Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove ToxDNS and related stuff from toxcore #1491

Open
ovalseven8 opened this issue Jan 1, 2016 · 18 comments
Open

Remove ToxDNS and related stuff from toxcore #1491

ovalseven8 opened this issue Jan 1, 2016 · 18 comments

Comments

@ovalseven8
Copy link

Hello,

as far as I know, there's the consensus that toxcore should remove ToxDNS at all.

In general, the goal of toxcore is to provide a lighweight, reliable and secure codebase for the clients. The current solution with ToxDNS isn't both secure and decentralized.
Moreover, to use Tox IDs is not such a problem as it probably seems in my opinion. Nonetheless, the clients can of course implement HTTPS lookup services - but that's something that shouldn't be in toxcore.

Are there any plans when to remove ToxDNS and all the related stuff from toxcore?

@GrayHatter
Copy link
Collaborator

@ovalseven8 once it can be replaced with something better.

@ovalseven8
Copy link
Author

I'm not sure whether that justifies to keep it in toxcore.
Additionally, the probably most used service toxme.io only supports HTTPS lookups anymore. It's the client's job.

@subliun
Copy link

subliun commented Jan 2, 2016

@GrayHatter you don't think HTTPS lookups are better than DNS?

@cebe
Copy link

cebe commented Jan 2, 2016

whats the benefit of https over dns? (assuming dnssec is supported for security)

@GrayHatter
Copy link
Collaborator

Https is inherently more secure, because it's been built to be secure.
Rather than security being an after thought (dnssec).

@subliun no, I think https is also broken. But you know that so stop
trolling github
On Jan 2, 2016 8:15 AM, "Carsten Brandt" [email protected] wrote:

whats the benefit of https over dns? (assuming dnssec is supported for
security)


Reply to this email directly or view it on GitHub
#1491 (comment)
.

@subliun
Copy link

subliun commented Feb 26, 2016

@cebe https is encrypted, dnssec isn't.

@GrayHatter In what way to you feel https is broken?

@GrayHatter
Copy link
Collaborator

Https was better because it'd be easier for anyone to create/run a resolve
server. Because it'd be backed by the trust chain already installed on a
users computer. The problem is that you'd have to trust everyone who can
issue a trusted cert. That's fine for web traffic, but Tox needs a higher
level of security. The solution implemented by toxme is just as bad as as
DNS where you have to have the key for each service you want to trust with
the added deficit of https giving a false sense of security.
On Feb 26, 2016 01:42, "subliun" [email protected] wrote:

@cebe https://github.com/cebe https is encrypted, dnssec isn't.

@GrayHatter https://github.com/GrayHatter In what way to you feel https
is broken?


Reply to this email directly or view it on GitHub
#1491 (comment)
.

@LuccoJ
Copy link

LuccoJ commented Feb 26, 2016

@GrayHatter why can't you only trust specific certificates? Just because web browsers have a comprehensive list of certificate authorities doesn't have to mean Tox has to use the same list, it could use a much more narrow one.

No matter what type of encryption and digital signature you're going to you, you will have to trust some signing authority, whether it's built into the client or external.

@GrayHatter
Copy link
Collaborator

@LuccoJ because defining your own cert list is much harder than using the existing on built into the OS, and as I said HTTPS was supposed to be easy. But if you're doing that, why not DNS?

Right, but a huge part of tox is to be trustless (just ask @JFreegman ). I'm fine with trust, but I'm not fine with trusting every TLA. So if we want to be the IM client that protects its users, why HTTPS?

@LuccoJ
Copy link

LuccoJ commented Feb 26, 2016

Right, but a huge part of tox is to be trustless (just ask @JFreegman ). I'm fine with trust, but I'm not fine with trusting every TLA. So if we want to be the IM client that protects its users, why HTTPS?

This will be a problem with any centralized (or even federated) naming system: trustlessness will be impossible. The only real alternative (and I do wish this was pursued) is to use a distributed system, such as for instance the most obvious choice of basing it on namecoin.
However, although I realize blockchain-based systems are not "lightweight", there is no shortcut: it's either that, or a system where you trust someone who's certifying something.
Nobody has found another way to solve Zooko's triangle yet.

@GrayHatter
Copy link
Collaborator

I'm fine with trust.

I'm not fine with trusting [your TLA here]

I'm fine with distributed, centralized, decentralized and federated.

I'm not fine with a blockchain.

@LuccoJ
Copy link

LuccoJ commented Feb 26, 2016

You seem to be fine with a few things that the Tox project at least originally was not. Personally I hope it stays the original way.

Anyway http://perspectives-project.org/ offers a peer-based HTTPS solution that doesn't use CAs; it may be of interest.

@GrayHatter
Copy link
Collaborator

@LuccoJ have you read every line of code in toxcore? And then every line in the client that you use?

Then you're already using trust.

You use github, and I assume IRC, so you've also fine with both decentralized and centralized systems as well.

What exactly do you think I'm fine with that's in opposition to the original idea of Toxcore?

@LuccoJ
Copy link

LuccoJ commented Feb 26, 2016

I'm using distributed trust when I use toxcore, because even though I haven't read every line of code in the client I use, it is possible for everyone to scrutinize it, and it's possible for anyone to blow the whistle if they see a problem.

I use GitHub and IRC but that doesn't mean I'm "fine" with them.
I find GitHub's centralization very worrying, and the worry is more real now since they have been reorganizing their management in potentially troubling ways.
I find the fact that open, distributed projects use a closed, centralized service like GitHub to host their code quite ironic (but perhaps unavoidable for now: there are possible future alternatives in early stages, like IPFS or Sia; look them up and see below).

IRC is pretty much terrible both in terms of reliability and security, whether or not you use it in a centralized way (freenode-style) or in a federated way (like most other networks).

The reason I'm interested in Tox is because it is different and hopefully in most ways better than this sort of legacy, not because it's more of the same.

I'm also interested in many other distributed systems, of which there is a long list at https://github.com/redecentralize/alternative-internet
Tox isn't unique (see Ring), and will only remain interesting if it stays true to its promise of distributedness, not if it becomes a dubious mixed system.

@GrayHatter
Copy link
Collaborator

Right, but that was my point. I'm fine with them as long as they are the right tool for the job.

And github can do anything it likes, because if they do anything shady, FOSS will jump ship. Once that happens github will stop existing. Meanwhile, they can't do anything directly with code because git is very resistant to that.

Just like Toxcore is and should be. If you're using toxme.io, or register.utox.org, you're already using centralized systems. With the requirement that you trust them.

Trust, and centralized systems aren't bad. Just easy to abuse.

@subliun
Copy link

subliun commented Feb 27, 2016

@GrayHatter so can dns be removed from core now?

@JFreegman
Copy link
Contributor

Yes

@subliun
Copy link

subliun commented Feb 27, 2016

@JFreegman \o/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants