Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Lasse Øverlier

In principle this is (as they write) very similar to earlier papers. The
major catch to their plan may be that if a hidden service already has
chosen its entry guards, and the "modified Tor nodes" are put out there
later - they ("malicious nodes") will therefore not be a part of the
path. But if they already have trusted entry nodes out there and the
client/hidden service selects by default Tor method - their attack (and
earlier ones) should be quite realistic.

Meaning that a hidden service should be very careful of which nodes it
selects as the entry node(s). Maybe Tor should *not* allow new entry
nodes (by default) to be added for hidden services upon unavailability
of old entry nodes because of this? Another option may be separation of
not trusting/adding new entry nodes for hidden services, but still do so
for the Tor client? (There is (was?) an option for StrictEntryNodes in
torrc which should be considered, but I seriously hope critical sites
are not hosted without deep knowledge of how the hidden services are
vulnerable.)

Be safe!

 - Lasse



On 19. okt. 2012 05:12, Lee Whitney wrote:
> I was reading a paper on discovering hidden service locations, and couldn't 
> find any reason it shouldn't work in principle.
>
> However being that I'm a Tor novice, I wanted ask here.
>
> In a nutshell they propose throwing some modified Tor nodes out there that 
> modify the protocol enough to track down the location.  It does take some 
> time, but it doesn't seem like years.
>
> Any comment appreciated, here's a link to the paper:
>
> http://www.cs.uml.edu/~xinwenfu/paper/HiddenServer.pdf
>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread Abel Luck
intrigeri:
> Hi,
> 
> adrelanos wrote (16 Oct 2012 18:28:19 GMT) :
>> Abel Luck:
> 
>>> I need to do more research into what it would take to protect the
>>> localtime. For example, what are the consequences (technically and
>>> UX-wise) of changing the local timezone to, presumably, UTC?
> 
>> UTC is fine. Afaik Tails, Liberte Linux and Whonix are using UTC.
> 
> Since the initial question was about UX too, I feel like I should add
> that many Tails users don't think "UTC is fine". Quite unsurprisingly,
> they are confused when they are shown a clock that is off by a few
> hours, compared to their own idea of what time it is in their current
> location.
> 
> It looks like *displaying* UTC for everybody is a UX failure.

That's exactly what I was worried about. Qubes might be lucky here, in
that the system tray is in dom0 (the VM host), so the VMs can use their
own time and the user's systray applet will still be in their localtime.

Of course the time as displayed inside apps, browsers, email clients,
will be UTC.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Anon Mus

On 19/10/2012 04:12, Lee Whitney wrote:

I was reading a paper on discovering hidden service locations, and couldn't 
find any reason it shouldn't work in principle.

However being that I'm a Tor novice, I wanted ask here.

In a nutshell they propose throwing some modified Tor nodes out there that 
modify the protocol enough to track down the location.  It does take some time, 
but it doesn't seem like years.

My experience is that there s already an easy method of identifying Tor 
hidden service nodes and this takes little time to do.


Let me explain why I come to that opinion.

Having  a static IP net connection, I set up a test web site as a Tor 
service on a Tor middleman server. That server had been a middleman 
server for about a year, no problems, no attempts to hack it in all that 
time.


Within 24hrs of making that Tor hidden service live I could see, in my 
firewall logs, hundreds of repeated attempts trying to hack my server, 
directly from the internet, not via my hidden Tot service. All were 
attempting to access various types of services/permissions which were 
mainly focused on attempting to gain control of a "web page server". All 
attacks were from US based places of higher education (colleges and 
universities), most from establishments where Tor servers were situated 
but not from Tor servers themselves.


Now bearing in mind that I had only EVER requested 1 web page (a blank 
test page - requested about 4 times) from my own Torrified web browser 
(out and back so to speak), and no OTHER (external) page requests were 
EVER received via the Tor hidden service, as shown by its log. Then 
someone must have been able to immediately see the service enter and 
track its source, who then attempted to hack the web server itself and 
it appeared to be a group of about 3 or 4 persons, each trying different 
attack strategy over a 12 hour period. Hundreds of commands were sent, 
many in quick succession as if they were in some sort of script file, 
but some were live, at one point I even watched them live as they were 
coming in as I countered their hack attempts.


As a result of this I did some serious thinking about Tor and came to 
the conclusion that someone out there and I believe it is THE global 
adversary (USA mil/sec) is able see with perfect transparency all Tor 
traffic.


Consider.:

Most Tor users see the Tor connections as merely a set of 3 or 4 
connected nodes over which their traffic is routed, e.g. Tor1 - US, Tor 
2 - Germany, Tor 3 France - EXIT. But in reality then internet is not 
like that, this is only the UPPER structure level. At the lower level 
the packets are routed over many dozens of sub-nodes, these nodes are 
invisible to the Tor map of your traffic. You can find out this info 
yourself if you wish to test out a single ROUTE to another IP address 
just by doing a traceroute url (tracert url for windows) command from a 
command line prompt window.  As you will see this is about a dozen hops 
to the average local url. But this is not the end of the problem, as 
some hops are hidden and they report only a virtual hop back to you.


e.g. lets say a node is in a server in an IBM/US telecoms company based 
in France, then that server will almost certainly be routing ALL its 
traffic through the USA and back to itself (or another node in the same 
company) before sending it on to the next external node. This diversion 
is NEVER reported as ONLY a single "virtual node ip" is quoted. The only 
way you can ever tell its been done is by looking at the time delay, 
however this is also often difficult/impossible to spot because these 
routes are often the fastest on the internet. OK - I know this goes on 
for certain because there are internal tools used within these companies 
to trace the TRUE route and I have seen such servers send their traffic 
in this manner 24/7 - 365. Having discussed this as "wasted effort" with 
a network engineer I was told there is a "payment" made somewhere to 
compensate. At the same time all of this is camouflaged in apparently 
nice and legitimate reasons for it being that way, but when you pull it 
apart you see the lie, but you can't PROVE it.


As about 70% of Europe's internet traffic passes through an IBM/US 
telco's servers then it almost certain that in any one of these Tor node 
to Tor node connections there is at least one sub-nodes that passes the 
traffic through the USA, who is the global adversary using Total Traffic 
Timing Tracking.



You should be able to work the rest out for yourself.




Any comment appreciated, here's a link to the paper:

http://www.cs.uml.edu/~xinwenfu/paper/HiddenServer.pdf

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread Abel Luck
adrelanos:
> Abel Luck:
>> adrelanos:
>>> Hi,
>>>
>>> Is it Amnesic or can it be made Amnesic?
>>>
>>> Or in other words Can you be sure, that after deleting (or wiping)
>>> the torified AppVM no activity can not be reconstructed with local disk
>>> forensics? Could the torified AppVM be securely wiped without any
>>> leftovers? (Leftovers such as swap, or what else?)
>>
>> Regarding deletion of the VM: I was under the impression secure deletion
>> was not possible on modern SSDs.
>>
>> On the other hand, it should be possible to create an AppVM whose
>> writeable diskspace lies in enitrely in RAM.  I'll investigate this.
>>
>>>
>>> Is Tor's data directory persistent, i.e. does it use Entry Guards?
>>>
>> I've not configured this explicitly, do you have any suggestions?
> 
> Tor Browser Bundle users are using persistent Entry Guards.
> 
> Final goal should be to share the same fingerprint with them (web
> fingerprint, traffic fingerprint for local observer). If you manage to
> use Tor Browser in the AppVM and Entry Guards in the TorVM, the
> fingerprint should be the same. Except, that you added strong security
> by isolation for the case of a browser exploit.
> 
> Whonix uses persistent Entry Guards and Tor Browser.
> 
> Persistent Entry Guards are planed for Tails.
> https://tails.boum.org/todo/persistence_preset_-_tor/
> https://tails.boum.org/todo/persistence_preset_-_bridges/
> 
> Tor Browser is planed for Tails.
> https://tails.boum.org/todo/replace_iceweasel_with_Torbrowser/
> 
> Persistent Entry Guards are considered for Liberte Linux:
> Please see recent thread "[tor-talk] Location-aware persistent guards".
> 
> So the answer is yes, I in most cases I recommend persistence for Entry
> Guards and Tor's data dir. The same goes for Vidalia, since it can be
> used to configure Tor and bridges.
> 
> Some further thoughts on persistent Entry Guards:
> On the other hand, non-persistent Entry Guards are more amnesic. So if
> you decide to add a amnesic feature, that should be also possible to do
> with the TorVM.
> 
> There is also in the thread "[tor-talk] Location-aware persistent
> guards" or in the linked ticket
> https://trac.torproject.org/projects/tor/ticket/2653 are though, that
> non-persistent Entry Guards are better suited for people who travel a
> lot / Live CDs.
> 

Hm, interesting. I definitely need to implement persistent entry guards
then, but providing an amnesiac option will be difficult. When would the
user choose such an option, and where?

>> Here's the tor config:
>>
>> https://github.com/abeluck/qubes-addons/blob/master/qubes-tor/start_tor_proxy.sh
>>
>>> Are hardware serials, such as BIOS DMI information, hdd serials etc.
>>> hidden? (For a more comprehensive list of hardware serials and how to
>>> test if them are visible, you could check Whonix less important
>>> protected identifies as reference. [1])
>>>
>> I'm fairly certain this is the case, seeing as how these are all VMs
>> (xen is the hypervisor), but I've not verifier the hunch so I can't make
>> this claim
>>
>> Hm, if you use the Qubes feature that lets you assign PCI (or USB)
>> devices to a VM, then obviously, no.
>>
>> Thanks for the link, I'll investigate some more.
>>
>>> Cheers,
>>> adrelanos
>>>
>>> [1]
>>> https://sourceforge.net/p/whonix/wiki/Security/#less-important-identifies
>>> ___
>>> tor-talk mailing list
>>> tor-talk@lists.torproject.org
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>>
>>
>> ___
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
> 
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread Abel Luck
Abel Luck:
> adrelanos:
>> Hi,
>>
>> Is it Amnesic or can it be made Amnesic?
>>
>> Or in other words Can you be sure, that after deleting (or wiping)
>> the torified AppVM no activity can not be reconstructed with local disk
>> forensics? Could the torified AppVM be securely wiped without any
>> leftovers? (Leftovers such as swap, or what else?)
> 
> Regarding deletion of the VM: I was under the impression secure deletion
> was not possible on modern SSDs.
> 
> On the other hand, it should be possible to create an AppVM whose
> writeable diskspace lies in enitrely in RAM.  I'll investigate this.

This already exists! In Qubes the DisposableVM is RAM only by default.

> 
>>
>> Is Tor's data directory persistent, i.e. does it use Entry Guards?
>>
> I've not configured this explicitly, do you have any suggestions?
> Here's the tor config:
> 
> https://github.com/abeluck/qubes-addons/blob/master/qubes-tor/start_tor_proxy.sh
> 
>> Are hardware serials, such as BIOS DMI information, hdd serials etc.
>> hidden? (For a more comprehensive list of hardware serials and how to
>> test if them are visible, you could check Whonix less important
>> protected identifies as reference. [1])
>>
> I'm fairly certain this is the case, seeing as how these are all VMs
> (xen is the hypervisor), but I've not verifier the hunch so I can't make
> this claim
> 
> Hm, if you use the Qubes feature that lets you assign PCI (or USB)
> devices to a VM, then obviously, no.
> 
> Thanks for the link, I'll investigate some more.
> 
>> Cheers,
>> adrelanos
>>
>> [1]
>> https://sourceforge.net/p/whonix/wiki/Security/#less-important-identifies
>> ___
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
> 
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS: Vidalia

2012-10-19 Thread Abel Luck
adrelanos:
>> Future Work  Integrate Vidalia
> 
> About Vidalia again... I was quickly reading my dev ticket again (
> https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/Dev#SHELLSCRIPTSVidaliabydefaultGraphicalGatewayWAITINGFORVIDALIA0.3.x
> ), why it's not yet integrated into Whonix.
> 
> Summary:
> 
> "One drawback with Vidalia 0.2.15 remains... As soon as you edit torrc
> with Vidalia (i.e. add non-obfuscated bridges, all comments in torrc get
> lost, i.e. comments how to add obfuscated bridges get lost.).
> 
> Solved in 0.3.2-alpha. I am waiting for 0.3.2."
> 
> Another issue was, that Vidalia is explicitly not designed to manage a
> system wide installed Tor. Vidalia can not start/stop a Tor instance, it
> has not started itself.
> 
> Vidalia will also not be able to edit /etc/tor/torrc out of the box,
> because Vialia gets started as user, while /etc/tor/torrc is owned by root.
> 
> I am not sure how to solve it best...
> 
> Running Tor/Vidalia as user is also not the best option, that would
> prevent "sudo service restart tor" (probable also the Fedora
> equivalent). Breaking "sudo service restart tor" and running Tor as user
> is bad, since it can not be updated with by the system apt-get (or the
> Fedora equivalent). (Imagine long running servers.)
> 
> I guess the best might be to have Tor managed by the system (apt-get...)
> and to start Vidalia as a user. To edit /etc/tor/torrc, Vidalia needs an
> exception to have write rights on that file. Vidalia's start/stop Tor
> feature will break, I don't know how that could be solved. You still had
> a Tor which is partially managed by gui and partially managed by cli.
> Relaxing permission on Tor's data dir further for Vidalia broke Tor.
> 
> However, in qubes-os that all might be simpler to solve. Tor/Vidalia get
> updated from dom0?

No, no, nothing is updated from dom0.  All these problems still apply to
Qubes.  A further problem is at tor runtime I need to detect the IP
address of the internal interface, so a static torrc doesn't work.

Moreover, wrt the New Identity button. With several client VMs, multiple
apps using different SOCKSPorts, the behavior of New Identity is confusing.
Does pushing it tear down and construct new circuits for
everything? Only the TransPort? Only X?

Vidalia is extremely useful however, so I need to find some way to
include it. I wonder if the "best" solution isn't to scrap Vidalia and
make something new?

Look at the NetworkManager architecture. It lets the user control system
settings through a client app and daemon. In our case Tor == the daemon
and Vidalia the client.

Of course Vidalia needs permissions to start/stop Tor, which is problematic.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread adrelanos
Abel Luck:
> Abel Luck:
>> adrelanos:
>>> Hi,
>>>
>>> Is it Amnesic or can it be made Amnesic?
>>>
>>> Or in other words Can you be sure, that after deleting (or wiping)
>>> the torified AppVM no activity can not be reconstructed with local disk
>>> forensics? Could the torified AppVM be securely wiped without any
>>> leftovers? (Leftovers such as swap, or what else?)
>>
>> Regarding deletion of the VM: I was under the impression secure deletion
>> was not possible on modern SSDs.
>>
>> On the other hand, it should be possible to create an AppVM whose
>> writeable diskspace lies in enitrely in RAM.  I'll investigate this.
> 
> This already exists! In Qubes the DisposableVM is RAM only by default.

Nice, can you add this to the docs please? I think that is quite a
remarkable feature.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS: Vidalia

2012-10-19 Thread adrelanos
Abel Luck:
> adrelanos:
>>> Future Work  Integrate Vidalia
>>
>> About Vidalia again... I was quickly reading my dev ticket again (
>> https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/Dev#SHELLSCRIPTSVidaliabydefaultGraphicalGatewayWAITINGFORVIDALIA0.3.x
>> ), why it's not yet integrated into Whonix.
>>
>> Summary:
>>
>> "One drawback with Vidalia 0.2.15 remains... As soon as you edit torrc
>> with Vidalia (i.e. add non-obfuscated bridges, all comments in torrc get
>> lost, i.e. comments how to add obfuscated bridges get lost.).
>>
>> Solved in 0.3.2-alpha. I am waiting for 0.3.2."
>>
>> Another issue was, that Vidalia is explicitly not designed to manage a
>> system wide installed Tor. Vidalia can not start/stop a Tor instance, it
>> has not started itself.
>>
>> Vidalia will also not be able to edit /etc/tor/torrc out of the box,
>> because Vialia gets started as user, while /etc/tor/torrc is owned by root.
>>
>> I am not sure how to solve it best...
>>
>> Running Tor/Vidalia as user is also not the best option, that would
>> prevent "sudo service restart tor" (probable also the Fedora
>> equivalent). Breaking "sudo service restart tor" and running Tor as user
>> is bad, since it can not be updated with by the system apt-get (or the
>> Fedora equivalent). (Imagine long running servers.)
>>
>> I guess the best might be to have Tor managed by the system (apt-get...)
>> and to start Vidalia as a user. To edit /etc/tor/torrc, Vidalia needs an
>> exception to have write rights on that file. Vidalia's start/stop Tor
>> feature will break, I don't know how that could be solved. You still had
>> a Tor which is partially managed by gui and partially managed by cli.
>> Relaxing permission on Tor's data dir further for Vidalia broke Tor.
>>
>> However, in qubes-os that all might be simpler to solve. Tor/Vidalia get
>> updated from dom0?
> 
> No, no, nothing is updated from dom0.  All these problems still apply to
> Qubes.  A further problem is at tor runtime I need to detect the IP
> address of the internal interface, so a static torrc doesn't work.
> 
> Moreover, wrt the New Identity button. With several client VMs, multiple
> apps using different SOCKSPorts, the behavior of New Identity is confusing.
>   Does pushing it tear down and construct new circuits for
>   everything? Only the TransPort? Only X?
> 
> Vidalia is extremely useful however, so I need to find some way to
> include it. I wonder if the "best" solution isn't to scrap Vidalia and
> make something new?

Unless you feel, that the Vidalia code base is bad and you better start
fresh, I think it's better to improve Vidalia rather than starting fresh
and it's quite difficult and time consuming to develop such as thing.

https://www.torproject.org/projects/arm.html.en
https://trac.torproject.org/projects/tor/wiki/doc/stem

https://trac.torproject.org/projects/tor/query?component=Vidalia&col=id&col=summary&col=type&col=status&col=priority&col=milestone&col=component&order=priority

https://trac.torproject.org/projects/tor/query?component=arm&col=id&col=summary&col=component&col=type&col=status&col=priority&col=milestone&order=priority

Look quite scary.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread adrelanos
Abel Luck:
> adrelanos:
>> Abel Luck:
>>> adrelanos:
 Hi,

 Is it Amnesic or can it be made Amnesic?

 Or in other words Can you be sure, that after deleting (or wiping)
 the torified AppVM no activity can not be reconstructed with local disk
 forensics? Could the torified AppVM be securely wiped without any
 leftovers? (Leftovers such as swap, or what else?)
>>>
>>> Regarding deletion of the VM: I was under the impression secure deletion
>>> was not possible on modern SSDs.
>>>
>>> On the other hand, it should be possible to create an AppVM whose
>>> writeable diskspace lies in enitrely in RAM.  I'll investigate this.
>>>

 Is Tor's data directory persistent, i.e. does it use Entry Guards?

>>> I've not configured this explicitly, do you have any suggestions?
>>
>> Tor Browser Bundle users are using persistent Entry Guards.
>>
>> Final goal should be to share the same fingerprint with them (web
>> fingerprint, traffic fingerprint for local observer). If you manage to
>> use Tor Browser in the AppVM and Entry Guards in the TorVM, the
>> fingerprint should be the same. Except, that you added strong security
>> by isolation for the case of a browser exploit.
>>
>> Whonix uses persistent Entry Guards and Tor Browser.
>>
>> Persistent Entry Guards are planed for Tails.
>> https://tails.boum.org/todo/persistence_preset_-_tor/
>> https://tails.boum.org/todo/persistence_preset_-_bridges/
>>
>> Tor Browser is planed for Tails.
>> https://tails.boum.org/todo/replace_iceweasel_with_Torbrowser/
>>
>> Persistent Entry Guards are considered for Liberte Linux:
>> Please see recent thread "[tor-talk] Location-aware persistent guards".
>>
>> So the answer is yes, I in most cases I recommend persistence for Entry
>> Guards and Tor's data dir. The same goes for Vidalia, since it can be
>> used to configure Tor and bridges.
>>
>> Some further thoughts on persistent Entry Guards:
>> On the other hand, non-persistent Entry Guards are more amnesic. So if
>> you decide to add a amnesic feature, that should be also possible to do
>> with the TorVM.
>>
>> There is also in the thread "[tor-talk] Location-aware persistent
>> guards" or in the linked ticket
>> https://trac.torproject.org/projects/tor/ticket/2653 are though, that
>> non-persistent Entry Guards are better suited for people who travel a
>> lot / Live CDs.
>>
> 
> Hm, interesting. I definitely need to implement persistent entry guards
> then, but providing an amnesiac option will be difficult. When would the
> user choose such an option, and where?

Difficult question, I don't know. For a quick research on any topic up
would be useful to securely erase all local traces. For other tasks, IM
and such, maybe once in a while and never for long term stuff such as
hidden services.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread adrelanos
Abel Luck:
>>> Future Work  Use local DNS cache to speedup queries (pdnsd)
>> 
>> That could make users more fingerprintable.
>> 
>>> Future Work  Support arbitrary DNS queries
>> 
>> That could make users more fingerprintable.
>> 
> 
> Yup, I'm aware. Really I've no plans to move forward here until 
> something more concrete develops. (I'm looking at who Tails and
> Whonix, who've discussed this issue extensively).
> 
> 
>> What is it needed for anyway? Which things do not work without
>> arbitrary DNS queries?
>> 
> XMPP SRV lookups for one. Not a pressing issue of course.

If you need any "special" DNS features, I don't see why they should be
implemented on the Gateway. They can equally easy more and safely
implemented on the Workstation(s) were needed.

Things I tested: DNSSEC over Tor, DNSCrypt by OpenDNS, httpsdnsd by
JonDos. [1]

There is no reason why ttdnsd or dns cache wouldn't work on the
Workstation/AppVM.

>>> Future Work  Optionally route TorVM traffic through Tor
>> 
>> What is the motivation behind it?
> There is no good reason I can think of yet, I'm just concerened a
> user misunderstanding what a TorVM does (provides torified
> networking to other AppVms), and opening firefox on it or
> something.

I see. Not sure, if possible, but could you remove all such
unnecessary applications? Maybe make it very clear as desktop
background or automatically opening text file?

Whonix as a optional configuration "Hide the fact that you are using
Tor/Whonix". [2] Not sure if the TorVM use can be easily hidden. Users
would have to download the templates over Tor.

[1] http://sourceforge.net/p/whonix/wiki/OptionalConfigurations/
[2]
http://sourceforge.net/p/whonix/wiki/OptionalConfigurations/#hide-the-fact-that-you-are-using-torwhonix
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Andreas Krey
On Fri, 19 Oct 2012 11:25:34 +, Anon Mus wrote:
...
> Within 24hrs of making that Tor hidden service live I could see, in my 
> firewall logs, hundreds of repeated attempts trying to hack my server, 
> directly from the internet, not via my hidden Tot service.

Welcome to the internet. Have an open web server, and it will get
accessed by scum that tries known vulnerabilities: /memberlist.php,
/index.php, /user/soapCaller.bs, thats normal.

> All were 
> attempting to access various types of services/permissions which were 
> mainly focused on attempting to gain control of a "web page server".

How can you tell that from firewall logs? If it just blocks the access
you will only see the source address, but not the actual HTTP request.

...
> attack strategy over a 12 hour period. Hundreds of commands were sent, 
> many in quick succession as if they were in some sort of script file, 

Can you be any more detailed about those attacks? What commands, on
what service, and why do you even get to know the commands if there
is no such service on your computer?

Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds 
Date: Fri, 22 Jan 2010 07:29:21 -0800
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] New Identity button for multiple TorPorts? - was: Review request: TorVM implementation in Qubes OS: Vidalia

2012-10-19 Thread adrelanos
Abel Luck:
> Moreover, wrt the New Identity button. With several client VMs, multiple
> apps using different SOCKSPorts, the behavior of New Identity is confusing.
>   Does pushing it tear down and construct new circuits for
>   everything? Only the TransPort? Only X?

Maybe the Tor developers could elaborate on that?

>From my observations...

The whole stream isolation and switch identity works very well.

You can open "100" SocksPorts (or TranPorts etc.). When you look into
arm, no matter if you have "100" or "1" SocksPort, Tor will not create
any more circuits.

One SocksPort with two different socks auths is actually (internally)
two TorPorts (circuits).

Or one TransPort with three different client addresses is actually three
different TorPorts.

Only if you have "100" SocksPorts and "100" client applications actually
using them at the same time, Tor will open "100" circuits.

All (dirty?) circuits are changed every 10 minutes.

I think Tor has some logic to remember, which circuits were recently
used and are now dirty. From testing: if you issue new identity, this
will switch circuits for all internal TorPorts, which are considered
dirty. Maybe also the idle one (clean) circuits get switched.

The ones, which were not actively needed recently ("100" SocksPorts) are
neither created nor switched.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Lee Whitney
There are actually two possible explanations for what you saw:
1)  Tor was compromised
2)  Your IP was discovered

Maybe the test request you made logged your IP and then it could be
anywhere.  Also as you know people are constantly scanning subnets for
servers.

I don't discount government snooping, it just seems a little crude for
them to be tripping alarm bells on a small unknown target.


On 10/19/12 5:25 AM, "Anon Mus"  wrote:
>Having  a static IP net connection, I set up a test web site as a Tor
>service on a Tor middleman server. That server had been a middleman
>server for about a year, no problems, no attempts to hack it in all that
>time.
>
>Within 24hrs of making that Tor hidden service live I could see, in my
>firewall logs, hundreds of repeated attempts trying to hack my server,
>directly from the internet, not via my hidden Tot service. 


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Lee Whitney
Thanks for your comment Lasse, that makes sense.


On 10/19/12 3:23 AM, "Lasse Øverlier"  wrote:

>
>In principle this is (as they write) very similar to earlier papers. The
>major catch to their plan may be that if a hidden service already has
>chosen its entry guards, and the "modified Tor nodes" are put out there
>later - they ("malicious nodes") will therefore not be a part of the
>path. But if they already have trusted entry nodes out there and the
>client/hidden service selects by default Tor method - their attack (and
>earlier ones) should be quite realistic.
>
>Meaning that a hidden service should be very careful of which nodes it
>selects as the entry node(s). Maybe Tor should *not* allow new entry
>nodes (by default) to be added for hidden services upon unavailability
>of old entry nodes because of this? Another option may be separation of
>not trusting/adding new entry nodes for hidden services, but still do so
>for the Tor client? (There is (was?) an option for StrictEntryNodes in
>torrc which should be considered, but I seriously hope critical sites
>are not hosted without deep knowledge of how the hidden services are
>vulnerable.)
>
>Be safe!
>
> - Lasse
>
>
>
>On 19. okt. 2012 05:12, Lee Whitney wrote:
>> I was reading a paper on discovering hidden service locations, and
>>couldn't find any reason it shouldn't work in principle.
>>
>> However being that I'm a Tor novice, I wanted ask here.
>>
>> In a nutshell they propose throwing some modified Tor nodes out there
>>that modify the protocol enough to track down the location.  It does
>>take some time, but it doesn't seem like years.
>>
>> Any comment appreciated, here's a link to the paper:
>>
>> http://www.cs.uml.edu/~xinwenfu/paper/HiddenServer.pdf
>>
>> ___
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>___
>tor-talk mailing list
>tor-talk@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread somepony
My question is, if you NEVER requested the 1 web page in the first 
place, would you have experienced the same attack?  I mean if I were 
looking for new live Tor services I would probably periodically just 
roll through unknown IPs and check for a live node (or something) as one 
layer of attack.  No live node, move on.  Live node not already 
discovered?  The fact that the node responds (in some manner I'm looking 
for) is enough information, it's possible I don't even care that it has 
anything to do with Tor.


Just a thought, it should be clear I have no idea what I'm talking 
about. e.g. I don't know what your middleman server not getting attacked 
indicates.


Anon Mus wrote:


Within 24hrs of making that Tor hidden service live I could see, in my 
firewall logs, hundreds of repeated attempts trying to hack my server, 
directly from the internet, not via my hidden Tot service.

[...]
Now bearing in mind that I had only EVER requested 1 web page (a blank 
test page - requested about 4 times) from my own Torrified web browser 
(out and back so to speak), and no OTHER (external)

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is this a practical vulnerability?

2012-10-19 Thread Eugen Leitl
On Fri, Oct 19, 2012 at 11:25:34AM +0100, Anon Mus wrote:

> e.g. lets say a node is in a server in an IBM/US telecoms company based  
> in France, then that server will almost certainly be routing ALL its  
> traffic through the USA and back to itself (or another node in the same  
> company) before sending it on to the next external node. This diversion  

While it is no secret that intercontinental fiber taps exist, you 
would not route the traffic itself over the Atlantic to an
intercept and analysis point and then back (you would see that
in giant added latency), but to tap the signal not too
far from the fiber landing point, since you would need to
analyze it in a somewhat big box probably not residing on the seabed.

It is probably easier to local intelligence services to 
co-operate intensively, and intercept data close to exchange
points, and share results of analysis (only sharing realtime
communication taps on a very small set of high value targets).
Such sharing can happen over dedicated channels, or over VPN
tunnels over the public Internet.

> is NEVER reported as ONLY a single "virtual node ip" is quoted. The only  
> way you can ever tell its been done is by looking at the time delay,  
> however this is also often difficult/impossible to spot because these  
> routes are often the fastest on the internet. OK - I know this goes on  
> for certain because there are internal tools used within these companies  
> to trace the TRUE route and I have seen such servers send their traffic  
> in this manner 24/7 - 365. Having discussed this as "wasted effort" with  
> a network engineer I was told there is a "payment" made somewhere to  
> compensate. At the same time all of this is camouflaged in apparently  
> nice and legitimate reasons for it being that way, but when you pull it  
> apart you see the lie, but you can't PROVE it.
>
> As about 70% of Europe's internet traffic passes through an IBM/US  
> telco's servers then it almost certain that in any one of these Tor node  
> to Tor node connections there is at least one sub-nodes that passes the  
> traffic through the USA, who is the global adversary using Total Traffic  
> Timing Tracking.

Passive traffic analysis does not require being part of the Tor
network (though operating a noticeable number of compromised Tor 
nodes would give you additional information which is not easily
available with traffic analysis).

>
> You should be able to work the rest out for yourself.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Multiple servers with SAME hidden service

2012-10-19 Thread Daniel Dennis
After trying to think of privacy flaws in hidden service (which i still
don't like) I began to wonder

What happens if you have MULTIPLE servers with the same hidden service?
As in you have a small VPS which is getting busy and you'd like to share
the load with another VPS. Assuming they know about eachother and works
correctly when the two servers are under the same domain name. What
happens if two servers try to advertise the same service? Will it not
break anything? If might 4/5ths of users only access one server?

Not that I think anyone needs multiple servers for one service.

-- 
http://www.fastmail.fm - IMAP accessible web-mail

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Review request: TorVM implementation in Qubes OS

2012-10-19 Thread adrelanos
adrelanos:
 Future Work  Optionally route TorVM traffic through Tor
>>>
>>> What is the motivation behind it?
>> There is no good reason I can think of yet, I'm just concerened a
>> user misunderstanding what a TorVM does (provides torified
>> networking to other AppVms), and opening firefox on it or
>> something.
> 
> I see. Not sure, if possible, but could you remove all such
> unnecessary applications? Maybe make it very clear as desktop
> background or automatically opening text file?
> 
> Whonix as a optional configuration "Hide the fact that you are using
> Tor/Whonix". [2] Not sure if the TorVM use can be easily hidden. Users
> would have to download the templates over Tor.

This might sound like a less important thing, but I don't think so.

I except people living in censored areas will not be able to download
TorVM rpm's or to download required software (Tor, Vidalia maybe) in the
clear. (That's probable one point where the VM image distribution method
has an advantage.)

> [1] http://sourceforge.net/p/whonix/wiki/OptionalConfigurations/
> [2]
> http://sourceforge.net/p/whonix/wiki/OptionalConfigurations/#hide-the-fact-that-you-are-using-torwhonix
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor on Bluestacks

2012-10-19 Thread sy00963-...@yahoo.fr
When trying to run Tor on Bluestacks (Android App Player for PC), I get "unable 
to start Tor"... any idea??
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Multiple servers with SAME hidden service

2012-10-19 Thread Ein Baot-is
Can't you just use a load balancing proxy instead?
On Oct 19, 2012 2:55 PM, "Daniel Dennis" 
wrote:

> After trying to think of privacy flaws in hidden service (which i still
> don't like) I began to wonder
>
> What happens if you have MULTIPLE servers with the same hidden service?
> As in you have a small VPS which is getting busy and you'd like to share
> the load with another VPS. Assuming they know about eachother and works
> correctly when the two servers are under the same domain name. What
> happens if two servers try to advertise the same service? Will it not
> break anything? If might 4/5ths of users only access one server?
>
> Not that I think anyone needs multiple servers for one service.
>
> --
> http://www.fastmail.fm - IMAP accessible web-mail
>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Android / Tor on x86 - was: Re: Tor on Bluestacks

2012-10-19 Thread adrelanos
sy00963-...@yahoo.fr:
> When trying to run Tor on Bluestacks (Android App Player for PC), I get 
> "unable to start Tor"... any idea??

This is a very esoteric problem. Bluestacks is Windows/Mac closed source
software and I don't see how privacy is one of their goals.

Even if you could get it to work you are one of the very few people
using Tor on that platform.

I think the right people to ask are the Bluestacks maintainers.

What do you want to archive?

Maybe something like http://www.android-x86.org/ will be the better way
to go, but I guess that would require porting/recompiling Orbot for x86.

Running Android applications on x86 could be quite interesting though.

I read sometime ago android browsers are less vulnerable for browser
fingerprinting, because of less features, but didn't check if that's true.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Multiple servers with SAME hidden service

2012-10-19 Thread adrelanos
Daniel Dennis:
> After trying to think of privacy flaws in hidden service (which i still
> don't like) I began to wonder
> 
> What happens if you have MULTIPLE servers with the same hidden service?
> As in you have a small VPS which is getting busy and you'd like to share
> the load with another VPS. Assuming they know about eachother and works
> correctly when the two servers are under the same domain name. What
> happens if two servers try to advertise the same service? Will it not
> break anything? If might 4/5ths of users only access one server?
> 
> Not that I think anyone needs multiple servers for one service.
> 

There was a discussion about hidden service scalability with useful
outcome a while ago.

Added the links here:

https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO#Serversoftware
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor on Bluestacks

2012-10-19 Thread Nathan Freitas
"sy00963-...@yahoo.fr"  wrote:

>When trying to run Tor on Bluestacks (Android App Player for PC), I get
>"unable to start Tor"... any idea??
>___
>tor-talk mailing list
>tor-talk@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Orbot only supports ARM environments as it includes native code.
-- 
Sent from Kaiten Mail. Please excuse my brevity.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] help us:Korean government started to fine netizen who download child pornography without child

2012-10-19 Thread 익명
Due to many sexual illegal behavior, Korean government started to block sexual 
video about under-18-old people(=underage video)
> 
Nowadays, in south korea, they started to arrest people who download underage 
video due to child-teen law(in Korean, 아청법) However, there is big problem. If 
the title of underage sexual video include "teen"or "school uniform", although 
people in that video is adult,
> Citizen who download that video can be arrest and they can be fine
> ₩20,000,000(=$20,000)
> 
> there is many people who download videos whose names include "teen" or
> "school uniform" and which has only adult actors so they'll be fine
> $20,000 although *50-year-old actor wear school uniform*!!
> 
> I think there is *no freedom in south korea's Internet*. The problem
> is they can search private message! Some people was arrested
> because of they share that one with private message!
> 
> Please consider referring this problem in  your blog, website. We want free
> internet. Please help us?
> 
> Please read this article.
> http://www.koreatimes.co.kr/www/news/nation/2012/10/113_122397.html
> 
> Please help us. Child pornography without child is illegal in south
> Korea.
> 
> And there is a member of national congress. She has twitter account.
> @motheryyy
> 
> If you want to help us, please contact me, and her twitter.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk