[tor-bugs] #12193 [Ponies]: Set up a Mozilla Persona testing server
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Jun 6 03:05:21 UTC 2014
#12193: Set up a Mozilla Persona testing server
---------------------------+----------------------
Reporter: mikeperry | Owner:
Type: project | Status: new
Priority: normal | Milestone:
Component: Ponies | Version:
Resolution: | Keywords: SponsorP
Actual Points: | Parent ID:
Points: |
---------------------------+----------------------
Changes (by isis):
* cc: isis (added)
Comment:
Mike Perry kept lauting Persona while I was starting research on
authentication mechanisms for BridgeDB's social distributor last
summer/fall. I ended up setting up a Mozilla Persona server on my personal
server for a while on patternsinthevoid.net (it's not up anymore though)
to test it out, and, ultimately, to be able to log into the silly Tor
Stack Exchange thingie that insisted on being MITMable and insecure.
Long story short: I've already read a few papers on it, and read their
docs, and set one up. It's supposed to have changed some, but I could do
it again.
'''@mikeperry''': As a technical aside, why did you say
> a number CAPTCHAs
plural? Why is solving 2-out-of-3 8-char CAPTCHAs better than solving 1
24-char CAPTCHA with 3 chars wrong? Is there something better about having
plural CAPTCHAs? As a user, that would annoy the crap out of me; I would
think I'd done something wrong.
--------
If you want just the server, and you want it well-tested and scalable to a
potentially high number of Tor clients who are waiting to pounce on it,
then that would probably take me two months. I could plug the CAPTCHA
system that I already made for BridgeDB into it pretty easily, I think.
If you want extra authentication systems, then I'd estimate 2 months
extra, on top of setting up the server(s), for each auth mechanism that is
simple. Simple RSA-based blind tokens probably count as simple. If you
want crazy stuff for extra authentication systems, like BTC payments, that
would need a bit of extra work to guarantee that any adversarial advantage
for deanonymisation isn't introduced. I would estimate roughly 6 months
extra work for implementing any more ambitious auth/PoW scheme.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/12193#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list