Delivery-Date: Tue, 19 May 2015 08:59:53 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id D724F1E08C9
	for <archiver@seul.org>; Tue, 19 May 2015 08:59:50 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 0D2803562E;
	Tue, 19 May 2015 12:59:47 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3009D355BC
 for <tor-talk@lists.torproject.org>; Tue, 19 May 2015 12:59:44 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id SAwlwHA-2WMP for <tor-talk@lists.torproject.org>;
 Tue, 19 May 2015 12:59:44 +0000 (UTC)
Received: from gerbil.it (unknown [107.6.175.158])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id D217D3558C
 for <tor-talk@lists.torproject.org>; Tue, 19 May 2015 12:59:43 +0000 (UTC)
Received: from mailpile.local (localhost.localdomain [127.0.0.1])
 (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by gerbil.it (Postfix) with ESMTPSA id 0C6341C27D80;
 Tue, 19 May 2015 07:59:37 -0500 (CDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gerbil.it; s=default;
 t=1432040380; bh=6eB/bJ6HnscbxzH/NSk47m6iMme8/0i6k0GPHqklS+A=;
 h=Subject:From:To:In-Reply-To:References:Date;
 b=lViSRXkoIIiWWtgPkF9ThGHOXkWeFHDm1DQlA0a5JcWfsTseylR97XX0jyTY/HhhM
 qFVu3RYo/dg7x6B7tWxlu/uG0ACZNumCJRasLR0jvsrxwM6ONo8MVmNiz3bdKncMKQ
 GDcY8AHbswHo6FcM0eL/ILUrWFpOs978T6CdwThY=
MIME-Version: 1.0
From: Ben <ben@gerbil.it>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
In-Reply-To: <20150519122411.1D49BA2912@smtp.hushmail.com>
References: <20150519122411.1D49BA2912@smtp.hushmail.com>
Date: Tue, 19 May 2015 12:00:42 -0000
Message-Id: <20150519120020-728-41173-mailpile@mailpile-home>
OpenPGP: id=1F9164D62373F057DF3971567F57C6686ACBCC6D; preference=signencrypt
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Making a Site Available as both a Hidden Service and
 on the www - thoughts?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


> >You plan to
> >deploy on a locally run user site yet you claim to be conscious of
> >breaking the production server. It does not follow.
> 
> More typo. You stated somewhere you intend to deploy to a test site
> run locally. Something to that effect. I hope I'm not quoting you out
> of context. 

Without going back to have a look, I don't know if it's out of context,
but my suspicion is I wasn't entirely clear :)

I'll be running a test, yes, but the changes (and subsequent testing)
will happen in the production environment. I've some issues with my dev
environment which I need to address, so whilst I could use it for basic
tests, I'm not sure they'd necessarily be valid. 

Although I see it as a big enough change that it needs some thought
first (most of which is done), it's not so big that I feel I have to
consider it gated by the dev-env issues, especially as I've a different
site to test it against.

So the test will be against a live site but one with a much lower
traffic footprint (and one that, in worst case downtime won't lead to my
inbox being spammed). Basically, all I'm trying to avoid at the moment
is the things that are either severe, or will take a while to correct
(such as getting canned in Google's indexes), everything else will be tested and measured as I go.


> You just need to be concerned with ensuring trust of your
> site by not doing anything silly. Such as selling their data,
> embedding exploitable code, not caring that your client really doesn't
> want to use javascript, etc. All the things you would do with a HS
> anyway.

It's a pity we live in a world where that could be considered HS
specific, but yes you're right - some of the bits I've also been
thinking about relate to whether there's anything on the www-front that
I'd consider either un-necessarily risky or less acceptable on a .onion.


There shouldn't be any, but I don't subscribe to the idea that it's your
problem if you've got JS enabled - I need to be at least considering
whether there's anything you might not want via an .onion that's
considered acceptable on the www. (Analytics is a reasonable example -
if you're accessing .onions through a gateway and www. traffic egresses
normally, the analytics package can tie your .onion session to your real
IP)


> Without the constraint of hiding like the worst of tor.

Having set up more than a few HS with that aim (though it wouldn't be
liberty/life threatening if I made a mistake - I'm fortunate to be in
that position) I have to admit it'll be nice to not have to do too much
on that aspect.


> Congratulations on giving your clients a choice and for being a good
> model of tor use.
> 

Based on your counter example, I think the same is (or will be) very
much due to you - longer term, I probably will dig deeper into that side
of it, partly because we don't know what the future will hold, but also
it gives me something new that isn't work to tinker around with :)
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

