[tor-reports] Yawning's January 2015 - April, 2015.
Yawning Angel
yawning at schwanenlied.me
Thu Apr 30 16:25:01 UTC 2015
The past:
- Attended the developer meeting in Valencia.
- obfs4proxy is deployed in Orbot, Tails and Tor Browser now.
- Wrote a bunch of things regarding what a PT needs to be deployed
(yet to be published, ongoing).
- Talked to researchers about PT designs/implementations, provided
assistance as necessary.
- Tagged 2 new obfs4proxy releases.
- ScrambleSuit client support.
- Internal SOCKS5 server to replace goptlib's SOCKS4 server.
- Significantly better behavior when the parent tor instance dies
for any reason.
- Various minor cleanups/bug fixes.
- Things related to Dust2 integration.
- Logging support moved to common.
- Logging initialization order moved to really early in the
process lifetime.
- Poked at other PT codebases.
- The minor branch for meek for the Orbot people that allows a
SOCKS5 proxy to be used even without the Firefox helper. (#15158)
- A experimental unmerged meek branch that attempts to rate limit.
- goptlib workaround for #15240.
- Rebased the goptlib SOCKS5 branch on master (#12535, not yet
merged).
- Started tentatively poking at designing obfs5 (AKA tentp) (#15232).
- PT spec changes (Wrote/contributed to)
- TOR_PT_EXIT_ON_STDIN_CLOSE (#15545)
- Deprecating "*" as a transport specifier (#10131)
- Worked on Tor core
- Helped get the 0.2.6 stable release out.
- Helped plan the 0.2.7 feature set.
- Added some new features
- Adding hidden services through control port (#6411, merged)
- Base64 code cleanups (#15652, merged)
- Tor should prctl(PR_SET_PDEATHSIG, SIGTERM) background processes
(#15471, merged)
- Tor should not close stdin on child processes (#15435, merged)
- get_interface_address6() behaviour iff all interface addresses
are internal (#12377, WIP)
- Investigated/Fixed a lot of bugs.
- Reviewed tons of branches (big ones listed)
- Controller: add a command to fetch HS descriptor from HS dirs
(#14847)
- Allow controllers to post HS descriptors to the HSDir system
(#3523)
- Various random hackery/navelgazing/yakshaving (not comprehensive)
- Fixed a few torsocks bugs (#13294, #15498, #15504, #15584, #8137)
- A Go control port library (https://github.com/Yawning/bulb)
- A reverse-torsocks (https://github.com/Yawning/onionwrap)
- poly1305-donna in Go (https://github.com/Yawning/poly1305)
- Taught myself Rust, contributed to rust-crypto
The future (in no particular order, probably not all next mo):
- Continue to work on specifying PT requirements/guidelines, and
characterizing the big picture.
- Write that obfs4 blog post.
- Figure out what needs to happen for obfs4proxy 0.0.5 Debian packages.
- Finish up the pt spec cleanups (#15545)
- Work more on the obfs5 (tentp design)
- Do what needs to be done to assist PT developers/researchers.
- Tor core things
- Work with my student to specify a clean interface for external
name resolution helpers (TSOP).
- Implement Bridge Guards and other anti-enumeration defenses (#7144)
- All the various "make curve25519 faster" tickets.
- Obfsbridges should be able to "disable" their ORPort (#7349)
- Minor pluggable transport things for 0.2.7.x
- Bring sanity to the tor side of the PT shutdown process (#15593)
- Tor should consider stderr output of transport proxies (#9957)
- OpenSSL 1.1.0-dev compatibility (#15760), maybe. Kind of hard and
low-ish priority for now.
- Give lots of thought to the BridgeAuth.
- (Probably a ton of things I forgot).
- Mentor my TSOP student.
--
Yawning Angel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-reports/attachments/20150430/c52560a5/attachment.sig>
More information about the tor-reports
mailing list