[Ssc-dev] Fwd: [guardian-dev] New Project: OnionKit for Android

Nathan of Guardian nathan at guardianproject.info
Thu Nov 8 23:29:13 EST 2012


Harlo - I would really like to see OnionKit utilized in InformaCam, in
the same way we are using other library projects like IOCipher,
SQLCipher, etc. It is based on Apache HTTPClient 4.x libraries.

I believe it can also address some of the issues like SSL verification
over Hidden Service, but we might need some debugging there.

Any new features you have implemented around verification would be great
to get integrated into OnionKit, as well.

Let me know what you think!

-------- Original Message --------
Subject: [guardian-dev] New Project: OnionKit for Android
Date: Thu, 08 Nov 2012 16:24:20 +0530
From: Nathan of Guardian <nathan at guardianproject.info>
Organization: The Guardian Project
To: guardian-dev <guardian-dev at lists.mayfirst.org>


Orlib is now OnionKit for Android*. Feedback, comments, reviewers and
contributors are requested. The "Orbot Checker" piece needs the most
work still.

(* We hope there will be OnionKit for iOS as well at some point, based
on our work with the ChatSecure team and the Onion Browser open-source
version of Tor for iOS)

***
https://github.com/guardianproject/OnionKit

OnionKit

Android Library Project for Multi-Layer Network Connections (Better
TLS/SSL and Tor)

The ONION refers to not only Onion Routing used by Tor, but also the
concept of multiple layers of security this library provides.

You can use this library without using Tor, but obviously we think using
strong TLS/SSL connections over Tor is just about the best thing in the
world.

StrongTrustManager
We have implemented a TrustManager for SSL Certificate verification that
we believe is better than the default one provided by Android. For app
developers, it provides for a consistent implementation of TLS/SSL
verification and trust across various versions and devices.

It supports full chain verification, limited pinning, and a custom
cacerts store based on the Debian set of certs. By providing our own
cacert store, we can be assured that certificates are being validated
against a known set of trusted Roots, and not compromised, expired or
other non-desireable entities.

Developers can create their own CACert store using the information
provided by our CACertMan project: https://github.com/guardianproject/cacert

It can be used in combination with the MemorizingTrustManager, to
support user prompted override for non-validating certificates.

Proxied Connections (aka Orlib)
Once Orbot connects successfully to the Tor network, it offers two proxy
servers running on localhost that applications can route their traffic
through.

HTTP Proxy: localhost:8118 SOCKS 4/5 Proxy: localhost:9050

The sample project shows the basics of how to use this library to open
sockets and make HTTP requests via the SOCKS and HTTP proxies available
from Orbot The standard Apache HTTPClient libraries provide calls to
setup proxying. This sample code demonstrates that. All applications
using the SOCKS proxy should not resolve their DNS locally, and instead
should pass the hostnames through the SOCKS proxy.

Orbot Checker
Provides simple helper to check if Orbot (Tor for Android) is installed,
and whether it is currently running or not. Allows your app to request
Orbot to start (user is prompted whether to start or not). Finally, it
can show a user prompt to install Orbot, either from Google Play, or via
direct APK download from torproject.org or the guardianproject.info site.

For apps with on-device servers, it can also assists in requesting a Tor
Hidden Service from Orbot, and discovering the assigned .ONION address.

_______________________________________________
Guardian-dev mailing list

Post: Guardian-dev at lists.mayfirst.org
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev

To Unsubscribe
        Send email to:  Guardian-dev-unsubscribe at lists.mayfirst.org
        Or visit:
https://lists.mayfirst.org/mailman/options/guardian-dev/nathan%40guardianproject.info

You are subscribed as: nathan at guardianproject.info




More information about the Ssc-dev mailing list