-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Hello Tor-Dev,
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
First off, I'm curious what the various use cases are for this. The main use case I'm aware of is if a user is aware of a .onion domain already, and is trying to find a human-memorable way to access it. (As far as I can tell, the reverse is not a use case, because if you already trust the .bit domain by name but don't know what .onion you're looking for, presumably Namecoin already does what you want.) Is this correct? Am I missing any other significant use cases?
Second, I'm looking for feedback on my rough approach. The approach I'm looking at right now is to have a Namecoin namespace for .onion backlinks to .bit domains, which is separate from the Namecoin namespace for .bit domains. The backlink namespace would have a name field whose prefix is the .onion domain. We can't prevent a squatter from registering an exact match of the .onion in Namecoin, but by using a prefix and checking the signature on all matches, we can avoid the impact of squatters. (The cost of obtaining new names would be a deterrent for someone trying to flood a .onion prefix with invalid backlinks as a DoS.) The value field would contain a signature of the domain name being pointed to, signed by the .onion key. The .onion key could also sign revocations of an endorsement of a .bit domain; these would also be in that namespace. Is this generally a good approach? I'm aware that cross-protocol attacks need to be carefully considered when signing things with a .onion key -- do you have suggestions on how I can sign a short JSON string of the rough form {"name": "d/domain", "rev": 0} (which corresponds to endorsing domain.bit, and not being a revocation of that .bit domain) in a way that won't open up attacks on the .onion key's normal protocol usage?
I'll write up a more formal spec after feedback is received, just to make sure I'm not missing some important details.
Cheers, - -Jeremy Rand https://namecoin.org
On Tue, May 19, 2015 at 09:43:30 -0500, Jeremy Rand wrote:
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
First off, I'm curious what the various use cases are for this. The main use case I'm aware of is if a user is aware of a .onion domain already, and is trying to find a human-memorable way to access it.
I'm not familiar with Namecoin, but I thought I'd just point out that someone will be working on OnioNS, the onion name system, as part of the SoP in Tor. The person who will be working on it just sent an e-mail to this very list yesterday.
You two seem to be after the same "human-readable way to access .onion domain names" target as you yourself described, so there might be room for collaboration.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 05/19/2015 10:02 AM, Daniel Martí wrote:
I'm not familiar with Namecoin, but I thought I'd just point out that someone will be working on OnioNS, the onion name system, as part of the SoP in Tor. The person who will be working on it just sent an e-mail to this very list yesterday.
You two seem to be after the same "human-readable way to access .onion domain names" target as you yourself described, so there might be room for collaboration.
I'm aware of OnioNS, but haven't yet had time to thoroughly read the proposal. It's certainly on my to-do list, if nothing else for cross-pollination of ideas.
- -Jeremy
On 5/19/15 4:43 PM, Jeremy Rand wrote:
Hello Tor-Dev,
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
At Tor2web we've been considering using Namecoin for those features:
https://github.com/globaleaks/Tor2web/issues/30 https://github.com/globaleaks/Tor2web/issues/66
If someone want to hack on those feature, we'd love to support! :)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 05/20/2015 04:36 AM, Fabio Pietrosanti (naif) - lists wrote:
On 5/19/15 4:43 PM, Jeremy Rand wrote:
Hello Tor-Dev,
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
At Tor2web we've been considering using Namecoin for those features:
https://github.com/globaleaks/Tor2web/issues/30 https://github.com/globaleaks/Tor2web/issues/66
If someone want to hack on those feature, we'd love to support! :)
Ah cool, thanks for the heads up; I wasn't aware that Tor2web was looking at that use case. Good to see that there's interest there.
Cheers, - -Jeremy