Onion Service address discovery using Sauteed Onions
2022-06-27, 16:00–17:00 (UTC), Team 1

Sauteed Onions is an innovative yet simple mechanism for Onion Services address discovery of public services using Certificate Transparency (CT) logs.

This is a Hackweek proposal to test and study Sauteed Onions as well as to (hopefully) develop some tooling.

Sauteed Onions can be used for censorship circumvention and may also serve as another way of doing
Onion Names.

Possible activities include:

  • Test Sauteed Onions on (some) of The Tor Project's domains (see this issue for details).
  • Test Sauteed Onions on additional, community-provided domains.
  • Design, basic implementation and/or test new or existing tools like:
  • A backend resolver API behind Onion Services.
  • A Tor Browser Bundle add-on that queries a Sauteed Onions resolver as an alternative to the Onion-Location Header.

What are the skills required in your team to work on this project?

What we'll do really depends on the aggregated skills in the team, such as:

  • System administration skills for test and deploy Sauteed Onions by creating
    Onion Services for existing sites, setting the Sauteed Onion DNS record and
    generating TLS certificates with the Sauteed Onion Subject Alt Name for the

  • Coding skills depending on the tools to be developed.

  • UX skills.

  • People with experience with CT Logs :)

Onionprobe maintainer.

This speaker also appears in: