[tor-reports] Yawning's January 2015 - April, 2015.

Yawning Angel yawning at schwanenlied.me
Thu Apr 30 16:25:01 UTC 2015


The past:

 - Attended the developer meeting in Valencia.
 - obfs4proxy is deployed in Orbot, Tails and Tor Browser now.
 - Wrote a bunch of things regarding what a PT needs to be deployed
   (yet to be published, ongoing).
 - Talked to researchers about PT designs/implementations, provided
   assistance as necessary.

 - Tagged 2 new obfs4proxy releases.
   - ScrambleSuit client support.
   - Internal SOCKS5 server to replace goptlib's SOCKS4 server.
   - Significantly better behavior when the parent tor instance dies
     for any reason.
   - Various minor cleanups/bug fixes.
   - Things related to Dust2 integration.
     - Logging support moved to common.
     - Logging initialization order moved to really early in the
       process lifetime.

 - Poked at other PT codebases.
   - The minor branch for meek for the Orbot people that allows a
     SOCKS5 proxy to be used even without the Firefox helper. (#15158)
   - A experimental unmerged meek branch that attempts to rate limit.
   - goptlib workaround for #15240.
   - Rebased the goptlib SOCKS5 branch on master (#12535, not yet
     merged).
   - Started tentatively poking at designing obfs5 (AKA tentp) (#15232).

 - PT spec changes (Wrote/contributed to)
   - TOR_PT_EXIT_ON_STDIN_CLOSE (#15545)
   - Deprecating "*" as a transport specifier (#10131)

 - Worked on Tor core
   - Helped get the 0.2.6 stable release out.
   - Helped plan the 0.2.7 feature set.
   - Added some new features
     - Adding hidden services through control port (#6411, merged)
     - Base64 code cleanups (#15652, merged)
     - Tor should prctl(PR_SET_PDEATHSIG, SIGTERM) background processes
       (#15471, merged)
     - Tor should not close stdin on child processes (#15435, merged)
     - get_interface_address6() behaviour iff all interface addresses
       are internal (#12377, WIP)
   - Investigated/Fixed a lot of bugs.
   - Reviewed tons of branches (big ones listed)
     - Controller: add a command to fetch HS descriptor from HS dirs
       (#14847)
     - Allow controllers to post HS descriptors to the HSDir system
       (#3523)

 - Various random hackery/navelgazing/yakshaving (not comprehensive)
   - Fixed a few torsocks bugs (#13294, #15498, #15504, #15584, #8137) 
   - A Go control port library (https://github.com/Yawning/bulb)
   - A reverse-torsocks (https://github.com/Yawning/onionwrap)
   - poly1305-donna in Go (https://github.com/Yawning/poly1305)
   - Taught myself Rust, contributed to rust-crypto

The future (in no particular order, probably not all next mo):

 - Continue to work on specifying PT requirements/guidelines, and
   characterizing the big picture.
 - Write that obfs4 blog post.
 - Figure out what needs to happen for obfs4proxy 0.0.5 Debian packages.
 - Finish up the pt spec cleanups (#15545)
 - Work more on the obfs5 (tentp design)
 - Do what needs to be done to assist PT developers/researchers.
 - Tor core things
   - Work with my student to specify a clean interface for external
     name resolution helpers (TSOP).
   - Implement Bridge Guards and other anti-enumeration defenses (#7144)
   - All the various "make curve25519 faster" tickets.
   - Obfsbridges should be able to "disable" their ORPort (#7349)
   - Minor pluggable transport things for 0.2.7.x
     - Bring sanity to the tor side of the PT shutdown process (#15593)
     - Tor should consider stderr output of transport proxies (#9957)
   - OpenSSL 1.1.0-dev compatibility (#15760), maybe.  Kind of hard and
     low-ish priority for now.
   - Give lots of thought to the BridgeAuth.
   - (Probably a ton of things I forgot).
 - Mentor my TSOP student.

-- 
Yawning Angel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-reports/attachments/20150430/c52560a5/attachment.sig>


More information about the tor-reports mailing list