[tor-dev] First release of OnioNS for beta testing

Xinwen Fu xinwenfu at gmail.com
Sat Aug 8 12:25:33 UTC 2015


Fantastic work. Will test it.

Xinwen Fu

> On Aug 8, 2015, at 2:45 AM, Jesse V <kernelcorn at riseup.net> wrote:
> 
> Happy Saturday everyone,
> 
> At long last, 310 commits later, I am pleased to present a release of the Onion Name System (OnioNS), a DNS for Tor hidden services. This release is a usability test; it offers reliable behind-the-scenes integration with the Tor Browser, a friendly command-line dialog for claiming domain names and subdomains, and many options for hosting and configuring a server. The system utilizes two servers: a single Quorum node which hidden services upload their claims to and another server which clients query against. I am looking for feedback as to how usable the system is and areas where it could be improved. Most of the changes going forward will be behind-the-scenes.
> 
> The software is divided into three primary pieces, OnioNS-client, OnioNS-HS, and OnioNS-server. These all have OnioNS-common (a shared library) as a dependency. You can install whichever one you'd like, or all of them. This software is currently Linux-only, and Debian 7 and 8, Ubuntu 14.04 - 15.10, Mint 17 - 17.2, and Fedora 21 - 23 are supported. I provide packages for Debian 7 and a software repository for currently-supported versions of Ubuntu and Mint on 32-bit, 62-bit, and ARM systems. If possible, please use the repository.
> 
> Please see the READMEs in the following repositories for more information, including installation, initialization, and configuration procedures. Manpages are also included for your convenience.
> https://github.com/Jesse-V/OnioNS-common
> https://github.com/Jesse-V/OnioNS-client
> https://github.com/Jesse-V/OnioNS-HS
> https://github.com/Jesse-V/OnioNS-server
> Please star the repository if it works well for you.
> 
> I have claimed "example.tor" for my project's HS and claimed the "arma.example.tor" subdomain that points to Roger's site, so you can test this from the client. Please open a ticket if you find a new bug, or contact me if you don't have a Github account.
> 
> A brief FAQ:
> 
> Q: How does one pronounce "OnioNS"?
> A: As one would pronounce the lowercase form: "onions", the plural of "onion".
> 
> Q: It only takes a couple of minutes to claim a domain name, isn't that too easy?
> A: In this release, I have set a very small difficulty level. It will certainly be harder in the future and more counter-measures are being considered. Also, since the claims are not yet saved to disk, I offer no guarantee of their long-term survival.
> 
> Q: Should I use this on production hidden services?
> A: No, this software is not ready. This release introduces _features_, not security. Tor circuits are used on both the client and HS side, but I can't guarantee that my SOCKS use is leak-proof, for example. I'm asking for help with finding bugs that may compromise anonymity.
> 
> Q: I'm running Windows/OSX/BSD/Arch/Gentoo/LFS/etc, can I test OnioNS?
> A: Yes, but I'm not currently supporting that environment, so you're mostly on your own. However, if you can give me compilation instructions, I may be able to. I am also looking to coordinate with anyone familiar with RPM or Windows development.
> 
> Q: Is there security on your network communications?
> A: Client and HS communication occurs over Tor circuits, and there are some integrity checks, but simply getting everything to work is the priority here. Most of the infrastructure is set up so adding signatures and such will be easy, but that is next on the list. Once that occurs, the name server (Mirror) the client uses can be malicious with no significant impact.
> 
> Q: Where can I learn more about this project?
> A: The normal project page, onions55e7yam27n.onion, is currently being rewritten. A simple page is in its place, so "example.tor" is still there. Literature on this project may be found at https://github.com/Jesse-V/OnioNS-literature. Please see the PDFs under the respective folders. Note that the distributed design will be changing to use George's commit-and-reveal scheme.
> 
> Q: Are the servers reliable enough to run under Comcast?
> A: I have not tested them in production or otherwise under https://github.com/tylertreat/comcast, but I may in the future. I welcome help in this area.
> 
> Enjoy,
> Jesse V.
> 
> 
> 
> 
> _______________________________________________
> tor-dev mailing list
> tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


More information about the tor-dev mailing list