[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Sat Oct 31 15:00:06 UTC 2015


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2015/37 ===
===========================================================================

version 6
Author: harmony
Date:   2015-10-31T14:20:14+00:00

   --

--- version 5
+++ version 6
@@ -2,180 +2,6 @@
 
 '''Editor:''' Harmony
 
-'''Subject:''' Tor Weekly News — October 30th, 2015
+'''Subject:''' Tor Weekly News — October 31st, 2015
 
-{{{
-========================================================================
-Tor Weekly News                                       October 30th, 2015
-========================================================================
-
-Welcome to the thirty-seventh issue in 2015 of Tor Weekly News, the
-weekly newsletter that covers what’s happening in the Tor community.
-
-Contents
---------
-
- 1. IETF reserves .onion as a Special-Use Domain Name
- 2. Tor proposal updates
- 3. Miscellaneous news
- 4. Upcoming events
-
-IETF reserves .onion as a Special-Use Domain Name
--------------------------------------------------
-
-Several years of effort by Tor Project members and contributors bore
-fruit this week when the Internet Engineering Task Force, which develops
-and promotes voluntary standards for Internet technologies, recognized
-the .onion suffix as a special-use domain name [1].
-
-As Jacob Appelbaum, who led the charge along with Facebook security
-engineer Alec Muffett, explained: “IETF name reservations are part of a
-lesser known process that ensures a registered Special-Use Domain Name
-will not become a Top Level Domain (TLD) to be sold by the Internet
-Corporation For Assigned Names and Numbers (ICANN).” In other words, it
-will not be possible for domain registrars to sell web addresses ending
-in .onion; if it were, it would create problems for Tor’s hidden service
-system, which uses that suffix to allow users to run anonymous and
-censorship-resistant web services accessible via the Tor Browser.
-
-Another benefit of the name reservation is that it will now be possible
-to buy Extended Validation (EV) SSL certificates for .onion domains, a
-system which Facebook has trialled on its own popular hidden
-service [2].
-
-“We think that this is a small and important landmark in the movement to
-build privacy into the structure of the Internet”, wrote Jacob.
-Congratulations to all those who spent time drafting this proposal and
-advocating for its adoption.
-
-  [1]: https://blog.torproject.org/blog/landmark-hidden-services-onion-names-reserved-ietf
-  [2]: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
-
-Tor proposal updates
---------------------
-
-Tor’s body of development proposals, documents that plan for
-improvements and changes in Tor’s software ecosystem, has seen some
-additions, updates, and reviews over the past week.
-
-Nick Mathewson published proposal 256 [3], which examines methods for
-revoking the long-lived public keys used by Tor relays and directory
-authorities in the event that they are compromised, or the operator
-believes there is a significant possibility that they have been
-compromised. Andrea Shepard wrote proposal 258 [4], explaining how
-directory authorities could mitigate the risk of denial-of-service (DOS)
-attacks by classifying the types of directory requests they receive and
-setting thresholds for each. Nick and Andrea together published proposal
-257 [5], which identifies the different functions performed by directory
-authorities and examines how the risk of DOS attacks could be reduced by
-“isolating the security-critical, high-resource, and
-availability-critical pieces of our directory infrastructure from one
-another”.
-
-George Kadianakis published a review [6] of all the open proposals
-relevant to next-generation hidden services, giving a summary of each
-one along with its current status, “so that researchers and developers
-have easier access to them”.
-
-Proposal 250, which specifies how directory authorities can come up with
-a shared random value every day, and which George describes as “a
-prerequisite” for all other work on next-gen hidden services, was itself
-updated to reflect changes in the implementation, which is almost
-finished, as David Goulet explained [7]. Finally, Tim Wilson-Brown
-(teor) published a revised version [8] of the as-yet unnumbered proposal
-for “rendevous single onion services”, “an alternative design for single
-onion services, which trade service-side location privacy for improved
-performance, reliability, and scalability”.
-
-If you have any comments on these or other Tor proposals, feel free to
-post your thoughts to the tor-dev mailing list.
-
-  [3]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009798.html
-  [4]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009821.html
-  [5]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009799.html
-  [6]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009762.html
-  [7]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009812.html
-  [8]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009763.html
-
-Miscellaneous news
-------------------
-
-The Tor BSD Diversity Project [9], “an effort to extend the use of the
-BSD Unixes into the Tor ecosystem, from the desktop to the network”,
-announced [10] the release of an OpenBSD port of Tor Browser 5.0.3, its
-sixth Tor Browser release for BSD systems. See attila’s announcement for
-download instructions, as well as a report on the TDP’s other
-development and advocacy activities.
-
-  [9]: https://torbsd.github.io/
- [10]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009800.html
-
-Tor’s Metrics team, “a group of Tor people who care about measuring and
-analyzing things in the public Tor network”, now has its own public
-mailing list and wiki page, as Karsten Loesing announced [11]. There is
-a simple step to complete before you can post freely to the list, but
-anyone interested in “measurements and analysis” is welcome to listen in
-on discussions, and to check the team’s roadmap and workflow on the wiki
-page.
-
- [11]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009808.html
-
-“In an attempt to make Pluggable Transports more accessible to other
-people, and to have a spec that is more applicable and useful to other
-projects that seek to use Pluggable Transports for circumvention”,
-Yawning Angel drafted a rewrite of the pluggable transports spec
-document [12]. No behavior changes are specified in this rewrite, but
-“unless people have serious objections, this will replace the existing
-PT spec, to serve as a stop-gap while the next revision of the PT spec
-(that does alter behavior) is being drafted/implemented”.
-
- [12]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009815.html
-
-Simone Bassano published a report [13] on the OONI hackathon that took
-place in Rome at the start of October. A working beta version of
-MeasurementKit and progress on NetworkMeter, as well as ways to make use
-of censorship data, were among the outcomes.
-
- [13]: https://lists.torproject.org/pipermail/ooni-dev/2015-October/000353.html
-
-Upcoming events
----------------
-
-  Nov 02 17:00 UTC | OONI team meeting
-                   | #ooni, itc.oftc.net
-                   |
-  Nov 02 19:00 UTC | Tor Browser meeting
-                   | #tor-dev, irc.oftc.net
-                   |
-  Nov 03 16:00 UTC | SponsorR meeting
-                   | #tor-dev, irc.oftc.net
-                   |
-  Nov 03 18:00 UTC | Core Tor patch workshop
-                   | #tor-dev, irc.oftc.net
-                   |
-  Nov 03 19:00 UTC | Tails contributors meeting
-                   | #tails-dev, irc.oftc.net
-                   | https://mailman.boum.org/pipermail/tails-project/2015-October/000335.html
-                   |
-  Nov 04 15:30 UTC | Network team meeting
-                   | #tor-dev, irc.oftc.net
-                   |
-  Nov 05 14:00 UTC | Metrics team meeting
-                   | #tor-dev, irc.oftc.net
-                   | https://trac.torproject.org/projects/tor/wiki/org/teams/MetricsTeam
-                   |
-  Nov 05 15:00 UTC | 1-1-1 task exchange meeting
-                   | #tor-dev, irc.oftc.net
-
-
-This issue of Tor Weekly News has been assembled by Harmony.
-
-Want to continue reading TWN? Please help us create this newsletter.
-We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [14], write down your
-name and subscribe to the team mailing list [15] if you want to
-get involved!
-
- [14]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [15]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
+'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2015-October/000115.html Sent].

version 5
Author: harmony
Date:   2015-10-31T14:17:06+00:00

   --

--- version 4
+++ version 5
@@ -26,7 +26,7 @@
 Several years of effort by Tor Project members and contributors bore
 fruit this week when the Internet Engineering Task Force, which develops
 and promotes voluntary standards for Internet technologies, recognized
-the .onion suffix as a special-use domain name [XXX].
+the .onion suffix as a special-use domain name [1].
 
 As Jacob Appelbaum, who led the charge along with Facebook security
 engineer Alec Muffett, explained: “IETF name reservations are part of a
@@ -41,15 +41,15 @@
 Another benefit of the name reservation is that it will now be possible
 to buy Extended Validation (EV) SSL certificates for .onion domains, a
 system which Facebook has trialled on its own popular hidden
-service [XXX].
+service [2].
 
 “We think that this is a small and important landmark in the movement to
 build privacy into the structure of the Internet”, wrote Jacob.
 Congratulations to all those who spent time drafting this proposal and
 advocating for its adoption.
 
- [XXX]: https://blog.torproject.org/blog/landmark-hidden-services-onion-names-reserved-ietf
- [XXX]: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
+  [1]: https://blog.torproject.org/blog/landmark-hidden-services-onion-names-reserved-ietf
+  [2]: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
 
 Tor proposal updates
 --------------------
@@ -58,21 +58,21 @@
 improvements and changes in Tor’s software ecosystem, has seen some
 additions, updates, and reviews over the past week.
 
-Nick Mathewson published proposal 256 [XXX], which examines methods for
+Nick Mathewson published proposal 256 [3], which examines methods for
 revoking the long-lived public keys used by Tor relays and directory
 authorities in the event that they are compromised, or the operator
 believes there is a significant possibility that they have been
-compromised. Andrea Shepard wrote proposal 258 [XXX], explaining how
+compromised. Andrea Shepard wrote proposal 258 [4], explaining how
 directory authorities could mitigate the risk of denial-of-service (DOS)
 attacks by classifying the types of directory requests they receive and
 setting thresholds for each. Nick and Andrea together published proposal
-257 [XXX], which identifies the different functions performed by
-directory authorities and examines how the risk of DOS attacks could be
-reduced by “isolating the security-critical, high-resource, and
+257 [5], which identifies the different functions performed by directory
+authorities and examines how the risk of DOS attacks could be reduced by
+“isolating the security-critical, high-resource, and
 availability-critical pieces of our directory infrastructure from one
 another”.
 
-George Kadianakis published a review [XXX] of all the open proposals
+George Kadianakis published a review [6] of all the open proposals
 relevant to next-generation hidden services, giving a summary of each
 one along with its current status, “so that researchers and developers
 have easier access to them”.
@@ -81,62 +81,62 @@
 a shared random value every day, and which George describes as “a
 prerequisite” for all other work on next-gen hidden services, was itself
 updated to reflect changes in the implementation, which is almost
-finished, as David Goulet explained [XXX]. Finally, Tim Wilson-Brown
-(teor) published a revised version [XXX] of the as-yet unnumbered
-proposal for “rendevous single onion services”, “an alternative design
-for single onion services, which trade service-side location privacy for
-improved performance, reliability, and scalability”.
+finished, as David Goulet explained [7]. Finally, Tim Wilson-Brown
+(teor) published a revised version [8] of the as-yet unnumbered proposal
+for “rendevous single onion services”, “an alternative design for single
+onion services, which trade service-side location privacy for improved
+performance, reliability, and scalability”.
 
 If you have any comments on these or other Tor proposals, feel free to
 post your thoughts to the tor-dev mailing list.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009798.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009821.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009799.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009762.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009812.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009763.html
+  [3]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009798.html
+  [4]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009821.html
+  [5]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009799.html
+  [6]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009762.html
+  [7]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009812.html
+  [8]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009763.html
 
 Miscellaneous news
 ------------------
 
-The Tor BSD Diversity Project [XXX], “an effort to extend the use of the
+The Tor BSD Diversity Project [9], “an effort to extend the use of the
 BSD Unixes into the Tor ecosystem, from the desktop to the network”,
-announced [XXX] the release of an OpenBSD port of Tor Browser 5.0.3, its
+announced [10] the release of an OpenBSD port of Tor Browser 5.0.3, its
 sixth Tor Browser release for BSD systems. See attila’s announcement for
 download instructions, as well as a report on the TDP’s other
 development and advocacy activities.
 
- [XXX]: https://torbsd.github.io/
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009800.html
+  [9]: https://torbsd.github.io/
+ [10]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009800.html
 
 Tor’s Metrics team, “a group of Tor people who care about measuring and
 analyzing things in the public Tor network”, now has its own public
-mailing list and wiki page, as Karsten Loesing announced [XXX]. There
-is a simple step to complete before you can post freely to the list, but
+mailing list and wiki page, as Karsten Loesing announced [11]. There is
+a simple step to complete before you can post freely to the list, but
 anyone interested in “measurements and analysis” is welcome to listen in
 on discussions, and to check the team’s roadmap and workflow on the wiki
 page.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009808.html
+ [11]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009808.html
 
 “In an attempt to make Pluggable Transports more accessible to other
 people, and to have a spec that is more applicable and useful to other
 projects that seek to use Pluggable Transports for circumvention”,
 Yawning Angel drafted a rewrite of the pluggable transports spec
-document [XXX]. No behavior changes are specified in this rewrite, but
+document [12]. No behavior changes are specified in this rewrite, but
 “unless people have serious objections, this will replace the existing
 PT spec, to serve as a stop-gap while the next revision of the PT spec
 (that does alter behavior) is being drafted/implemented”.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009815.html
+ [12]: https://lists.torproject.org/pipermail/tor-dev/2015-October/009815.html
 
-Simone Bassano published a report [XXX] on the OONI hackathon that took
+Simone Bassano published a report [13] on the OONI hackathon that took
 place in Rome at the start of October. A working beta version of
 MeasurementKit and progress on NetworkMeter, as well as ways to make use
 of censorship data, were among the outcomes.
 
- [XXX]: https://lists.torproject.org/pipermail/ooni-dev/2015-October/000353.html
+ [13]: https://lists.torproject.org/pipermail/ooni-dev/2015-October/000353.html
 
 Upcoming events
 ---------------
@@ -172,10 +172,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [14], write down your
+name and subscribe to the team mailing list [15] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [14]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [15]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list