Delivery-Date: Fri, 22 May 2015 19:50:26 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 10D2E1E1092
	for <archiver@seul.org>; Fri, 22 May 2015 19:50:25 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 382083531A;
	Fri, 22 May 2015 23:50:19 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id EF3DA34FEA
 for <tor-talk@lists.torproject.org>; Fri, 22 May 2015 23:50:14 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id ivILSVX7wyC2 for <tor-talk@lists.torproject.org>;
 Fri, 22 May 2015 23:50:14 +0000 (UTC)
Received: from smtp5.hushmail.com (smtp5.hushmail.com [65.39.178.142])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "smtp.hushmail.com", Issuer "smtp.hushmail.com" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id C61B534F0A
 for <tor-talk@lists.torproject.org>; Fri, 22 May 2015 23:50:14 +0000 (UTC)
Received: from smtp5.hushmail.com (localhost [127.0.0.1])
 by smtp5.hushmail.com (Postfix) with SMTP id 5AE3E60239
 for <tor-talk@lists.torproject.org>; Fri, 22 May 2015 23:50:11 +0000 (UTC)
Received: from smtp.hushmail.com (w5.hushmail.com [65.39.178.80])
 by smtp5.hushmail.com (Postfix) with ESMTP
 for <tor-talk@lists.torproject.org>; Fri, 22 May 2015 23:50:11 +0000 (UTC)
Received: by smtp.hushmail.com (Postfix, from userid 99)
 id 25249A2C88; Fri, 22 May 2015 23:50:11 +0000 (UTC)
MIME-Version: 1.0
Date: Fri, 22 May 2015 19:50:10 -0400
To: tor-talk@lists.torproject.org
From: "l.m" <ter.one.leeboi@hush.com>
In-Reply-To: <CAA+0wAH0RPP4Ga0Qj77wMS70PaF7gmtBJLqjCxOZ+DFyqyQOmw@mail.gmail.com>
References: <555F9ACE.4020707@rawbw.com>
 <CAA+0wAH0RPP4Ga0Qj77wMS70PaF7gmtBJLqjCxOZ+DFyqyQOmw@mail.gmail.com> 
Message-Id: <20150522235011.25249A2C88@smtp.hushmail.com>
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk]
	=?utf-8?q?New_Astoria_Tor_client_is_said_to_be_better_?=
	=?utf-8?q?than=09plain_Tor?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

If tor had a more modular path selection system like pluggable
transports then work like this would be easier. Instead of forking tor
(perfectly fine of course), researchers could propose alternative path
selection algorithms. The proposals could go through a review then
implementation stage. Then clients could choose path selection
according to different threat models (requiring handshake support). A
tunable path-selection makes for some very interesting possibilities.

I look forward to reviewing the AS-inference against an adversary who
really want's to avoid detection by this implementation.

--leeroy

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

