[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor VoIP PBX Architecture Discussion / Onioncat
- To: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-talk] Tor VoIP PBX Architecture Discussion / Onioncat
- From: Iain Learmonth <irl@xxxxxxxxxxxxxx>
- Date: Tue, 23 Oct 2018 13:49:06 +0100
- Autocrypt: addr=irl@xxxxxxxxxxxxxx; prefer-encrypt=mutual; keydata= xsFNBFZp8zEBEACxOYriD+tEuc3Wpnbh+GGnyiaLEMABBrfn6JlDQphbBq/YTz9M9OPkttjx hLL/yrxlM1nD69XbGKQ9gIL3LEgOz9+OdivPbN+Q5iNMqk/WCQUqd3bCFbbsn1yvoTumFy9S 9kYX45Db3jRJoN/Nye6Stf7KKPxHxot14iY+PUR/5Gx5KbeWVKfDtQejGnhxQD73KjrX4wds BAaxnQ7KbjQyUf+IxE+8qSDcyTP+pPqxspVzx+eFqsW5+kK1eJMHxJmY/KsAs6IsGf5lvyDJ JECc2iE0mFS6vc14lGcD7BAYMPRnvlK3OcDlbdJS3ZU0LQu3/AplM7cNcesq2Btm06OUTsbj 10ZiyLi7Q0WZRuUbn7t3jOQVyOlNfjUpJhKPMMobBL2R0KzcptJbUrKc08wZD/TPaXuHKWAE JuA6kFMXtHhV8Qhxz5/d2KUA8ex+zpVd2xSR6q4llcYu1w8zHZtLN+YKSmjjKs+AjiTrCMYs OYxt4cwxuaIIhBNvCC9WqZOxHX7YHmpVcSV6K9Wwhk9mVIU3Ii0G2HWs6OQ0vIueCDGMEdVk ig/a7cVlfXNz7WuaXuhOJmHz6d6Yk4dFn5mLbEY9cZhBxf5hjCwtp9b6v+ueuptfcnOd+38G 9KH6NyHKZyS4jcd3E6Dp0+9Isbl/EohjPCujevoW3/DlT08OKQARAQABzSBJYWluIFIuIExl YXJtb250aCA8aXJsQGZzZmUub3JnPsLBlwQTAQoAQQIbAwULCQgHAwUVCgkICwUWAgMBAAIe AQIXgAIZARYhBKj3ulBB4TMznLoWlnbVgJP1QKvNBQJbdd1aBQkF+TgpAAoJEHbVgJP1QKvN EkwP/2YqUwPxN81uEE62hu37Vsn4USvpuOicFbh4i4reNRDBRtHk/vGvez9lJHC456LWb2pr 0Gg3nSBgeZrjkqdREgnxf3DG6sW5xpEIMXB65MzJ03EVvFrURnbygR6Ft+FOrjDjN1RnpyxP 6zbH15XJpGAI0eEt0oVRk+PUNxXJ6AklG/xqIPj/S9XIHGUAGbGEFdmeG5xphfjTG+fwsEqX cPD5f9QnahtGMxSx6GQKzrx5Mm0Q078ViYW8jhdhPQMQPdYOjZeZ8/UP/SYgv7o+WrTi+Y2v A8wZnmzbAdfL7oqlAfEMcuBijF16NX4i96c23x/W1r6kiazfMd98o9Hvgg9UEOe4VIZeIZ1l KcYO0Q24X69XpdtXERKdwER1hlfkbk4Hw5FQpXA98hE43LMqorSjK4tLa8ndNoMvcNPLsxpi TLKF6pozhqM/FrJ58oKV3sgfSouJ7auzCZOBSHPZ+bkJPtGo4NmOyU7CgFeDowpyayuMwyb+ tHjFafn1sgYC04E79j97nMXBdMoKOoP8Y+txHNzXtXEkgB6jo6PDjKNNy2WmIhA7sANI5Vn0 hiFb7UNKot227pEWm8uDUIcLlNaJoQOOgSGggvHPtNHnSnptEjL2l65X/epXbMk29/xMIspp /tzsYPtbk+RfWQGaC0gm1890ziTuWo3ZY79m9335zsFNBFprf6sBEADOANf22so7uoGcvok2 TM/T8BHI5+TqHEc4hVe+JGGJ1ZnWlgtGmpOs0fOQj3WAgGI0ZmTqMuozKF/K9ljbjaMXsLD+ JIBTD4rINy60VX2zHhmWhNaOcJvq+wbuHx0tMbhqsTStGnSkvRhH61ncMqVqlTTTLVQQSxKl 9D2l7ZGwEPLHRFlydTOOix+F+Y1ehxYLVaPkaycs8wvgjYsDLo3T8TmuOL+rcEfvxJ6lT2V5 I51xqievqoBazAfXvA8FW/0G+Z9LUJmViOVluWg3xjP8okKYgOkOeX00vMBCVaiEA08oaxY0 ebS7uBEgppjWSwn+WAhB+6spd67d4W+DmAnM262lxFMhVYhXpfeV9zygULQOofdE6xtFkaxr /y8xQ4Bf7zX8ko6X9aFQFB/vc+zUtjzjg4VaQvWrThjaHlbEKR55MDxJu2T9S7g5bR4zxZNv 36gwlIdmx33a1AeR1nGcWa/7OtoS53+lUwyFVWLOnucqKh71Y38AAMd5L9Fsb+ArQem71knE UTC+HvBGkPb2Y2PzGnnzhZyC8zgE8AjVD0wB+RMDNI3+fIW6biKAHDqrS6ZCVkzJ1R9nOjXM HRYZ5qlG+rCOeu6Jp4yNwp46z4PqiiLJ9NtmdNttLCEn5PDVF3g9g811JcadvFVH1ZELoDGW Mg3Q+QOHQBFYj7cj2QARAQABwsF8BBgBCgAmAhsMFiEEqPe6UEHhMzOcuhaWdtWAk/VAq80F Alt13YwFCQH3q+EACgkQdtWAk/VAq83bIQ//UEUryjH/AEwY7R2j6KDjQ0QmGsxa+zXN20rG 8YgHkeweBDpIcgT96miYb818kfQn+lAew8mdlOfTpld0YgsVopWxQFumEDUthMD4oYUX5a1m n0YhjtbqlDZwx5jolEnNGPOf0d0hDbOAzie6/rPbdS/yLsBgAp+THfKmxA/PEtQcmtirtUWP XTLNLMGrZFI0pJqsFe9GwLhWejFS+KqS9uWRsHLct1gb61LSbro3sOIUZb/JQf3Vv4mnCViK Ds8qIM5SaIdLY9c8jlYBDJdr5CZw+SDmQN2rWCFWYU07ngs7ETD6Lj47NO+yALntH6gC0Olj Qylt0xyiKdnmwakX7h0PpLbGbyAILZ4a2f8hC/rJhfraLpGVl+E7OdIEbHdySt2HYefMw8A0 8bXvC6/k7t2FXqfQ13uWDOSHjvJodFS5fkfLl0VX/r26B6dGWi3vaMG7skF7hn2VDt9WcRD6 leOUH8AaIFOZRLLoxRlc4A39pFjqvQNt+tzxPZR5L5lSEWlLs/WsePQhn68eIwP3PMN27y32 Jl7DJIMX0eCaR7+wAyBZaeK0+Zw9Oja8tNshWEhkzZhsVIa1iKcekmxPMtpC9lQiOqwurRzu C0elrs4WDU29Lnd1lgeyl7+5jxHXyFMVjnssnHg5ltw/J4G7aYAffxWaFd3wBssRsxkTR4c=
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Tue, 23 Oct 2018 08:49:22 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=oXNhP7 3BD3f4Og1er5FjMaKIRA+H7yO/vNphHQlN094=; b=tzwOxKoZnufLK2aEr40zfR Dbtf487CVksQcjwGhpS3Eq/Rxs2OIcoa0q70hpk/HNnZybMkkoc36DkddDTAP866 p/ZxWqOSiJEDKkgxv5ES2vzmj56NIMS2djcNwOtJvEEqgAjSZyOWz8TWNdE0uCC6 dzqP8XBtE/hVbLj48S1tYFrJHNHmPaWAD2IcUxFTw1vDkye/RShGvjkxGnUK+G/j OHP7Bt+CcSCxFP4bfOkWlOZucIg8HrZeuA0I4PFCUQelv8+IXYe6JglAaQhLEjnr qdL4upLUJSKu05zdxgyY9DcmoSsEWTxl1avFHbXQpDA7slVDvNX21j4DqS4bbquA ==
- In-reply-to: <CAD2Ti2-PP9X-gVqwxTXGW9XszVV7dMmRi=63FMT5QF1+-_EhTg@mail.gmail.com>
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:tor-talk@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- Organization: Tor Project
- References: <CAD2Ti2-PP9X-gVqwxTXGW9XszVV7dMmRi=63FMT5QF1+-_EhTg@mail.gmail.com>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
Hi,
On 23/10/18 01:27, grarpamp wrote:
> Bittorrent users don't need lifetime / PQC level authentication
> between peers, they just need enough to prevent nuisance
> collisions from degrading operations. Today even the less
> than 32 bits of IPv4 (reality: users don't typically brute the ISPs)
> are working just fine for that, and the 80 bits over Onioncat will
> be sufficient for that for forseeable future. Where they need many
> more equivalent bits of strength is likely in encryption, integrity,
> and anonymity, not authentication.
This is an area with a lot of open research questions. I understand that
users have different requirements, but as I understand it, v2 Onion
services will not be around forever and while I don't have data on this
I don't believe that there would be enough users to have the momentum to
fork the Tor network.
> Yes, one cannot rationally overload all 128 bits for that without colliding
> upon allocated IPv6 space that may appear in one's host stack.
> However the 1:1 key network can be larger than 80 bit. One could
> easily play with up to say 125 bits by squatting on entirely
> unallocated space. (Unlike the clear mistake CJDNS made by
> squatting on space already allocated for a specific and conflicting
> real world in stack purpose.) Obviously the common library widths
> of 96 and 112 could be keyed. And request could be made for a
> formal allocation if compatibility and compliance was felt needed
> by some mental gymnastics.
>
> https://www.iana.org/assignments/ipv6-address-space/ipv6-address-space.xhtml
One thing I have discussed with the IETF Internet Architecture Board
(IAB) in the past is some sort of scheme for IPv6 addressing for overlay
networks. The result of that discussion was basically get an allocation
from your RIR. You can get a /32 giving you 96 bits to play with. If you
want you can announce it via BGP and provide gateways to the Internet
but it's not required. This gives you collision-free space.
The direct mapping between the IP address and an Onion service though is
the problem. How do you discover the Onion service public key when you
only have 96-bits of data?
> People would like IPv6 and UDP (even raw IP) transport because
> their host stacks support it, the internet is moving to it,
> many applications simply don't speak .onion or torify poorly,
> and it's an interesting capability to plug into other things.
I think I see it more as a transition-mechanism than an end goal. If I
had the time, it's 50/50 right now whether I would work on v3 OnionCat
or some Onion-native version of a protocol (via some kind of AF_ONION
sockets). An interesting fact I learnt recently is that FTP predates TCP
and was actually "ported" after its original development.
> Whether in Tor or some other existing or new network,
> try getting together to develop it, or white papering why it
> cannot be done in any network ever. Whichever outcome,
> any good research there would be a useful addition
> to the set other projects might reference in developing
> their own work.
+1 would encourage anyone that wanted to do research in this area.
Thanks,
Iain.
Attachment:
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk