[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Mon Oct 14 19:00:18 UTC 2013
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/15 ===
===========================================================================
version 36
Author: lunar
Date: 2013-10-14T18:15:32+00:00
write about exit scanners
--- version 35
+++ version 36
@@ -43,6 +43,31 @@
[XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005621.html
[XXX] http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
[XXX] https://bugs.torproject.org/9001
+
+Detecting malicious exit nodes
+------------------------------
+
+Philipp Winter asked [XXX] for feedback on the technical architecture of “a
+Python-based exit relay scanner which should detect malicious and
+misbehaving exits.”
+
+Aaron took the opportunity to mention his plans [XXX] to leverage the work done
+as part of OONI [XXX] to detect network interference. Aaron's intent is to
+“provide Tor network tests as part of ooni-probe's standard set of tests,
+so that many individuals will measure the Tor network and automatically
+publish their results, and so that current and future network interference
+tests can be easily adapted to running on the Tor network.”
+
+Detecting misbehaving exits so they can be flagged
+“BadExit” [XXX] by the operators of the directory authorities is important
+to make every Tor user safer. Getting more users to run tests against our
+many exit nodes would benefit everyone — it makes it more likely to catch
+bad behaviors as soon as possible.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
+ [XXX] https://trac.torproject.org/projects/tor/wiki/doc/badRelays
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005596.html
+ [XXX] https://ooni.torproject.org/
Tor Help Desk Roundup
---------------------
@@ -148,8 +173,4 @@
[XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
-
- * Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html+}}}
version 35
Author: lunar
Date: 2013-10-14T17:56:34+00:00
covered
--- version 34
+++ version 35
@@ -152,5 +152,4 @@
Possible items:
- * Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
- * WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html+ * Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
version 34
Author: lunar
Date: 2013-10-14T17:56:02+00:00
mention tails translations
--- version 33
+++ version 34
@@ -49,6 +49,16 @@
[Some help desk news]
+The Tor project wishes to expand its support channels to text-based instant
+messaging as part of the Boisterous Otter [XXX] project. Lunar and Colin C. came up with
+a possible implementation [XXX] based on the XMPP protocol, Prosody [XXX] for the
+server side, and Prodromus [XXX] as the basis for the web based interface.
+
+ [XXX] https://trac.torproject.org/projects/tor/wiki/org/sponsors/Otter/Boisterous
+ [XXX] https://trac.torproject.org/projects/tor/wiki/org/sponsors/Otter/Boisterous/WebChat
+ [XXX] https://prosody.im/
+ [XXX] http://forge.webpresso.net/projects/prodromus
+
Miscellaneous news
------------------
@@ -75,6 +85,13 @@
right-to-left languages.
[XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005616.html
+
+The spanish and german version of the Tails website are outdated and should soon
+be disabled [XXX]. Now is a good time to help [XXX] if you want to keep those
+translations running!
+
+ [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003879.html
+ [XXX] https://tails.boum.org/contribute/how/translate/
adrenalos announced [XXX] the release of Whonix 7, an operating system based
“based on the Tor […], Debian GNU/Linux and the principle of security by isolation.”
version 33
Author: lunar
Date: 2013-10-14T17:30:55+00:00
move client count going downward to next week
--- version 32
+++ version 33
@@ -135,6 +135,5 @@
Possible items:
- * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
- * WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
+ * WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
version 32
Author: lunar
Date: 2013-10-14T17:29:23+00:00
fix subject
--- version 31
+++ version 32
@@ -2,7 +2,7 @@
'''Editor:''' Lunar
-'''Subject:''' Tor Weekly News — October, 16th 2013
+'''Subject:''' Tor Weekly News — October 16th, 2013
{{{
========================================================================
version 31
Author: lunar
Date: 2013-10-14T17:27:08+00:00
write about starlight shell snippets
--- version 30
+++ version 31
@@ -103,6 +103,11 @@
[XXX] https://bugs.torproject.org/9934
+starlight shared some simple shell snippets [XXX] that connects to the Tor control port in order
+to limit the bandwidth used by their relay while running backups.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030607.html
+
Upcoming events
---------------
@@ -133,4 +138,3 @@
* looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
* WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
- * dynamic relay bandwidth adjustment through shell script https://lists.torproject.org/pipermail/tor-talk/2013-October/030607.html
version 30
Author: lunar
Date: 2013-10-14T17:22:24+00:00
add another misc item
--- version 29
+++ version 30
@@ -98,6 +98,11 @@
[XXX] https://bugs.torproject.org/9914
[XXX] https://bugs.torproject.org/9814
+ra, one of Tor's former GSoC student, proposed a patch [XXX] to add to the Tor control protocol
+a command asking tor to pick a completely new set of guards.
+
+ [XXX] https://bugs.torproject.org/9934
+
Upcoming events
---------------
@@ -125,7 +130,6 @@
Possible items:
- * DUMPGUARDS (misc probably) https://trac.torproject.org/projects/tor/ticket/9934
* looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
* WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
version 29
Author: lunar
Date: 2013-10-14T17:20:06+00:00
include george's call in the hidden service item
--- version 28
+++ version 29
@@ -12,31 +12,37 @@
Welcome to the sixteenth issue of Tor Weekly News, the weekly newsletter that
covers what's happening in the venerable Tor community.
-How to scale Tor hidden services?
----------------------------------
+Making hidden services more scalable and harder to locate
+---------------------------------------------------------
Christopher Baines started a discussion [XXX] on tor-dev on the scaling
issues affecting the current design of Tor hidden services. Nick
Mathewson later described Christopher's initial proposal as “single
hidden service descriptor, multiple service instances per intro point”
-along with three other alternatives.
-
-Nick and Christopher also backed up to produce a set of goals that a new
-hidden service design should aim for regarding scalability: “Obscure
-number of hidden service instances. No "master" hidden service instance.
-If there is a "master" hidden service instance, clean fail-over from one
-master to the next, undetectable by the network. Obscure which
-instances are up and which are down. It should cope (all the goals hold)
-with taking down (planned downtime), and bringing up instances. Adding
-instances should not reduce the performance. It should be possible to
-move between a single instance and mutiple instance service easily.”
+along with three other alternatives. Nick and Christopher also backed up to
+produce a set of seven goals that a new hidden service design should aim for
+regarding scalability.
There's probably more to discuss to weight which goals are the most
desirable, and which designs are likely to address them, and as always,
-without harming anonymity. Feel free to give the thread in full and give
-your insights!
+without harming anonymity.
+
+George Kadianakis also called for help on regarding “the guard enumeration
+attack that was described by the ‘Trawling for Tor Hidden Services:
+Detection, Measurement, Deanonymization’ paper (in section VII) [XXX].”
+
+The most popular solution so far seems to enable a client or an hidden service
+to reuse some parts of a circuit that can not be completed succesfully to
+connect to new nodes. This should “considerably slow the attack” [XXX],
+but “might result in unexpected attacks” as George puts it.
+
+These problems can benefit from everyone's attention. Free to read the threads
+in full and give your insights!
[XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005556.html
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005621.html
+ [XXX] http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
+ [XXX] https://bugs.torproject.org/9001
Tor Help Desk Roundup
---------------------
@@ -124,4 +130,3 @@
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
* WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
* dynamic relay bandwidth adjustment through shell script https://lists.torproject.org/pipermail/tor-talk/2013-October/030607.html
- * Hidden Services help needed: Guard enumeration https://lists.torproject.org/pipermail/tor-dev/2013-October/005621.html
version 28
Author: lunar
Date: 2013-10-14T17:01:17+00:00
add wpes
--- version 27
+++ version 28
@@ -95,6 +95,10 @@
Upcoming events
---------------
+Nov 04 | Workshop on Privacy in the Electronic Society
+ | Berlin, Germany
+ | http://wpes2013.di.unimi.it/
+ |
Nov 04-05 | 20th ACM Conference on Computer and Communications Security
| Berlin, Germany
| http://www.sigsac.org/ccs/CCS2013/
version 27
Author: lunar
Date: 2013-10-14T16:56:49+00:00
add upcoming event
--- version 26
+++ version 27
@@ -95,13 +95,9 @@
Upcoming events
---------------
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
- |
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
+Nov 04-05 | 20th ACM Conference on Computer and Communications Security
+ | Berlin, Germany
+ | http://www.sigsac.org/ccs/CCS2013/
This issue of Tor Weekly News has been assembled by XXX, XXX, and
version 26
Author: lunar
Date: 2013-10-14T16:55:00+00:00
cruft
--- version 25
+++ version 26
@@ -92,16 +92,6 @@
[XXX] https://bugs.torproject.org/9914
[XXX] https://bugs.torproject.org/9814
- * f3ndot ; merged by phw ; XXX find tickets
-
-
-Vulnerabilities
----------------
-
-XXX: Reported vulnerabilities [XXX].
-
- [XXX] vulnerability report source
-
Upcoming events
---------------
version 25
Author: lunar
Date: 2013-10-14T16:52:17+00:00
write about atlas' improvements
--- version 24
+++ version 25
@@ -82,6 +82,19 @@
[XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000363.html
+Philip Winter, Justin Bull and rndm did several improvements to Atlas [XXX], the
+web application to learn more about running Tor relays. There HSDir flag is now properly
+displayed [XXX], countries' full name and flags are shown instead of two letter codes [XXX] and
+it's now easy to know for how long a relay has been down [XXX].
+
+ [XXX] https://atlas.torproject.org/
+ [XXX] https://bugs.torproject.org/9911
+ [XXX] https://bugs.torproject.org/9914
+ [XXX] https://bugs.torproject.org/9814
+
+ * f3ndot ; merged by phw ; XXX find tickets
+
+
Vulnerabilities
---------------
@@ -119,7 +132,6 @@
* DUMPGUARDS (misc probably) https://trac.torproject.org/projects/tor/ticket/9934
* looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
- * f3ndot fixed a bug where the HSDir flag would never display on relays that had it assigned and display the country's full name and flag on the relay detail view (before it just showed the lowercase 2-char country code) ; merged by phw ; XXX find tickets
* WebChat based support https://lists.torproject.org/pipermail/tor-dev/2013-October/005607.html
* dynamic relay bandwidth adjustment through shell script https://lists.torproject.org/pipermail/tor-talk/2013-October/030607.html
* Hidden Services help needed: Guard enumeration https://lists.torproject.org/pipermail/tor-dev/2013-October/005621.html
version 24
Author: atagar
Date: 2013-10-14T16:35:10+00:00
Linking to the blog announcement (looks a bit nicer)
--- version 23
+++ version 24
@@ -55,7 +55,7 @@
“Python library for interacting with Tor” adds remote descriptor fetching,
connection resolution and a myriad of small improvements and fixes.
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005623.html
+ [XXX] https://blog.torproject.org/blog/stem-release-11
[XXX] https://stem.torproject.org/change_log.html#version-1-1
anonym sent out a request for comments on a detailed proposal to implement
version 23
Author: lunar
Date: 2013-10-14T16:27:22+00:00
write about the release of stem 1.1
--- version 22
+++ version 23
@@ -50,6 +50,13 @@
mailing-list the first release of tor as free software.
[XXX] https://lists.torproject.org/pipermail/tor-dev/2003-October/002185.html
+
+Damian Johnson announced [XXX] the release of Stem 1.1.0 [XXX]. The new version of this
+“Python library for interacting with Tor” adds remote descriptor fetching,
+connection resolution and a myriad of small improvements and fixes.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005623.html
+ [XXX] https://stem.torproject.org/change_log.html#version-1-1
anonym sent out a request for comments on a detailed proposal to implement
a MAC address-spoofing feature in the Tails Greeter [XXX].
version 22
Author: lunar
Date: 2013-10-14T16:13:34+00:00
write about scaling hidden services
--- version 21
+++ version 22
@@ -12,26 +12,31 @@
Welcome to the sixteenth issue of Tor Weekly News, the weekly newsletter that
covers what's happening in the venerable Tor community.
-New Release of XXX
-------------------
+How to scale Tor hidden services?
+---------------------------------
-XXX: cite specific release date, numbers, and developers responsible
+Christopher Baines started a discussion [XXX] on tor-dev on the scaling
+issues affecting the current design of Tor hidden services. Nick
+Mathewson later described Christopher's initial proposal as “single
+hidden service descriptor, multiple service instances per intro point”
+along with three other alternatives.
-XXX: details about release
+Nick and Christopher also backed up to produce a set of goals that a new
+hidden service design should aim for regarding scalability: “Obscure
+number of hidden service instances. No "master" hidden service instance.
+If there is a "master" hidden service instance, clean fail-over from one
+master to the next, undetectable by the network. Obscure which
+instances are up and which are down. It should cope (all the goals hold)
+with taking down (planned downtime), and bringing up instances. Adding
+instances should not reduce the performance. It should be possible to
+move between a single instance and mutiple instance service easily.”
- [XXX]
+There's probably more to discuss to weight which goals are the most
+desirable, and which designs are likely to address them, and as always,
+without harming anonymity. Feel free to give the thread in full and give
+your insights!
-Monthly status reports for XXX month 2013
------------------------------------------
-
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
-
- [XXX]
- [XXX]
- [XXX]
- [XXX]
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005556.html
Tor Help Desk Roundup
---------------------
@@ -104,7 +109,6 @@
Possible items:
- * hidden service scaling https://lists.torproject.org/pipermail/tor-dev/2013-October/005556.html
* DUMPGUARDS (misc probably) https://trac.torproject.org/projects/tor/ticket/9934
* looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
* Design for an exit relay scanner: feedback appreciated https://lists.torproject.org/pipermail/tor-dev/2013-October/005593.html
version 21
Author: mttp
Date: 2013-10-14T16:11:57+00:00
--
--- version 20
+++ version 21
@@ -32,6 +32,11 @@
[XXX]
[XXX]
[XXX]
+
+Tor Help Desk Roundup
+---------------------
+
+[Some help desk news]
Miscellaneous news
------------------
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list