[tor-dev] HSDir Auth and onion descriptor scraping
Gareth Owen
gareth.owen at port.ac.uk
Sun Nov 9 20:22:04 UTC 2014
I have several hundred thousand (or million? Haven't counted) hs descriptors saved on my hard disk from a data collection experiment (from 70k HSes). I'm a bit nervous about sharing these en masse as whilst not confidential they're supposed to be difficult to obtain in this quantity. However, if someone wants to write a quick script that goes through all of them and counts the number of authenticated vs nonauthed then I do not mind running it on the dataset and publishing the results. I have a directory where each file is a hs descriptor.
The introduction point data is base64 encoded plaibtext when unauthed or has high entropy otherwise.
Best
Gareth
On 19:06, 9 Nov 2014, at 19:06, grarpamp <grarpamp at gmail.com> wrote:
>> George K:
>> I suspect that HS authorization is very rare in the current network,
>> and if we believe it's a useful tool, it might be worthwhile to make
>> it more useable by people.
>
>Is anyone making their HSDir onion descriptor scraping patches
>available somewhere? I'd suspect the rarity of HS authorization
>could also be determined with that since some fields would be
>obfuscated and thus not match patterns.
>
>s/scraping/logging/
>
>rend--spec.txt:
>2. Authentication and authorization.
>2.1. Service with large-scale client authorization
>2.2. Authorization for limited number of clients
>2.3. Hidden service configuration
>2.4. Client configuration
>_______________________________________________
>tor-dev mailing list
>tor-dev at lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20141109/9f22a9c5/attachment-0001.html>
More information about the tor-dev
mailing list