[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Thu Oct 29 18:20:04 UTC 2015
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2015/37 ===
===========================================================================
version 4
Author: harmony
Date: 2015-10-29T17:49:34+00:00
--
--- version 3
+++ version 4
@@ -15,13 +15,13 @@
Contents
--------
- 1. Internet standards body reserves .onion as a Special-Use Domain Name
+ 1. IETF reserves .onion as a Special-Use Domain Name
2. Tor proposal updates
3. Miscellaneous news
4. Upcoming events
-Internet standards body reserves .onion as a Special-Use Domain Name
---------------------------------------------------------------------
+IETF reserves .onion as a Special-Use Domain Name
+-------------------------------------------------
Several years of effort by Tor Project members and contributors bore
fruit this week when the Internet Engineering Task Force, which develops
version 3
Author: harmony
Date: 2015-10-29T17:49:00+00:00
--
--- version 2
+++ version 3
@@ -15,28 +15,128 @@
Contents
--------
- 1. XXX
- 2. XXX
+ 1. Internet standards body reserves .onion as a Special-Use Domain Name
+ 2. Tor proposal updates
+ 3. Miscellaneous news
+ 4. Upcoming events
-Feature XXX
------------
+Internet standards body reserves .onion as a Special-Use Domain Name
+--------------------------------------------------------------------
-Feature 1 with cited source [XXX]
+Several years of effort by Tor Project members and contributors bore
+fruit this week when the Internet Engineering Task Force, which develops
+and promotes voluntary standards for Internet technologies, recognized
+the .onion suffix as a special-use domain name [XXX].
- [XXX]:
+As Jacob Appelbaum, who led the charge along with Facebook security
+engineer Alec Muffett, explained: “IETF name reservations are part of a
+lesser known process that ensures a registered Special-Use Domain Name
+will not become a Top Level Domain (TLD) to be sold by the Internet
+Corporation For Assigned Names and Numbers (ICANN).” In other words, it
+will not be possible for domain registrars to sell web addresses ending
+in .onion; if it were, it would create problems for Tor’s hidden service
+system, which uses that suffix to allow users to run anonymous and
+censorship-resistant web services accessible via the Tor Browser.
+
+Another benefit of the name reservation is that it will now be possible
+to buy Extended Validation (EV) SSL certificates for .onion domains, a
+system which Facebook has trialled on its own popular hidden
+service [XXX].
+
+“We think that this is a small and important landmark in the movement to
+build privacy into the structure of the Internet”, wrote Jacob.
+Congratulations to all those who spent time drafting this proposal and
+advocating for its adoption.
+
+ [XXX]: https://blog.torproject.org/blog/landmark-hidden-services-onion-names-reserved-ietf
+ [XXX]: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
+
+Tor proposal updates
+--------------------
+
+Tor’s body of development proposals, documents that plan for
+improvements and changes in Tor’s software ecosystem, has seen some
+additions, updates, and reviews over the past week.
+
+Nick Mathewson published proposal 256 [XXX], which examines methods for
+revoking the long-lived public keys used by Tor relays and directory
+authorities in the event that they are compromised, or the operator
+believes there is a significant possibility that they have been
+compromised. Andrea Shepard wrote proposal 258 [XXX], explaining how
+directory authorities could mitigate the risk of denial-of-service (DOS)
+attacks by classifying the types of directory requests they receive and
+setting thresholds for each. Nick and Andrea together published proposal
+257 [XXX], which identifies the different functions performed by
+directory authorities and examines how the risk of DOS attacks could be
+reduced by “isolating the security-critical, high-resource, and
+availability-critical pieces of our directory infrastructure from one
+another”.
+
+George Kadianakis published a review [XXX] of all the open proposals
+relevant to next-generation hidden services, giving a summary of each
+one along with its current status, “so that researchers and developers
+have easier access to them”.
+
+Proposal 250, which specifies how directory authorities can come up with
+a shared random value every day, and which George describes as “a
+prerequisite” for all other work on next-gen hidden services, was itself
+updated to reflect changes in the implementation, which is almost
+finished, as David Goulet explained [XXX]. Finally, Tim Wilson-Brown
+(teor) published a revised version [XXX] of the as-yet unnumbered
+proposal for “rendevous single onion services”, “an alternative design
+for single onion services, which trade service-side location privacy for
+improved performance, reliability, and scalability”.
+
+If you have any comments on these or other Tor proposals, feel free to
+post your thoughts to the tor-dev mailing list.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009798.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009821.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009799.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009762.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009812.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009763.html
Miscellaneous news
------------------
-Item 1 with cited source [XXX].
+The Tor BSD Diversity Project [XXX], “an effort to extend the use of the
+BSD Unixes into the Tor ecosystem, from the desktop to the network”,
+announced [XXX] the release of an OpenBSD port of Tor Browser 5.0.3, its
+sixth Tor Browser release for BSD systems. See attila’s announcement for
+download instructions, as well as a report on the TDP’s other
+development and advocacy activities.
-Item 2 with cited source [XXX].
+ [XXX]: https://torbsd.github.io/
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009800.html
-Item 3 with cited source [XXX].
+Tor’s Metrics team, “a group of Tor people who care about measuring and
+analyzing things in the public Tor network”, now has its own public
+mailing list and wiki page, as Karsten Loesing announced [XXX]. There
+is a simple step to complete before you can post freely to the list, but
+anyone interested in “measurements and analysis” is welcome to listen in
+on discussions, and to check the team’s roadmap and workflow on the wiki
+page.
- [XXX]:
- [XXX]:
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009808.html
+
+“In an attempt to make Pluggable Transports more accessible to other
+people, and to have a spec that is more applicable and useful to other
+projects that seek to use Pluggable Transports for circumvention”,
+Yawning Angel drafted a rewrite of the pluggable transports spec
+document [XXX]. No behavior changes are specified in this rewrite, but
+“unless people have serious objections, this will replace the existing
+PT spec, to serve as a stop-gap while the next revision of the PT spec
+(that does alter behavior) is being drafted/implemented”.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009815.html
+
+Simone Bassano published a report [XXX] on the OONI hackathon that took
+place in Rome at the start of October. A working beta version of
+MeasurementKit and progress on NetworkMeter, as well as ways to make use
+of censorship data, were among the outcomes.
+
+ [XXX]: https://lists.torproject.org/pipermail/ooni-dev/2015-October/000353.html
Upcoming events
---------------
@@ -68,8 +168,7 @@
| #tor-dev, irc.oftc.net
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Harmony.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list