[18597] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: nym-0.2 released (fwd)

daemon@ATHENA.MIT.EDU (cyphrpunk)
Sat Oct 1 19:35:25 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sat, 1 Oct 2005 15:27:32 -0700
From: cyphrpunk <cyphrpunk@gmail.com>
Reply-To: cyphrpunk <cyphrpunk@gmail.com>
To: Jason Holt <jason@lunkwill.org>
Cc: cryptography@metzdowd.com, or-talk@freehaven.net
In-Reply-To: <Pine.LNX.4.63.0510010218470.11649@pl2.zayda.com>

On 9/30/05, Jason Holt <jason@lunkwill.org> wrote:
> http://www.lunkwill.org/src/nym/
> ...
> My proposal for using this to enable tor users to play at Wikipedia is as
> follows:
>
> 1. Install a token server on a public IP.  The token server can optionall=
y be
> provided Wikipedia's blocked-IP list and refuse to issue tokens to offend=
ing
> IPs.  Tor users use their real IP to obtain a blinded token.
>
> 2. Install a CA as a hidden service.  Tor users use their unblinded token=
s to
> obtain a client certificate, which they install in their browser.
>
> 3. Install a wikipedia-gateway SSL web proxy (optionally also a hidden se=
rvice)
> which checks client certs and communicates a client identifier to MediaWi=
ki,
> which MediaWiki will use in place of the REMOTE_ADDR (client IP address) =
for
> connections from the proxy.  When a user misbehaves, Wikipedia admins blo=
ck the
> client identifier just as they would have blocked an offending IP address=
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post