Delivery-Date: Fri, 31 Oct 2014 09:51:17 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 9FCC61E00D8;
	Fri, 31 Oct 2014 09:51:15 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 0465A318CE;
	Fri, 31 Oct 2014 13:51:12 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 8E2E13188F
 for <tor-talk@lists.torproject.org>; Fri, 31 Oct 2014 13:51:08 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id mT7rBbP5kllg for <tor-talk@lists.torproject.org>;
 Fri, 31 Oct 2014 13:51:08 +0000 (UTC)
X-Greylist: delayed 5594 seconds by postgrey-1.34 at eugeni;
 Fri, 31 Oct 2014 13:51:08 UTC
Received: from emea01-db3-obe.outbound.protection.outlook.com
 (mail-db3on0130.outbound.protection.outlook.com [157.55.234.130])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "mail.protection.outlook.com",
 Issuer "MSIT Machine Auth CA 2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 438613183E
 for <tor-talk@lists.torproject.org>; Fri, 31 Oct 2014 13:51:08 +0000 (UTC)
Received: from DB3PR01MB0747.eurprd01.prod.exchangelabs.com (25.160.52.18) by
 DB3PR01MB170.eurprd01.prod.exchangelabs.com (10.141.3.19) with
 Microsoft SMTP
 Server (TLS) id 15.1.6.9; Fri, 31 Oct 2014 12:17:50 +0000
Received: from DB3PR01MB0748.eurprd01.prod.exchangelabs.com (25.160.52.19) by
 DB3PR01MB0747.eurprd01.prod.exchangelabs.com (25.160.52.18) with
 Microsoft
 SMTP Server (TLS) id 15.1.6.9; Fri, 31 Oct 2014 12:17:50 +0000
Received: from DB3PR01MB0748.eurprd01.prod.exchangelabs.com ([25.160.52.19])
 by DB3PR01MB0748.eurprd01.prod.exchangelabs.com ([25.160.52.19]) with mapi id
 15.01.0006.000; Fri, 31 Oct 2014 12:17:50 +0000
From: "Murdoch, Steven" <s.murdoch@ucl.ac.uk>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Thread-Topic: Facebook now available at https://facebookcorewwwi.onion/ 
Thread-Index: AQHP9QSw6sPWs+yqZkC4QOEQ1smOrw==
Date: Fri, 31 Oct 2014 12:17:50 +0000
Message-ID: <F9246562-3073-4F94-8679-AA0EEBC28C6A@live.ucl.ac.uk>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [86.187.114.230]
x-microsoft-antispam: BCL:0;PCL:0;RULEID:;SRVR:DB3PR01MB0747;UriScan:;
x-ucllive-sclrule: HASRUN
x-forefront-prvs: 03818C953D
x-forefront-antispam-report: SFV:NSPM;
 SFS:(10019020)(55674003)(199003)(189002)(82746002)(15975445006)(105586002)(50986999)(31966008)(85306004)(97736003)(86362001)(92566001)(33656002)(77096002)(101416001)(92726001)(16236675004)(21056001)(74482002)(95666004)(87936001)(76482002)(66066001)(80022003)(85852003)(54356999)(83716003)(110136001)(2656002)(19580395003)(120916001)(122556002)(2351001)(106116001)(64706001)(99396003)(229853001)(107886001)(19617315012)(40100003)(107046002)(20776003)(106356001)(4396001)(46102003)(450100001)(104396001);
 DIR:OUT; SFP:1102; SCL:1; SRVR:DB3PR01MB0747;
 H:DB3PR01MB0748.eurprd01.prod.exchangelabs.com; FPR:; MLV:sfv;
 PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
MIME-Version: 1.0
X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:DB3PR01MB170;
X-OriginatorOrg: ucl.ac.uk
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Facebook now available at https://facebookcorewwwi.onion/
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Facebook have now provided a Tor hidden service, see:
 https://www.facebook.com/notes/protect-the-graph/making-connections-to-fac=
ebook-more-secure/1526085754298237

=97
Facebook Onion Address

Facebook's onion address provides a way to access Facebook through Tor with=
out losing the cryptographic protections provided by the Tor cloud.

The idea is that the Facebook onion address connects you to Facebook's Core=
 WWW Infrastructure - check the URL again, you'll see what we did there - a=
nd it reflects one benefit of accessing Facebook this way: that it provides=
 end-to-end communication, from your browser directly into a Facebook datac=
entre.

We decided to use SSL atop this service due in part to architectural consid=
erations - for example, we use the Tor daemon as a reverse proxy into a loa=
d balancer and Facebook traffic requires the protection of SSL over that li=
nk. As a result, we have provided an SSL certificate which cites our onion =
address; this mechanism removes the Tor Browser's =93SSL Certificate Warnin=
g=94 for that onion address and increases confidence that this service real=
ly is run by Facebook. Issuing an SSL certificate for a Tor implementation =
is - in the Tor world - a novel solution to attribute ownership of an onion=
 address; other solutions for attribution are ripe for consideration, but w=
e believe that this one provides an appropriate starting point for such dis=
cussion.

Over time we hope to share some of the lessons that we have learned - and w=
ill learn - about scaling and deploying services via the Facebook onion add=
ress; we have many ideas and are looking forward to improving this service.=
  A medium-term goal will be to support Facebook's mobile-friendly website =
via an onion address, although in the meantime we expect the service to be =
of an evolutionary and slightly flaky nature.

We hope that these and other features will be useful to people who wish to =
use Facebook's onion address.

Finally, we would like to extend our thanks to Ms. Runa Sandvik and to Dr. =
Steven Murdoch of UCL for their kind assistance and generous advice in the =
development of this project.

Alec Muffett is a Software Engineer for Security Infrastructure at Facebook=
 London.
=97

Best wishes,
Steven

-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

