13:29:24 #startmeeting 13:29:24 Meeting started Wed Sep 23 13:29:24 2015 UTC. The chair is nickm. Information about MeetBot at http://wiki.debian.org/MeetBot. 13:29:24 Useful Commands: #action #agreed #help #info #idea #link #topic. 13:29:26 good morning! 13:29:49 I see yawning; anybody else here for our last tor dev irc meeting of the month? 13:30:39 ok, could be a short meeting then 13:30:52 hi 13:30:59 status: I'm scrambling to take care of everything that should get done before the dev meeting and for the 0.2.7.3-rc release 13:31:27 I think we're in good shape for 0.2.7.3 13:31:37 do you still need help? 13:31:40 though I wish we were a few weeks ahead 13:31:49 though tomorrow I have erands, and friday I travel :/ 13:32:14 I think I'm in a good place with this... 13:32:24 ok 13:32:59 Also, isabela wrote up a triage thing for us and sent it to tor-dev... but I haven't seen it on tor-dev yet, and I think she's out of communication for a couple of days 13:33:40 I've also been poking the list of proposals and trying to chop out ones that are seriously obsolete, superseded, or out of line for what we intend to develop 13:34:52 (can anybody else find that email from isabela ?) 13:34:55 no 13:35:08 I just checked moderation requests on the tor-dev list and found none :( 13:35:55 We can probably start making a little progress by processing tickets without a milestone, doing an initial severity pass over the stuff in 0.2.8, etc 13:36:10 yeah 13:36:12 Yawning: what have you been up to and can I help at all? 13:36:23 or just get a projector or whatever at the dev meeting and do it then 13:36:32 since we can also get the e-mail from isabela there 13:36:35 true 13:36:39 I'm stuck in documentation hell 13:37:02 Writing about PTs that no one uses. 13:37:09 hmmm. % done? Due when? Editing or writing? Can I help? 13:37:19 almost done, just need to do FTE 13:37:37 https://metrics.torproject.org/userstats-bridge-transport.html?graph=userstats-bridge-transport&start=2013-01-01&end=2015-09-21&transport=websocket 13:37:48 woo 13:38:13 we can probably deprecat that and no one will complain 13:38:18 *deprecate 13:38:44 that == FTE ? 13:38:50 though when it works, it actually does work 13:38:54 no, flashproxy 13:38:56 ah 13:39:07 the thing no one uses because it requres clients to be able to lisen for incoming connections 13:39:16 (tor-fw-helper lol) 13:39:44 (not that many people use FTE either) 13:40:01 (we probably could tell the FTE users to switch to meek/obfs4) 13:40:08 or ask them to try it 13:40:33 but finding one of the ~50-250 people that use fte 13:40:36 prolly difficult 13:40:41 true 13:41:00 if we remove flashproxy + FTE we can stop shipping python in the bundle though 13:41:13 since everything else is go based these days 13:41:44 anyway, yeah, doing this, there is light at the end of the tunnel 13:41:55 that my long dead relatives are calling to me from 13:41:58 >.> 13:42:10 after that, fun hacking I hope! 13:42:26 once this is done I will ignore the world and hack code for like... a few weeks 13:42:31 cool 13:42:36 what do you think you'll want to work on? 13:42:46 dunno, I'll decide when that gets there 13:43:01 ok 13:43:27 can talk about it at the deve meeting 13:43:32 (that I'm also flipping out over) 13:43:35 Good point. So I guess we should also think about stuff we should have sessions for at the dev meeting. I'm thining ticket triage, proposal triage. 13:43:57 I think this will be the best dev meeting ever 13:44:10 I hope everybody's travel goes well 13:44:50 maybe think of stuff that we need proposals for 13:44:51 we should sit down and hammer out our PQ crypto plans 13:44:54 yeah 13:45:11 at least "pq forward secure" 13:45:12 for stuff we need proposals for I'm thinking: PQ crypto, removing old clients, wide-block crypto at last 13:45:15 no good signature algorithm yet 13:45:19 sphincs signatures/keys too big 13:45:33 yeah but IMO forward-secrecy is the problem for now 13:45:39 agreed 13:45:52 anybody who can do shor's algorithm would be an idiot to use it for forging Tor signatures 13:46:17 though we could advance discussions on some of our draft-state hash- chaining proposals. 13:46:58 depends on how easy it is to do shor's 13:47:11 might have some spare machine time after taking over global finance 13:47:18 make that, "Anybody who has a clandestine ability to do Shor's" 13:48:30 oh, dumb question. when evaluating whether to care about grover's algorithm against symmetric stuff, is it sufficient to just look at the key size, or is more analysis needed? 13:48:45 depends on the algorithm 13:49:00 sounds like "more analysis needed" then 13:49:03 there's an attack against NTRU that uses Grover's for example 13:49:06 huh 13:49:08 interesting 13:49:15 hash drbg used as part of the key gen 13:49:22 ("oops", easy to fix) 13:49:25 (should we call this meeting over and just talk about proposals we need?) 13:49:30 I have a meeting point 13:49:33 oh! 13:49:35 hi Sebastian ! 13:49:36 if y'all don't mind 13:49:39 go for it 13:49:40 please go for it 13:50:08 I want to know if you will hate me if I tell arma and sina to "start fresh" with the identity key mappings between rsa and ed25159 13:50:16 and if not, how do we best do that 13:50:29 I haven't looked yet where it's stored 13:50:48 stop authority. Remove the file with "keypin" in its name. Restart authority. 13:51:22 nickm: don't we just want to invalidate the pinnings for the 2 nodes? 13:51:29 "key-pinning-journal" 13:51:35 The reason to start fresh is that we haven't really communicated that this mapping will automatically happen, and it happened accidentally 13:51:55 yeah 13:51:58 I'm thinking if this happened to moria1 and Faravahar, it maybe also happened to other relays 13:52:07 we have mappings for relays too 13:52:11 certainly 13:52:21 i'm sure i said it someplace to somebody. I can totally believe that I didn't say it loud or broadly enough. :) 13:52:35 This whole keypinning thing seems potentially misdesigned. 13:52:54 I wonder if we should just disable it for the first month or two of 0.2.7's lifecycle 13:52:59 I wondered about that. It will be broken if the rsa key ever gets broken. 13:53:06 this is more or less our last chance to do so. 13:54:11 My vote would be in favor of not pinning for now 13:54:16 this sounds like a dev meeting topic 13:54:41 I'm hoping 0.2.7.3-rc comes out before the dev meeting. 13:54:53 ah 13:54:54 I think that disabling keypinning for a couple of months is fine and wise 13:55:23 probably yes 13:55:31 is measurement meeting now or tomorrow? 13:55:40 virgil: tomorrow 13:55:40 opening a ticket, sigh 13:55:45 k. 13:55:46 anything else for this meeting? :) 13:55:57 well, yes, thanks <3 13:56:06 sorry for another ticket on the pile 13:56:23 hey, the end goal is good software 13:56:33 tickets aren't the problem, problems are the problem :) 13:56:38 I know. This is harder to defer than many things :) 13:56:39 we're going to ship with stats right? 13:56:48 looks like 13:56:51 despite the tinfoil hattery around R ? 13:56:52 k 13:57:07 hey, let's be respectful to our skeptics 13:57:13 they keep us transparent 13:57:18 and honest 13:57:29 yeah, I'm wearing a hat too 13:57:30 nickm says '#endmeeting' in 3...2... 13:57:41 #endmeeting