Delivery-Date: Wed, 05 Nov 2014 12:21:13 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id D2F111E087B;
	Wed,  5 Nov 2014 12:21:11 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 478FF30422;
	Wed,  5 Nov 2014 17:21:08 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 21D71302DB
 for <tor-talk@lists.torproject.org>; Wed,  5 Nov 2014 17:21:05 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id aByHnaRT7VnL for <tor-talk@lists.torproject.org>;
 Wed,  5 Nov 2014 17:21:05 +0000 (UTC)
Received: from forward10l.mail.yandex.net (forward10l.mail.yandex.net
 [84.201.143.143])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "forwards.mail.yandex.net",
 Issuer "Certum Level IV CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E75B42F61A
 for <tor-talk@lists.torproject.org>; Wed,  5 Nov 2014 17:21:04 +0000 (UTC)
Received: from smtp1h.mail.yandex.net (smtp1h.mail.yandex.net [84.201.187.144])
 by forward10l.mail.yandex.net (Yandex) with ESMTP id D539DBA1A21
 for <tor-talk@lists.torproject.org>; Wed,  5 Nov 2014 20:20:30 +0300 (MSK)
Received: from smtp1h.mail.yandex.net (localhost [127.0.0.1])
 by smtp1h.mail.yandex.net (Yandex) with ESMTP id 7D2C3134005E
 for <tor-talk@lists.torproject.org>; Wed,  5 Nov 2014 20:20:30 +0300 (MSK)
Received: from pool-71-251-206-3.nwrknj.fios.verizon.net
 (pool-71-251-206-3.nwrknj.fios.verizon.net [71.251.206.3])
 by smtp1h.mail.yandex.net (nwsmtp/Yandex) with ESMTPSA id ZNiSEewA6b-KSiWeaiH; 
 Wed,  5 Nov 2014 20:20:29 +0300
 (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits))
 (Client certificate not present)
X-Yandex-Uniq: 53a78d4b-a217-4713-8759-ac4bb9f9387b
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail;
 t=1415208029; bh=POjR2dgerKKYF9xw/8Ozr6c+0XZOIgAOIorCDqoZ4RI=;
 h=Date:From:To:Subject:Message-ID:Mail-Followup-To:References:
 MIME-Version:Content-Type:Content-Disposition:In-Reply-To:
 User-Agent;
 b=QemavkssUSm11qS1UvD9ngv500sGjxaIC6foePMRJr2wvvXBJSjG1fIAQZqLlfq2Y
 1yFgnKAW2a7HbRrFB5GBZlPzwM2x6+efpaKA6vWfLC3tCnz5psLFqgN1hZZjZ3ztLs
 qi7AKsjSnju4g1WdbChy02LXGhiVUEN4MtgCenOc=
Authentication-Results: smtp1h.mail.yandex.net; dkim=pass header.i=@yandex.ru
Date: Wed, 5 Nov 2014 17:20:36 +0000
From: =?utf-8?B?0JDRgNGC0YPRgCDQmNGB0YLQvtC80LjQvQ==?= <art.istom@yandex.ru>
To: tor-talk@lists.torproject.org
Message-ID: <20141105172036.GG23074@localhost>
Mail-Followup-To: tor-talk@lists.torproject.org
References: <CAD2Ti28BFsedyPC7VBR-Rz8c2_4CAQDnBFopnRHEX45sgqmjtA@mail.gmail.com>
 <CA+cU71kXqh-rcfNZErN0QHJ_L2POCJgm8ibAp2H=S4OFVgz2Rg@mail.gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <CA+cU71kXqh-rcfNZErN0QHJ_L2POCJgm8ibAp2H=S4OFVgz2Rg@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Subject: Re: [tor-talk] Platform diversity in Tor network [was: OpenBSD
 doc/TUNING]
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Wed, Nov 05, 2014 at 10:15:48AM -0600, Tom Ritter wrote:
> On 5 November 2014 03:04, grarpamp <grarpamp@gmail.com> wrote:
> > On Tue, Nov 4, 2014 at 12:25 PM, Libertas <libertas@mykolab.com> wrote:
> >> I think it would be a good idea to add OpenBSD to doc/TUNING because [...]
> >> promoting OpenBSD relays benefits the Tor network's security.
> >
> > Absolutely. Not just due to OpenBSD's security positioning, but
> > moreso from network diversity. Windows is its own world.
> 
> I tried installing OpenBSD once... it was tough, heh.
> 
> Coming from a Windows background, I like the idea of running more
> nodes on (up-to-date, maintained) Windows servers.

Using Windows + Tor contradicts with the fact of collusion US
corporations with US government to commandeer Internet.
> 
> I'll also throw out the obvious that if we're talking about diversity
> for the purposes of security, the network-accessible parts of tor rely
> on OpenSSL, which would probably be difficult to swap out, but might
> be worth it as an experiment.  Even if it's to LibreSSL.  Maybe the
> zlib library also, but that one's had a lot fewer problems than
> OpenSSL.

If I remember correctly there was commit(s) for libressl support.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

