-2cuqbqhfvdhuy34zcpl3pngkplueeer...@bitmessage.ch wrote: I have carefully checked trac and torproject.org website for proposals, seen many interesting ones but not a single one to decentralize the Tor network from the direcotry authorities. There are many ways

Re: [tor-talk] Propsal for decentralization of the Tor network

2014-11-23 Thread Gregory Maxwell
On Mon, Nov 24, 2014 at 3:03 AM, Cari Machet carimac...@gmail.com wrote: prove decentralization creates vulnerability to a larger degree than centralization You haven't specified the decentralization mechanism. So I guess I get to pick? Okay. Instead of believing the directory authority

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-29 Thread Gregory Maxwell
On Mon, Oct 27, 2014 at 11:19 PM, Seth David Schoen sch...@eff.org wrote: First, the security of hidden services among other things relies on the difficulty of an 80-bit partial hash collision; even without any new mathematical insight, that isn't regarded by NIST as an adequate hash So? 80

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...))

2014-06-29 Thread Gregory Maxwell
On Sun, Jun 29, 2014 at 5:58 PM, Seth David Schoen sch...@eff.org wrote: I wonder if there's a way to retrofit high-latency hidden services onto Tor -- much as Pond does, but for applications other than Pond's messaging application. [...] Then a question is whether users would want to use a

Re: [tor-talk] Satori (this crazy app thing I've been working on)

2014-05-08 Thread Gregory Maxwell
On Sun, May 4, 2014 at 5:14 PM, Griffin Boyce grif...@cryptolab.net wrote: Hey all, So Satori is this app for Google Chrome that distributes circumvention software in a difficult-to-block way and makes it easy for users to check if it's been tampered with in-transit. You might be

[tor-talk] Improved HS key management

2013-12-28 Thread Gregory Maxwell
One of the current unfortunate properties of hidden services is that the identity of the hidden service is its public key (or the equivalent hash, in the current setup), and this key must always be available for signing on an online host (usually the HS itself, though potentially on a bastion

[tor-talk] Vanity onion attacks

2013-12-28 Thread Gregory Maxwell
With the advent of super fast onion address generators it's become not too uncommon for hidden services to use vanity addresses, but this seems to have brought about some vanity attacks where people grind out lookalike addresses to setup fake sites. People then do a poor job visually comparing

Re: [tor-talk] Improved HS key management

2013-12-28 Thread Gregory Maxwell
On Sat, Dec 28, 2013 at 1:15 PM, grarpamp grarp...@gmail.com wrote: On Sat, Dec 28, 2013 at 6:46 AM, Gregory Maxwell gmaxw...@gmail.com wrote: One of the current unfortunate properties of hidden services is that the identity of the hidden service is its public key (or the This is pretty bad

Re: [tor-talk] x.509 for hidden services

2013-10-27 Thread Gregory Maxwell
On Sun, Oct 27, 2013 at 1:08 PM, Andrea Shepard and...@torproject.org wrote: For defense in depth on the HS side, it's best to run the HS Tor on a different machine, or at least a different VM, than the HS server, so that if the HS server software is owned, the HS private key isn't

Re: [tor-talk] x.509 for hidden services

2013-10-26 Thread Gregory Maxwell
On Sat, Oct 26, 2013 at 12:57 AM, grarpamp grarp...@gmail.com wrote: I believe torchat does this IIRC, torchat is just doing a bidirectional secret passing pingpong between clients behind the HS addresses, no actual x509 stuff. There's a good paper on it. Link please. :) At least in one

[tor-talk] x.509 for hidden services

2013-10-25 Thread Gregory Maxwell
==Background== (you can skip to the Tor section if you don't care) The Bitcoin universe is in the process of creating a specification for digital invoices called the bitcoin payment protocol. (More info: https://bitcointalk.org/index.php?topic=300809.msg3225143#msg3225143) The payment protocol

Re: [tor-talk] NIST approved crypto in Tor?

2013-09-08 Thread Gregory Maxwell
On Sat, Sep 7, 2013 at 8:09 PM, Gregory Maxwell gmaxw...@gmail.com wrote: On Sat, Sep 7, 2013 at 4:08 PM, anonymous coward anonymous.cow...@posteo.de wrote: Bruce Schneier recommends *not* to use ECC. It is safe to assume he knows what he says. I believe Schneier was being careless

Re: [tor-talk] NIST approved crypto in Tor?

2013-09-07 Thread Gregory Maxwell
On Sat, Sep 7, 2013 at 4:08 PM, anonymous coward anonymous.cow...@posteo.de wrote: Bruce Schneier recommends *not* to use ECC. It is safe to assume he knows what he says. I believe Schneier was being careless there. The ECC parameter sets commonly used on the internet (the NIST P-xxxr ones)

Re: [tor-talk] HS drop

2013-08-11 Thread Gregory Maxwell
On Sun, Aug 11, 2013 at 2:53 PM, mirimir miri...@riseup.net wrote: Have you accumulated a list of all hidden services using spiders etc? The address space of all possible hidden services (36! = 3.72e+41) is far^N too large to scan, right? ;) Unfortunately, due to mildly design limitations in

Re: [tor-talk] HS drop

2013-08-11 Thread Gregory Maxwell
On Sun, Aug 11, 2013 at 5:20 PM, Griffin Boyce griffinbo...@gmail.com wrote: And if you spider them based on links and onion search engines, you can get a decent idea of active hidden services. But I'd still like to No need to do this.

Re: [tor-talk] Is Tor still valid?

2013-08-06 Thread Gregory Maxwell
On Mon, Aug 5, 2013 at 11:41 PM, intrigeri intrig...@boum.org wrote: mirimir wrote (06 Aug 2013 05:46:37 GMT) : If this exploit had included a Linux component, Tails would not have protected you. I've not studied the attack code but this appears to be mostly correct. I believe it would have

Re: [tor-talk] BitMail 0.1 - p2p Email

2013-07-30 Thread Gregory Maxwell
On Tue, Jul 30, 2013 at 6:07 AM, krishna e bera k...@cyblings.on.ca wrote: On 13-07-30 12:47 AM, Thomas Asta wrote: http://bitmail.sourceforge.net/ No design, no specs, no discussion, no docs. A feature list that looks remarkably like GoldBug, And source code that looks remarkably like

Re: [tor-talk] Network diversity [was: Should I warn against Tor?]

2013-07-19 Thread Gregory Maxwell
On Fri, Jul 19, 2013 at 9:45 AM, adrelanos adrela...@riseup.net wrote: Seems like high latency mix networks failed already in practice. [1] Can't we somehow get confidence even against a global active adversary for low latency networks? Someone start a founding campaign? So have low latency

Re: [tor-talk] Network diversity [was: Should I warn against Tor?]

2013-07-19 Thread Gregory Maxwell
On Fri, Jul 19, 2013 at 8:35 AM, Jens Lechtenboerger tort...@informationelle-selbstbestimmung-im-internet.de wrote: [For those who are confused about the context of this: I started the original thread. A write-up for my motivation is available at [0].] I Links to my code and a README.txt

Re: [tor-talk] CloudFlare

2013-04-18 Thread Gregory Maxwell
On Thu, Apr 18, 2013 at 2:51 PM, grarpamp grarp...@gmail.com wrote: Though sure, I do suggest and accept that Tor may present a different *class* of abuse than other categories of abusable IP's. Tor exits were not banned prior to their use for abuse. At the point automated exitlist banning was

Re: [tor-talk] Deterministic Builds - was: Bridge Communities?

2013-04-13 Thread Gregory Maxwell
On Sat, Apr 13, 2013 at 8:44 PM, adrelanos adrela...@riseup.net wrote: I assume you're the Gregory Disney who is also one builder of those Bitcoin deterministic builds? Since you're involved in Tor as well, I seems to me you could be a great help by providing some information about the Bitcoin

Re: [tor-talk] NSA supercomputer

2013-04-05 Thread Gregory Maxwell
On Fri, Apr 5, 2013 at 6:51 AM, Andrew F andrewfriedman...@gmail.com wrote: I would love to see an analysis of a 128 bit AES encryption VS a 10 exoflop computer. How long to crack it? Anyone got the math on this? [...] So what does this mean? Any article that suggest that brute forcing

[tor-talk] Reduced latency transport for TOR

2012-11-08 Thread Gregory Maxwell
This work could be _very_ productive for future transport for TOR: https://www.usenix.org/conference/nsdi12/minion-unordered-delivery-wire-compatible-tcp-and-tls As opposed to a raw datagram transport it still gets through the firewalls and nats that TCP/TLS does and still looks like HTTPS to

Re: [tor-talk] Hidden Services

2012-09-19 Thread Gregory Maxwell
On Wed, Sep 19, 2012 at 1:36 AM, grarpamp grarp...@gmail.com wrote: People use robots.txt to indicate that they don't want their site to be added to indexes. And if a site is so concerned about someone else publishing a link, however obtained, then they should name it something innocent and

Re: [tor-talk] How dangerous are DNS leak?

2012-09-18 Thread Gregory Maxwell
On Tue, Sep 18, 2012 at 9:13 AM, adrelanos adrela...@riseup.net wrote: Jerzy Łogiewa: How dangerous are the DNS leak for some user? Very dangerous! http://www.howdoihidemyip.com/dnsleak.htm The DNS leak provides your ISP name and location to the website that you are visiting, thus

Re: [tor-talk] How dangerous are DNS leak?

2012-09-18 Thread Gregory Maxwell
[bouncing back to the list because I think it's useful] On Tue, Sep 18, 2012 at 12:10 PM, Paul Syverson syver...@itd.nrl.navy.mil wrote: On Tue, Sep 18, 2012 at 11:21:13AM -0400, Gregory Maxwell wrote: On Tue, Sep 18, 2012 at 11:01 AM, Paul Syverson syver...@itd.nrl.navy.mil wrote: Logic

Re: [tor-talk] Tor as ecommerce platform

2012-08-11 Thread Gregory Maxwell
On Sat, Aug 11, 2012 at 1:54 PM, Mike Perry mikepe...@torproject.org wrote: But from the paper, it sounds like the BTC flow to Silk Road itself is quite large and might be measurable or at least can be approximated from the website itself... [snip] Unless I understood the paper, their

Re: [tor-talk] Tor as ecommerce platform

2012-08-10 Thread Gregory Maxwell
On Fri, Aug 10, 2012 at 10:11 PM, Ted Smith te...@riseup.net wrote: The obvious problem with this (((this, right here, is the productive contribution to discussion this email has: it points out the problem with your proposed methodologies))) is that it presumes that these top 50 .onion domains

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Gregory Maxwell
On Wed, Jul 11, 2012 at 2:30 PM, Rejo Zenger r...@zenger.nl wrote: Hi, - You get transparent, free end to end encryption. No flawed root CA system. Just curious, maybe I am overlooking something: how would this be better than a self-signed and self-generated certificate (apart from the user

Re: [tor-talk] hidden service on same location as public service

2012-07-09 Thread Gregory Maxwell
On Mon, Jul 9, 2012 at 5:23 PM, t...@lists.grepular.com wrote: Exit enclaves no longer work - https://trac.torproject.org/projects/tor/wiki/doc/ExitEnclave Bummer, they still work on old nodes (or at least I just tested and it works for me). I liked them for unloading exists and narrowing the

Re: [tor-talk] HTTPS to hidden service unecessary?

2012-07-09 Thread Gregory Maxwell
On Mon, Jul 9, 2012 at 7:41 PM, proper tor...@riseup.net wrote: HS + SSL makes sense: I was under the impression that browsers had generally stronger cookie and cross domain policies for SSL sessions but maybe I'm imagining things. ___ tor-talk mailing

Re: [tor-talk] Anonymous Publishing Is Dead.

2012-07-01 Thread Gregory Maxwell
On Sat, Jun 30, 2012 at 4:15 PM, Anonymous Person anonymousperso...@in.com wrote: I know it is dead, because I have tried to do it, and I can assure you it is dead. I had a similar experience. When I decided to publish a large collection (30gb) of previously paywalled (but public domain)

Re: [tor-talk] blocked exit node IP because of spam

2012-07-01 Thread Gregory Maxwell
On Sun, Jul 1, 2012 at 11:48 PM, grarpamp grarp...@gmail.com wrote: Do NOT penalize those who need multiple random unlinked accounts by blocking ip's, making up nym systems, etc. Penalize the accounts that act up. They are the bad ones, not the former. It's this kind of thinking that will

Re: [tor-talk] [Bitcoin-development] Tor hidden service support

2012-06-27 Thread Gregory Maxwell
On Wed, Jun 27, 2012 at 2:33 AM, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote: Is bitcoin software going to incorporate tor binaries within the application standard application There are no plans to do this currently. Maybe it makes sense, but I'm somewhat doubtful about that.

Re: [tor-talk] Forbes article: Tor and Bitcoin

2012-06-21 Thread Gregory Maxwell
On Thu, Jun 21, 2012 at 11:51 PM, grarpamp grarp...@gmail.com wrote: http://www.forbes.com/sites/jonmatonis/2012/06/19/torwallet-sparks-trust-without-jurisdiction-debate/ A word to the wise: Perhaps this is an earnest effort, but it's impossible to tell. From appearances it is indistinguishable

Re: [tor-talk] Data storage in cached-descriptors

2012-05-30 Thread Gregory Maxwell
On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote: So basically on top of Tor software and Tor Infrastructure it would be possible to build other kind of networks, given that they participate to the Tor network itself. And the directory authorities could

Re: [tor-talk] Tor's critique of Ultrasurf: A reply from the Ultrasurf developers

2012-04-18 Thread Gregory Maxwell
On Wed, Apr 18, 2012 at 5:54 AM, Tichodroma tichodr...@posteo.de wrote: Hi, might be of interest: http://ultrasurf.us/Ultrasurf-response-to-Tor-definitive-review.html This is of more interest then their 'response' itself:

Re: [tor-talk] Choosing a name for a .onon

2012-03-29 Thread Gregory Maxwell
On Thu, Mar 29, 2012 at 6:47 PM, Adrian Crenshaw irong...@irongeek.com wrote: Hi all,   I was under the impression that the .onion names for Tor Hidden Services were pseudo-random based on the public key. How was someone able to choose one/choose some character in one? As an example:

Re: [tor-talk] Tor security on EC2

2012-02-04 Thread Gregory Maxwell
On Sat, Feb 4, 2012 at 8:09 PM, Marco Gruß k...@kork.dyndns.org wrote: with https://cloud.torproject.org/ actively promoting it, I have been thinking about Tor vs. EC2 for a while. I'm unqualified to say anything about the specific questions wrt VM system security... but I thought it might be

Re: [tor-talk] On the arm race with chinese

2012-01-09 Thread Gregory Maxwell
On Mon, Jan 9, 2012 at 6:39 PM, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote: the funny things is that they are among us. Most probably the guy that wrote the Chinese Tor protocol probe is subscribed to that mailing list. And now he feel observed. He's welcome to send patches to evade

Re: [tor-talk] Hoax?

2012-01-08 Thread Gregory Maxwell
On Sun, Jan 8, 2012 at 12:59 PM, hi...@safe-mail.net wrote: I guess it's just a matter of weeks or a few months before the bomb blows. Perhaps this list should be moderated to at least filter out the crackpots/disinformationists that are hardly even trying? :-/ This sort of trash isn't worth

Re: [tor-talk] Deterministic builds?

2012-01-05 Thread Gregory Maxwell
On Thu, Jan 5, 2012 at 6:15 AM, Jacob Appelbaum ja...@appelbaum.net wrote: [snip] If anyone has thoughts on the matter, we'd love to hear how Tor as a project should tackle verifiable builds of the various software we ship. This isn't generally a challenge which is unique to Tor, though the

Re: [tor-talk] Is Taking Checksum of Packet Payloads a Vulnerability?

2011-12-17 Thread Gregory Maxwell
On Sat, Dec 17, 2011 at 11:49 AM, Daniel Cohen danielc...@gmail.com wrote: Is this a problem with Tor's architecture? If so, has this issue already been addressed? You're mistaking the normal purpose of entry nodes. Normally if Alice is using Tor then she is running it herself. If she is

Re: [tor-talk] How important is it that the MyFamily option be set correctly?

2011-12-05 Thread Gregory Maxwell
On Mon, Dec 5, 2011 at 7:36 PM, Pascal pascal...@users.sourceforge.net wrote: Note that it does not hurt a server to have itself listed in MyFamily. The easiest way to maintain this line is to make a list of all your servers and paste that line verbatim on all of your servers. But it's N^2

Re: [tor-talk] Don't use Google as default search in Tor Browser?

2011-11-04 Thread Gregory Maxwell
On Fri, Nov 4, 2011 at 10:54 AM, Christian Siefkes christ...@siefkes.net wrote: How should using Google as search engine comprise your anonymity? Either you're anonymous, then you're anonymous on Google too. Or you aren't anonymous, then avoiding Google won't help you. Anonymity is not an

Re: [tor-talk] Rumors of Tor's compromise

2011-10-26 Thread Gregory Maxwell
On Wed, Oct 26, 2011 at 4:29 PM, Julian Yon jul...@yon.org.uk wrote: If you're not using a pseudonym and paying by cash in sealed envelopes through a postal proxy, wearing disposable gloves in a clean room to avoid forensic evidence, then you could be traced. Whether this is likely depends on

Re: [tor-talk] Legal or not on monitoring traffic at a Tor exit?

2011-10-23 Thread Gregory Maxwell
On Sun, Oct 23, 2011 at 8:42 PM, Xinwen Fu xinwe...@gmail.com wrote: I'm a bit curious about the legal issue on monitoring traffic at a Tor exit? Is monitoring Tor traffic at an exit legal? Since the traffic passes my computer, seems of course I can monitor it or even change it. When people

Re: [tor-talk] Tor spying

2011-09-07 Thread Gregory Maxwell
On Wed, Sep 7, 2011 at 10:21 PM, Indie Intel d577a...@yahoo.com wrote: Apparently people are spying on Tor users by setting up their own exit nodes and sniffing traffic?! For some reason the moral standards people abide to online are unlike the ones they'd apply in other contexts. I'm

Re: [tor-talk] Making TOR exit-node IP address configurable

2011-03-09 Thread Gregory Maxwell
On Wed, Mar 9, 2011 at 1:23 PM, Fabio Pietrosanti (naif) li...@infosecurity.ch wrote: Hi all, i've been thinking and playing a lot about the various possible risk mitigation scenarios for TOR exit node maintainer. Now i need to be able to pass all web traffic trough a transparent proxy in