05/10/10 18:42, intrigeri:
> Hi,
> 
> the replacement of NTP with HTP has been bringing a lot of issues
> during our RC testing time.
> 
> (
> For the record:
> 
> - Replacing NTP with HTP was decided to protect T(A)ILS users against
>   possible attacks that could be mounted against their Tor usage by an
>   attacker who is able to spoof the NTP replies on-the-fly and thus
>   mess with the system time. AFAIK, no research has ever been done
>   wrt. such attacks. I'm of course not saying they are not possible,
>   pro-active security measures are needed in T(A)ILS. OTOH, I probably
>   should not have dealt with this idea like I did. Looking backwards,
>   a few more important features would have deserved higher priority
>   than this one.
> - The proposal, specifications and initial research about HTP happened
>   in November 2009. Proposals and criteria about a HTP (web)servers pool
>   were made at this time too. The code needed to implement this was then
>   written in august and September 2010. All this needed a lot of time
>   and energy.
> )
> 
> We are now in October 2010, I just uploaded a rc3, and...
> 
> - comments on the wiki indicate that the chosen servers pool has
>   various problems. The main problems I read about were:
>   #1 the two "trusted" servers can trigger suspicion (well, ok, but
>      this pool was proposed almost one year ago...)
>   #2 the "neutral" server has seemingly random response times (ok.
>      any alternative proposal?)
https://secure.wikimedia.org/wiktionary/en/wiki/Wiktionary:Main_Page
https://www.facebook.com/
https://ixquick.com/
https://www.mozilla.com/
https://ssl.scroogle.org/
https://www.fastmail.fm/
https://duckduckgo.com/
# for the following sites the login/registration pages have less
# clutter. still safe?
https://www.paypal.com/se/cgi-bin/webscr?cmd=_registration-run
https://signup.mail.com/UserInformationB.aspx
https://www.myopenid.com/signin
https://en.wordpress.com/wp-login.php
> - additional needs arise:
>   #3 user notification [...] in case of HTP failure (note that we had
>      no such notification in case of NTP failure in 0.5)
> 
> I must say I am starting to be a bit tired and nervous about this
> whole HTP thing. I now need your input to decide what to do with these
> problems... and fix the ones that we consider as blocking for the 0.6
> release.
>
> So, which ones of these do you consider as blocking for the 0.6
> release?
FYI, I wrote all those comments. IMHO, #1 and #2 will only be really
relevant when we make it easy to use Tor bridges only, so I don't see
them as blockers at the moment. #3 isn't a blocker either, just
something that'd be nice for the clueless end-user.
> I am considering reverting the NTP->HTP switch, release 0.6, and deal
> with the last mentioned issues for 0.7 in a more relaxed way.
> I hope someone steps up and deals with these last HTP problems.
I haven't encountered any htp-related bugs in rc3 (except the
lists.debian.org delay, if that can be called a bug), so I'd like to see
it stay.
Cheers!