Delivery-Date: Mon, 29 Feb 2016 15:04:35 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id CB70D1E0B13;
	Mon, 29 Feb 2016 15:04:33 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id D8C8F3A12B;
	Mon, 29 Feb 2016 20:04:28 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id CC4E33A11D
 for <tor-talk@lists.torproject.org>; Mon, 29 Feb 2016 20:04:25 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id oGbjs0BcWQ8z for <tor-talk@lists.torproject.org>;
 Mon, 29 Feb 2016 20:04:25 +0000 (UTC)
Received: from mail-vk0-x22d.google.com (mail-vk0-x22d.google.com
 [IPv6:2607:f8b0:400c:c05::22d])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id A14873A0F3
 for <tor-talk@lists.torproject.org>; Mon, 29 Feb 2016 20:04:25 +0000 (UTC)
Received: by mail-vk0-x22d.google.com with SMTP id k196so146816668vka.0
 for <tor-talk@lists.torproject.org>; Mon, 29 Feb 2016 12:04:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :cc; bh=HoOxVPbPJgMd28jrZJ1+iexwSxiFiD8QHvc5epZha0M=;
 b=w0XhEpNehFjEuuApHHqpqNBF0Cr54EoZdhhpmQJTXgYl6R7m+RJiBinNHAa9mUIlJ1
 KkU687jhsnhfEDp4jjE+zQF4gwGbaVWGOdPB9bnoNUWlpfWJHOASPGytBfIIozRq/A5z
 t+Ll3xiY/K0LlguP7eSgcfjBdYvzBa73M884TMKEv3Igk9N5eDRBYEoktc8ahw63HVEi
 7Kv5i4MWJtYsB9UXIAbhTJ9SPsgg0AnY0ge33G4q5mubVrKT9uA1KJwaIFW4A3DzcZK2
 QpxB93h44CvYVVR8e3PW7W0/WhrQDthVjkr0ompCeJQUcQKgvW0l2SXpZaLGBgxPBoYh
 OU0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:mime-version:in-reply-to:references:date
 :message-id:subject:from:to:cc;
 bh=HoOxVPbPJgMd28jrZJ1+iexwSxiFiD8QHvc5epZha0M=;
 b=mM0Xop+5VTJQRIqBFyCs3X5QzTZV1Wz2Wc6KesfBFMHqoW58Fr9M3tajhVBTJESc0B
 F49JHU+pOvyVZJ9OR8h6dKH7PYusR/4mxchK6/ppy6k8J1N/EbjwL8yNMESY3z69KrpD
 58BIF0aeVzyBV3oWeWn0ein5iHor+hgWo2tfO2fMMIhJ5cx0X0W6DTCGyi+35/waXnbt
 67mprLOjWuvb9iAQiiMatJdcQwnrp1PJi+HZqEaDpZU0LCa77M9RCwS43kLs68lLh8pt
 NPlAsx8YOYhDr/Ve6WKI/H6S4ru+kq3ogUgjp8kstnCxLWJNaTGuqYTMsmED5yUAsPPv
 qZFA==
X-Gm-Message-State: AD7BkJKlCCBVwPIZUr2EmRiO1vtQUdHfe3uRze8zIAEEW/e9rFz9kinypq+RHevJBvk7SBP/bhjjfUj3RRfisQ==
MIME-Version: 1.0
X-Received: by 10.31.2.14 with SMTP id 14mr13113088vkc.9.1456776263084; Mon,
 29 Feb 2016 12:04:23 -0800 (PST)
Received: by 10.176.69.5 with HTTP; Mon, 29 Feb 2016 12:04:22 -0800 (PST)
In-Reply-To: <20160229113804.GC2571@sivokote.iziade.m$>
References: <20160229074429.GA2571@sivokote.iziade.m$>
 <CAD2Ti2_+348bjcA5eaNrqvECU45=eJPspu0xhPdj4hntuP0cHQ@mail.gmail.com>
 <20160229100643.GB2571@sivokote.iziade.m$>
 <CAD2Ti29is2Z-6qJFgh8OG1UrAHPae++PZyfZ1-iuADXG=Bd9pQ@mail.gmail.com>
 <20160229113804.GC2571@sivokote.iziade.m$>
Date: Mon, 29 Feb 2016 15:04:22 -0500
Message-ID: <CAD2Ti2911evPsw0dZQWXvTr9Wgu6Su5PHDytQc81iAUJgMde9w@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: cypherpunks@cpunks.org
Cc: messaging@moderncrypto.org, p2p-hackers@lists.zooko.com,
 tor-talk@lists.torproject.org, cryptography@metzdowd.com
Subject: Re: [tor-talk] Once again: Tor timing attacks and a Tor confession
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 2/29/16, Georgi Guninski <guninski@guninski.com> wrote:
> Replace "sufficiently decent" by "perfect", or define it to be "provably
> intractable" and do not assume hardness not proved unconditionally, like
> P != NP.

So long as each node accounts for negotiated contract rate
with peers, and generate fill for missing packets on the inbound
links when output the other side, and reclock all the input when
output to a fixed rate, and add random jitter to the output links
to mask time spend negotiating and compensating for the input
junk received... it would seem range from reasonable sufficient
to damn hard.

It's an enhanced level of the fixed bucket clocks in old school
ATM / TDM that people seem to forgot about...

https://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode#Traffic_policing
https://en.wikipedia.org/wiki/Time-division_multiplexing

There was even talk on one of these lists about doing fill
not just in the overlay networks, but also doing it, along
with automatic pfs style encryption in the layer zero link
hardware itself (ethernet PHY, etc) by starting an IEEE / IETF
working group... every switch, router and NIC port everywhere.

Some OP threads for ref:
https://cpunks.org/pipermail/cypherpunks/2016-February/012436.html
metzdowd: "traffic analysis" Jan 2015
My spam on @cpunks @torproject
Etc et al

Encrypted fill traffic is at least worth thinking about, thus cc.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

