Namecoin .onion to .bit linking

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Hello Tor-Dev, One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback. First off, I'm curious what the various use cases are for this. The main use case I'm aware of is if a user is aware of a .onion domain already, and is trying to find a human-memorable way to access it. (As far as I can tell, the reverse is not a use case, because if you already trust the .bit domain by name but don't know what .onion you're looking for, presumably Namecoin already does what you want.) Is this correct? Am I missing any other significant use cases? Second, I'm looking for feedback on my rough approach. The approach I'm looking at right now is to have a Namecoin namespace for .onion backlinks to .bit domains, which is separate from the Namecoin namespace for .bit domains. The backlink namespace would have a name field whose prefix is the .onion domain. We can't prevent a squatter from registering an exact match of the .onion in Namecoin, but by using a prefix and checking the signature on all matches, we can avoid the impact of squatters. (The cost of obtaining new names would be a deterrent for someone trying to flood a .onion prefix with invalid backlinks as a DoS.) The value field would contain a signature of the domain name being pointed to, signed by the .onion key. The .onion key could also sign revocations of an endorsement of a .bit domain; these would also be in that namespace. Is this generally a good approach? I'm aware that cross-protocol attacks need to be carefully considered when signing things with a .onion key -- do you have suggestions on how I can sign a short JSON string of the rough form {"name": "d/domain", "rev": 0} (which corresponds to endorsing domain.bit, and not being a revocation of that .bit domain) in a way that won't open up attacks on the .onion key's normal protocol usage? I'll write up a more formal spec after feedback is received, just to make sure I'm not missing some important details. Cheers, - -Jeremy Rand https://namecoin.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVW0v7AAoJEAHN/EbZ1y06C+AP/3RxO99cPoBQ6eRcY9cefqlC HGnfUtxfAa7Ao2Ea2ZatHjA36ordtz6vo9UpJKDXXLPuQFMnsW/Xf6m2ePCKPssG uivWnAqoZ/zFaJFXf6RqgADrbUei7jW75DFmJfwhPka3kh76mF/B3mMIRx9bCOIq r8XcKRlmbFv55j0srg2Z6SBpq8aMumxGjStjyzsW8L6bVtBvz4DwN5rAZG958Hm3 ji7b6r+v05s4dIbJ6ZAqerOVmy6PA+sAZ0cqwzCBBttdIoVzGiuc9S6aAn8+XjWa ycx7wUi3YM27Kyor8N2+pYDgECmMYEC9QBKN6XwtsW6Lwz9UCNaZ4BQR5JWIxwLg FTZ1uV/E7o3cKdiPzlCkzoQetifom8la6ezPOpr4XhVuzLWqHJBm4eA+qEwEPSFC DA4k/HEgJKNUZGFWuXpIyEAl3Nvyy3cxTYyrzzMmbvBJnzMGM18Sa+D9N78ih3Sw GgXIET336wnvd+HqcVT85io7Ee3Wj+05IOyH4mhV06AXJuP1RvFAKJk6d1i5lOKC Sr2GrJNnP8zP1uq57XQxpKg7fkVqBMzjFY9JJ6HIkffLsGzLpZ8CUSU2+8tPGeDt T3MAT3GKqXCIjIiQy39Ban27ixeJyxzq8dN3T2HvnUNna0M9v3VhxQjeauNzjHTk 9ekMPDGGT7X9TmLOvSXq =WbCd -----END PGP SIGNATURE-----

On Tue, May 19, 2015 at 09:43:30 -0500, Jeremy Rand wrote:
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
First off, I'm curious what the various use cases are for this. The main use case I'm aware of is if a user is aware of a .onion domain already, and is trying to find a human-memorable way to access it.
I'm not familiar with Namecoin, but I thought I'd just point out that someone will be working on OnioNS, the onion name system, as part of the SoP in Tor. The person who will be working on it just sent an e-mail to this very list yesterday. You two seem to be after the same "human-readable way to access .onion domain names" target as you yourself described, so there might be room for collaboration. -- Daniel Martí - mvdan@mvdan.cc - http://mvdan.cc/ PGP: A9DA 13CD F7A1 4ACD D3DE E530 F4CA FFDB 4348 041C

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 05/19/2015 10:02 AM, Daniel Martí wrote:
I'm not familiar with Namecoin, but I thought I'd just point out that someone will be working on OnioNS, the onion name system, as part of the SoP in Tor. The person who will be working on it just sent an e-mail to this very list yesterday.
You two seem to be after the same "human-readable way to access .onion domain names" target as you yourself described, so there might be room for collaboration.
I'm aware of OnioNS, but haven't yet had time to thoroughly read the proposal. It's certainly on my to-do list, if nothing else for cross-pollination of ideas. - -Jeremy -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVW1WyAAoJEAHN/EbZ1y06VmgQANTvkb4YiQ513LKSERk77wFD hNIhyFhcawSGXW1/GcJ8JJSxH1Z/MZrqVKaxYvly+qjdKKGwifX4VfAbWBhorolb 1RGIeqaI2ew++c0Ofj0wvDmpiEkYiXeA+7hJyVFhQV2RN9lSwOCzuWp6Ipoh7OZc FZdwq+RHHjoyq4jGehA8BM9lgGnSASryVOndRs7CSvz1dNBuHDaKL5M5vXaF0Sio d/+GjsIgUbAIC7qxWYawWkIbaayL2pw5kKE5Mgvb94b9S4yPp4LUWOVMcF6bHN9n nu8mMbMbShLVchShXlWVhits2eRmD65Y4rFkf8m0wwyNA4G/HvoEInDcq+kF6jiX HjApkn1lQVZlvM/+8ijt98JzAK+nb8RgUvxoenlYo89eJUee5H7gE0i1nL8zatOG hJKvbp1zObqCDkw0LC03NKUiLcoKKniXPgHcYAzLPjB7H4ke+8luV8PVcF80TJN+ DirVSxcXvbOs9OB9ooXb2peZeH73JmBz54BdTcHNr7UELCyF6Kft9pmr4idEIorJ f/qP48F36QuFFdbqKs1A/wwsQFrWskirtHWDX6CiFFoTRlcbhC2G0aWWkZXqK0q4 fSwlmTFDdNkIYPb5DBVhArLlcoi77jPtm8CMYH1VLvOCvA8KS1hZYzZwD6iOr/0E j/hbIs/FfMLLMHULxgnf =d+xp -----END PGP SIGNATURE-----

On 5/19/15 4:43 PM, Jeremy Rand wrote:
Hello Tor-Dev,
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
At Tor2web we've been considering using Namecoin for those features: https://github.com/globaleaks/Tor2web/issues/30 https://github.com/globaleaks/Tor2web/issues/66 If someone want to hack on those feature, we'd love to support! :) -- Fabio Pietrosanti (naif) HERMES - Center for Transparency and Digital Human Rights http://logioshermes.org - https://globaleaks.org - https://tor2web.org - https://ahmia.fi

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 05/20/2015 04:36 AM, Fabio Pietrosanti (naif) - lists wrote:
On 5/19/15 4:43 PM, Jeremy Rand wrote:
Hello Tor-Dev,
One of the criticisms of Namecoin which seems to be raised sometimes is that the current domain namespace spec doesn't have a method for a .bit domain owner to prove that they are in control of a .onion. (This is also an issue for .bit domains that point to .i2p.) I'm interested in improving this situation, and am looking for feedback.
At Tor2web we've been considering using Namecoin for those features:
https://github.com/globaleaks/Tor2web/issues/30 https://github.com/globaleaks/Tor2web/issues/66
If someone want to hack on those feature, we'd love to support! :)
Ah cool, thanks for the heads up; I wasn't aware that Tor2web was looking at that use case. Good to see that there's interest there. Cheers, - -Jeremy -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVXahkAAoJEAHN/EbZ1y06IDkP/10y0K27UZgFfUiKdxuCz0Lo jCYo5HwjD3usluF1nIpMnN29za1HtiqbRPkHmYnXVAx4L9hESB9oyw+2lS0XxDBu ZmncPhSJR/KTo8HJ3T7DbQsWqXzqUaaxuNCSYJKVRdZLejV6GDVJ57Fy2XlJTQ7p lQitFASjoH+2uhRa6a6DtHHXCph9LxCo6zvjA0CowEjDWaQYWuYyeL+uDz2bEr4X Q12t0PYoYFamz2i/3yzg39pyWJN16k7Qmi13DPkQiM2bB4/jNWej471DtZ0dE+KN dd9bM2srxfQVV/bd4LAB2OFo/zy3PPuAe/VenuZ4gSaW0QZfGEn4Vc09KvxnVFtD 19joxzOsAfvJ+Lk0ma+X7hy/m5G62RLLrcu7m2+4B27GXIVH8mTTx9ooyUDvYeBM sh0K8XtnTRivXmalg0BvPcVJnOIXD+p22N8mF5CXbBgjfKbKMFZYa6Cb+DNZmwPd eh/Llb/a4ktS4oo4hy8xZpE0cBGsuTWoomrZK3mFYBmPDggLvzUevUj3TAfIuyWZ exnVw9ELruIX85K9h/vXF2LxYAyTWyfd5x9mXVeB71KZnUi74NmKL38FcLtZNMTT OYztzK4FLl2FGcvYKGgdCBmwWB/yPFJBjzHk0HX9cI624IFD4Oh/Ok50oU18Szgg xG4BEtWm9OwtpEnzY3Nm =Ed/X -----END PGP SIGNATURE-----
participants (3)
-
Daniel Martí
-
Fabio Pietrosanti (naif) - lists
-
Jeremy Rand