[tor-dev] Naming Systems wiki page

Jeremy Rand jeremyrand at airmail.cc
Tue Sep 27 14:05:21 UTC 2016

Jesse V:
> On 09/27/2016 02:27 AM, Jeremy Rand wrote:
>> Hello!  I just had a chance to look through the latest state of the wiki
>> page (thanks to everyone who's been expanding it).  I've added several
>> items to the security properties and drawbacks sections of Namecoin, and
>> made a few trivial corrections; hopefully none of them are
>> controversial.  (If anyone thinks I made a mistake, please let me know.)
>> I notice that kernelcorn added an item to the "drawbacks" section of
>> Namecoin, which says "Hard to authenticate names."  It's not entirely
>> clear to me what is meant by this item, so it's hard for me to evaluate
>> its accuracy.
>> Any chance Jesse could elaborate on this?
> My mistake. I was thinking about authenticating the RSA keys with
> Namecoin's ECC keys, but after further thought this is not a proper
> criticism so I have removed it.


> Since you're checking factual accuracy of the items in the wiki, you can
> find the OnioNS pre-print here:
> https://github.com/Jesse-V/OnioNS-literature/raw/master/conference/conference.pdf

Ah, excellent, some reading material!  Much appreciated, I'll read
through that when I next catch a break.  I'm quite curious to see how
things have evolved since I last checked out OnioNS in any detail (which
would have been about a year ago, I guess).

>> PS: Happy to see that OnioNS is still being worked on -- I think it's
>> great to have more of the solution space explored and more options
>> available, regardless of the fact that OnioNS and Namecoin could be
>> considered competitors.  We're all in this together, and I'd love to see
>> both OnioNS and Namecoin succeed.  :)
> Namecoin is the closest competitor. They are very different designs of
> course. In any event, naming systems should become more desirable once
> proposal 224 is deployed.

Yes, 224 seems to be making systems like OnioNS and Namecoin quite a bit
more urgently useful.

> I'm also competing with OnionBalance now since OnioNS supports basic
> load-balancing at the name level. :)

Namecoin also can be used for name-level load balancing, although I
haven't really carefully considered the anonymity effects of the load
balancing (e.g. does it open the risk of fingerprinting?), so that
feature is lower priority until I can think about that more carefully.
I'm curious how OnioNS is handling that -- maybe there's some thinking
in OnioNS's design that's adaptable to Namecoin?


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20160927/2471bfb7/attachment.sig>

More information about the tor-dev mailing list