Hi everyone,
I've been working on:
- Making tor connect to the pt combiner directly instead of connecting
to the first pt as it did before. Now when tor sends a socks request to the
combiner, the socks request is intercepted and a connection is made to the
first pt instead of the requested bridge. The last pt has its destination
set as the original requested bridge address so when the last pt is
finally given the data to obfuscate, it will forward it to the
actual bridge.
- Added a configuration file reader to the pt combiner server
- Turned the obfs3_flashproxy method into a configuration file and set
it as the default configuration file if one is not specified.
- Worked on rearranging the project structure into a python and go
project [0]
You can see my progress at [1]
[0] https://trac.torproject.org/projects/tor/ticket/12215
[1] https://github.com/infinity0/obfs-flash
> Hi Damian! I'm trying to make this work under your suggestions, but I'm not
> entirely clear how. Can you help me get this in shape to pass your muster?
Hi Virgil, I'd be glad to! Adding tor-dev@ back in case others have
thoughts on the details. I like your idea, what I was trying to hint
by asking about the motivation was that the proposal should clearly
explain why we're doing this (with example use cases).
As for detail, I mean the proposal should have text we can copy and
paste into the dir-spec. Maybe something like...
============================================================
The following would be added to section 2.1.2 of the dir-spec
(Extra-info document format):
"X-" CustomKey SP CustomValue NL
CustomKeyChar = ALPHA / DIGIT / "_" / "-"
CustomKey = 1*20 CustomKeyChar
CustomValueChar = atext / SP
CustomValue = 1*200 CustomValueChar
Custom field that can appear multiple times, for example...
X-bitcoin 19mP9FKrXqL46Si58pHdhGKow88SUPy1V8
X-gravatar https://s.gravatar.com/avatar/d27fce46c9ac41a41bb52455ae75701d
X-favoritequote Be excellent to each other. Party on dudes!
X-foo bar
A CustomKey cannot appear more than once, and there cannot be more
than ten of these entries.
============================================================
As a controller library author what I want from proposals is enough
detail so I know *exactly* how to parse new additions. There's lot of
potential edge cases. Can values be an empty string? How about keys?
What should we do if a key appears multiple times? Is that valid? You
mentioned a 5 KB limit, is that per option or for all custom fields?
Rather than a size threshold, in the above I'm proposing a limit of
ten entries each of which can be at most 220 characters. That would
only be 2 KB so feel free to tweak these limitations.
I'm not entirely sure 'atext' is what we want here. This would exclude
tabs, but maybe that's not such a bad thing. You can look it up on...
http://www.ietf.org/rfc/rfc2822.txt
Cheers! -Damian
Hi all,
I've written most of the new weather's backend a.k.a the notification
scripts that run hourly(LowBandwidth, Nodedown) and daily(Welcome, Tshirt)
as cron jobs and this is how they essentially operate:
1. Fetch and parse required documents from Onionoo.
2. Filter out required relays(e.g 'running', 'stable' flagged for welcome
email).
3. For each filtered relay:
3.a. For each notification type:
3.a.a. Query the corresponding subscription model to get subscribers'
info.
3.a.b. Collect the email(to, from, subject, content) to be sent.
4. Send out the collected mass email.
5. Delete old entries and/or update the django models.
I happened to make some changes the onionoo-wrapper module in this process
by modifying the response objects, utilities etc. The current version with
all the changes is available at
https://github.com/lucyd/tor-weather/tree/backend. After fixing a couple of
issues, I setup the vagrant+puppet environment that was previously
configured(#11417). I tested out the notification scripts and although the
daily script is working fine, the hourly script is giving a couple of
errors for now. I plan on fixing these pretty soon and testing the overall
weather to make sure everything's working fine.
Cheers,
Sreenatha
Hello everyone,
This is the thid status report of my Google Summer of Code project,
which is to implement consensus diffs for Tor. We hold weekly meetings
every Wednesday at 14h UTC with the project mentors Nick and Sebastian.
Two weeks ago I sent the second report, which explained how I had
working versions of both the ed diff generation and application code,
and that I would move on to writing tests, fixing bugs and starting the
integration into Tor.
And that's what I've done these past two weeks. I have restrured my
codebase to make it fit into the main repository (I came up with the
'consdiff' name, so consdiff.c and consdiff.h - criticism or better
names welcome). I have also started writing tests in test_consdiff.c,
which are extensive but still have room for improvement.
Most importantly, while writing the tests and adding assertions I found
a handful of issues which are now solved. I'll try to come up with as
many edge cases as I can to get rid of any remaining bugs.
All the code is up on github:
https://github.com/mvdan/tor_sample
Our schedules this week have been difficult in part due to the tor-dev
summer meeting, so not much else has happened other than my coding.
Hopefully we'll be back at full speed soon!
--
Daniel Martí - mvdan(a)mvdan.cc - http://mvdan.cc/
PGP: A9DA 13CD F7A1 4ACD D3DE E530 F4CA FFDB 4348 041C
Status Report 3
July 4th, 2014.
Things I have done:
1)Building Fennec:
Finally built Fennec and applied the patches to provide anonymity to some
extent. The apk can be found at
https://guardianproject.info/releases/FennecForTor_GSoC_prototype.apk .
This is just a prototype and requires the original browser code to be a
fully anonymous browser.
2)Building tor-browser:
I downloaded the source for tor-browser which is based on firefox 24esr.
Built it, and it runs, makes an apk which works to some extent but I was
informed that the browser won't function unless certain plugins are added
to it. This means that I'm going to have to port the plugins to work on
Fennec or find a usable alternative.
URL:
https://dl.dropboxusercontent.com/u/3308162/ExtraRelayDescriptorFields.txt
Fulltext below. Comments appreciated.
-V
=======================
Filename: ExtraRelayDescriptorFields.txt
Title: Adding new X- fields to relay descriptor
Author: Virgil Griffith, Nick Mathewson
Created: 2014-06-03
Status: Open
1. Motivation
We wish to allow developers to build new applications atop relays. Towards
this
end, we wish to add the ability for users to specify arbitrary new key-value
entries under the "X-" namespace.
2. Proposal
Allow optional key-value lines in the relay's torrc file. These lines will
be
mirrored in the relay's descriptor which is then published in the directory
consensus.
The format is:
X-key value
For example:
X-bitcoin 19mP9FKrXqL46Si58pHdhGKow88SUPy1V8
X-gravatar https://s.gravatar.com/avatar/d27fce46c9ac41a41bb52455ae75701d
X-nameid virgil.gr
X-favoritequote Be excellent to each other. Party on dudes!
The value field must be printable ASCII (characters 32-126). The value must
not under any condition contain a newline. The key may contain lowercase
ASCII letters (a-z), digits, underscore, or dash. In regex, [-_0-9a-z].
There may need to be a maximum sum length of the X- entries. This is
left to the developers. I propose a maximum sum length of 5 kilobytes.
Roger et al, I'm interested in something like onion-pi to be a Tor relay.
Is there something with enough COU to be viable? I know nothing about
this embedded scene.
-V