[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
- To: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
- From: Georg Koppen <gk@xxxxxxxxxxxxxx>
- Date: Tue, 22 Oct 2024 10:48:23 +0000
- Autocrypt: addr=gk@xxxxxxxxxxxxxx; keydata= xsFNBFH3/woBEADHs/Q4t69Vm+mNMW0vH0Ms6HtjpzBsto/yyDAoLitmAxfMIeCuWuyuBdHR krdq9Rk5WQLYtP9eROGkuABK/UaxpLw8zkwkmqbxQ2wxytVwgonOmAFPXvPjzVy+ToJvKWJj tRGFoWwO9OEZ8q6xhVnwLUJXRQF01/XhBhU2RPzzUTHrgiY2bi6Ko34nSM8qAuidykqd/elI wE+kn4+TZ+yBC7pzwUfRK0bOqc05qtq5ooH7rYGpvdOkt9DuoFEjhLrBaL3UiP5J6D9W1Ltv 7Y239RGZyGr0wO5ClhuJwipnw6yWDt493cw4fOy7J1Lbo8dZyU4pnFIgt1Cu506/CvdQ53pR UHhCSIS/IyOiEL9PI/PPByG9UhwNQYk9U22h4MalPwa+4rZ1XA6mf5+T4QQRmghAnegPwyQw qnQzHc2ZPAal+Ill15AncyfIeMfuCLyA/TVWwQTQMzdcVwu3nljBfGOjOSTHOafBqsVlvgEo R9GB9OaTbriP7lCDJmBsgFFZ5F0m6us2pP72TpM0GMYCae7PHk7POhvcE5VJg03E3tjyQUQA zt5ZcpzjZtbcWIoYjxEJMq1Wzj0PYfZYFYZGq2lQx7xJ54gb+RlXEaKiXhDQH+EkrKZHBDWi atMbfkMWiknmn8O7VkuT4LOHsF1I9oJt1VTZ0dx2MVvk2hhs3QARAQABzSBHZW9yZyBLb3Bw ZW4gPGdrQHRvcnByb2plY3Qub3JnPsLBegQTAQgAJAIbAwULCQgHAwUVCgkICwUWAwIBAAIe AQIXgAUCUuzzUQIZAQAKCRCUNzqpS3wyI694D/90P74XiDzioGbNEH37W9P5G6unLUKp/zLf 5Ifosf6ijS5EvhKXpSXAqWu4eSpUh+i72Kr53SvzAIggWjUM61e92xt0bg4+VFaguMh6d9l0 MpDMfRJB+qoRNaDDyGk1VH9ZLBJOpTY59HcIIyg2LIMt1PHk+3npr0MnDfh/5fgyPvFRv9ZK WkKdwD4ImlqGXaxsES2pPk8tn21k7J4N8jzRAYM8oV9cMeeCbMgERilU2sRxNORs55zV6GiD A68lmwY6+OHjaKd0k+Oibs63PrTl1+P4EYBZTlXK9gSSWKiUydVP+2lQoyGVmuH0VpepEcnv zu06g+YU4TiH3f7t1chknGlEm1s872nyZo7Nd+zVDcIa4iklBMpeEsPDB6zRT7KBH+oCw5vK G+Ngjv3AO8hD2RTFHw8oAD8WPBbrOB2C9qSha/XSl7rjxTpqRillP+543xhQncC3b2x+Vk4C wlJdrjOvweMnM4xCEeg03WUeRz6a4Uuh6A9x4WZia+5Y5PrKG4GKPeBbskFdw6N0/10Gk1nF wpS42esKsrvqeltRLPzwFj0FEO+mole3y2f+iR8rJd/rik7AW9PM2YkhiF8kmcyh07GSjcCo qg7AkOJ87Bv2knZ0KYlukY5wBKK/DY55GTLGQ7w6kR/BzMOlKnru1e0+zvyZ4KijODEuaUi1 2c7BTQRm2t9lARAAsNtLXaJzVW6gtPZZwcMEMFKka6lduK6dZnnCCZd2D7jmwPXncIAFWzwE TbMvx9s0PnGoz88EDS6uDUAUAvMtvQewcW7raoZ/tZTrEytHpQRM1GJIJ6ovQ7H7dKn7IYg+ 7SqD+X5eqPgkLcXi+wPT/INj5aFgNbw9duknQMT/tC1XhBpYe6r3aw7aOawQRCIHLBKXqsCd 5RrwMTyCLAekWM54g2fVS05C2tEvB08kFvQa2Z0NKaLAN43ehmy+oFF0yU6lEUDkWwfR69ee xWSrUB71YpjcDNyFOkzDTTBAAQbLRHl/mgbN+rqsq0p0XvVm1DjHf9gSstd4F1djqc9eHshC NxViNf5sVj1kYxe0hsHEooT4F/70KZk4vFFlvBOtLnyveGw+JIV4a7TLmIkEY3e2CYRiTYeS PruwWsIyw/HckDzswum328BpPZbwiOp5w5/79mRz197rnTx/iiIDXhNYVbAnRpDf5+HsV/nt u3I5yRzHsQsA3PyrwIS5lCjLFv8PvdL4nydHAdDRyo2l+0w3pTwU1VwOxA0g7B/0YfcOhpWS Ambx/gBQ9pj0pU5bJQb4XBpqwcd4JOsrB0Pfv/GACGPcgZZXUrIdf/2ikPS+ljTnT7Vgl5fQ BQMoKzAnVH4xtvcwe/XEqvf+ivZnfd7dmlZWmXQe7mU/WVS2mCcAEQEAAcLBfAQYAQoAJhYh BDXNdMJKmxWhnhqBoZQ3OqlLfDIjBQJm2t9lAhsMBQkB58sAAAoJEJQ3OqlLfDIjJsEP/jAu Yq0PhBbiqFNf/oqvPIv9MzX8kpkMNkGStLr4zp17+Pf8/rqBlHx4X8/VhfOuzcTQ8JYwQq1D X6VvXzzuU1yWy0US06h1D3scv+en891gGzwpAGCEwL2l6tZ15xSJHgkZ1SrLv5W4QKx9AvdP rMUdpmmlEtouO0ptw9EASRMTEOoULDdxZmIcytRNTVDJIWr84DQGNO269yKqdx55lbV4kf9m lk/Q0jVxah97oVp7fotN2Pe2dLBmDkEKQ1qkRIVoWfjVMsursKt0vFEc90iVXOVMuqcgtsdO HIp7GVRoGSeeBP+NBvue6AOWUodMVDhWAdrcMYOBb5bj/KMzgyD6T+WgXLCxmSjHE53BCZMB gycsxYcGflLtopIYdAkK8j1qQgjvKOOK5KO0XetmgpJ0mUXJyMyBr2G47Wb5Y9qvzaRcy4qu zA2lQh8rTPjS+lJACuq1/D1I2Os7wByZenZbUH4sVQHPeFfQlA6xsJJ0x5gjunQZ/Qv1RNhh TryxGXg1MCcbBQ8pM6Sh+/HWg9OR/HU02YqOeMQvXlqgI4Se5Ppdf2elTI+93LZc7WWmOqVy cTXOGpONUnfCcuYQiV1JtuFZGMB3mkuI+dMEft7mYRg0x9ZVNMITPRtXy16i28n61kxVbOKW AihndDZ+1Ibk3y2MpdaazdcGwvfQaTmL
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Tue, 22 Oct 2024 06:48:44 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=simple/simple; d=torproject.org; s=2022-eugeni; t=1729594118; bh=j/bXmXfd5p+A/9SEab0YrUfnuLyuM2QcnBghS0UlfFo=; h=Date:To:References:From:In-Reply-To:Subject:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: Reply-To:From; b=HzyoEYL4ckYoE2CDz3mSWe0GP/pdXWgWwNrLEPJ4dkeLaLi3NCSkLlMg+Qnk2DQ4a 25EG7eHGhk771Wgb20gWFvAfeVoql2/Agd0z8rzE2/lkl311o9jkUKRi7M9nspI3uw Gzdr8DyWgbIOiM2il1Nr6v7406TLrJlD9joF1GP7jSteeyiP9mmaUN44sANZsHgVvH Ml3ZsRInTqZAcFAxdXR/aiHA9WMnOAhBJcNwRfW7vPCXi3hiZZYwTTdFdhNJLTU52E WeuJaeIP2QbsKafgpm0109MhT9wnc/ki8FGCmg7QnTcDFuJCQfVCbm7DXH38TsdWVZ nBOGoVPOu326Q==
- In-reply-to: <172956531737.7.7576968361250790649.470267841@silomails.com>
- List-archive: <http://lists.torproject.org/pipermail/tor-dev/>
- List-help: <mailto:tor-dev-request@lists.torproject.org?subject=help>
- List-id: discussion regarding Tor development <tor-dev.lists.torproject.org>
- List-post: <mailto:tor-dev@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=unsubscribe>
- References: <172956531737.7.7576968361250790649.470267841@silomails.com>
- Reply-to: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-dev" <tor-dev-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Mozilla Thunderbird
stifle_savage042--- via tor-dev:
Hi all,
I want to promote some recent work of mine in the hope that someone here will find it interesting or useful. In my most concise language, it is a "decentralized, asynchronous entropy generator protocol." I've made a somewhat complete demo implementation so far. Here's the repository: https://github.com/devnetsec/rand-num-consensus. The
FWIW the correct link is: https://github.com/devnetsec/rand_num_consensus.
Georg
integrity of the entropy can only be compromised if all nodes in the
ring are malicious and coinciding. Currently, a Tor client cannot
anonymously connect to an onion service by directly contacting the
rendezvous point, because that relay could have been chosen maliciously
by the onion server. I wager that a scheme like this could enable onion
servers and clients to share the same circuit. Both parties would have a
guarantee that their relays were chosen randomly.
The most similar solution I could find to this was in the TorCoin paper, but it appears to require a more complicated zero-knowledge proof. If there is serious interest in this, I'd be willing to write a proposal draft. Besides implementation difficulty, is there any outstanding flaw in this idea?
Best Regards,
Dylan Downey [devnetsec]
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Attachment:
OpenPGP_signature.asc
Description: OpenPGP digital signature
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev