Delivery-Date: Sat, 08 Aug 2015 13:57:05 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id D09CB1E0312;
	Sat,  8 Aug 2015 13:57:02 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id CF316364FB;
	Sat,  8 Aug 2015 17:56:52 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 759FB3621D
 for <tor-talk@lists.torproject.org>; Sat,  8 Aug 2015 17:56:49 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id woFR3WUZVBYU for <tor-talk@lists.torproject.org>;
 Sat,  8 Aug 2015 17:56:49 +0000 (UTC)
Received: from latitanza.investici.org (latitanza.investici.org
 [82.94.249.234])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "smtp.autistici.org",
 Issuer "Autistici/Inventati Certification Authority" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 4BB45352BE
 for <tor-talk@lists.torproject.org>; Sat,  8 Aug 2015 17:56:48 +0000 (UTC)
Received: from [82.94.249.234] (latitanza [82.94.249.234]) (Authenticated
 sender: shark@canaglie.org) by localhost (Postfix) with ESMTPSA id
 449B312081F
 for <tor-talk@lists.torproject.org>; Sat,  8 Aug 2015 17:56:41 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canaglie.org;
 s=stigmate; t=1439056603;
 bh=D23QiNSi1BnklMAbWQk0BS9w+hin7Ggxos5/wGAAuI8=;
 h=Date:From:To:Subject;
 b=Oy/JPh44cqwPTJ+GENbBN9sOdvpw/O/58VCctCSUNMan2x7eDjfvL0bGFDciDl+Wk
 vsrdWjtkpIuDAjnKI5ViIwnWjmAyWZDs3mKxyhDUgWVmsRPICKj1hM4s2cNUffxPWD
 IxRcTcEKKGb8+tPJ+dAhy0O2J6aawcdsVGpDiB/0=
Message-ID: <55C642E5.8020505@canaglie.org>
Date: Sat, 08 Aug 2015 17:56:53 +0000
From: MaQ <shark@canaglie.org>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] General question regarding tor, ssl and .onion.
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Seth and et al,

Thank you very much for the answers. It basically confirmed what I
thought. Was also experimenting with a self-signed cert anyway as people
connecting would already have a direct association.

My thoughts after answers, while not knowing how everything works behind
scenes, are the browser fights to establish https, then .onion (or vice
verse) and slow or intermittent Internet connections presents problems
with socks?

Also, while it was said that .onion encryption was of lower standard,
wouldn't a high degree of privacy and randomness still be assured,
except for maybe alphabet agencies and more nefarious types out there
specifically targeting a subject or .onion addresses in general, and
some serious work and resources would have to go into pinpointing and
breaking said encryption?

Mark
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

