dir-spec.txt and directory-signature entries

2011-02-14 Thread J
The final entries in a consensus document are a number of directory-
signature entries.

dir-spec.txt says:

cite

  directory-signature SP identity SP signing-key-digest NL Signature

This is a signature of the status document, with the initial item
network-status-version, and the signature item
directory-signature, using the signing key.  (In this case, we
take
the hash through the _space_ after directory-signature, not the
newline: this ensures that all authorities sign the same thing.)
identity is the hex-encoded digest of the authority identity
key of
the signing authority, and signing-key-digest is the hex-encoded
digest of the current authority signing key of the signing
authority.

/cite

Does that mean The hash from the network-status-version entry to the
*first* directory-signature entry including a SP?

Or something else? The wording in dir-spec.txt is ambigous to me.

Any help appreciated.

Cheers
/Jocke
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Practical web-site-specific traffic analyses

2010-08-01 Thread Steven J. Murdoch
On Fri, Jul 30, 2010 at 12:32:43PM -0700, Seth David Schoen wrote:
 The simplest threat scenario for Tor users would be when an
 attacker in a position to observe a particular user's traffic,
 but not any exit node traffic, hypothesizes that the user is
 likely to visit a particular site and builds up a profile of
 what web browsing traffic to that site will look like.  The
 attacker could then try to confirm the hypothesis that the
 user is using that site and also try to infer some details of
 what the user is doing.  This is quite different from traffic
 confirmation because the attacker only has to be present at
 one end.

Yes, this has been a known risk with all currently deployed
low-latency anonymity systems. One recent paper which looked at the
problem was discussed here:

 
http://conspicuouschatter.wordpress.com/2009/11/13/in-real-time-from-ccsw09-more-website-fingerprinting/

and the full paper is here:

 
http://www-sec.uni-r.de/website-fingerprinting/ccsw09_website-fingerprinting.pdf

What they found is that single-hop proxies were easily broken (95%
accuracy), but multi-hop systems were more of a challenge. The attack
against JonDo was about 20% accurate and against Tor it was only 3%
accurate.

This doesn't mean that multi-hop systems are safe though, because the
attack assumed that the anonymity system didn't add any extra traffic.
In fact, Tor and JonDo do add quite a bit of extra traffic, and it was
probably this which confused the attack. Much of this traffic can be
identified and if it were removed before the traffic analysis was
performed, the accuracy would likely go up by quite a bit.

To fix this attack, systems can add dummy traffic (padding), delay
packets, and/or drop packets. Tor adds a bit of padding, but unlikely
enough to make a difference. Tor doesn't (intentionally) drop or delay
traffic.

More research is needed before we will know how to best to use and
combine these traffic analysis resistance techniques. I co-authored a
paper on some aspects of this problem, but while the combination of
delaying and padding is promising, more needs to be done before this
can be deployed in a production system:

 http://www.cl.cam.ac.uk/~sjm217/papers/pets10topology.pdf

Steven

-- 
http://www.cl.cam.ac.uk/users/sjm217/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: unsubscribeā€¸

2009-05-14 Thread j xd



unsubscribe

2009-05-14 Thread j xd



Re: unsubscribe

2009-05-12 Thread j xd



Re: Gsoc Idea: Lunux Tor/Firefox Bundle

2009-03-26 Thread Steven J. Murdoch
On Wed, Mar 25, 2009 at 02:24:28PM -0400, Ringo Kamens wrote:
 This sounds like it could be a cool project. You might look into running
 it all inside a virtual machine with Qemu or VMWare. Damn Small Linux or
 Knoppix would probably be a good distro to run in the virtual machine.

One constraint of the Linux bundle is that it shouldn't require root
access. This might cause a problem for running a virtual machine.

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


Re: tor-browser bundle on XP

2009-01-22 Thread Steven J. Murdoch
On Sat, Jan 17, 2009 at 09:28:20PM +, mikel.ander...@juno.com wrote:
 I understand and agree about getting too close to the bleeding-edge.
 I look forward to TBB w/FF3, with anticipation.  Thank you for all
 your hard work.

Tor Browser Bundle 1.1.8 now includes Firefox 3 (3.0.5 to be precise).
It can be downloaded from the usual place:

 https://www.torproject.org/torbrowser/

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/



Re: How I Learned to Stop Ph34ring NSA and Love the Base Rate Fallacy

2008-11-22 Thread Steven J. Murdoch
On Sun, Sep 28, 2008 at 12:27:11PM +, The23rd Raccoon wrote:
 This post performs some basic analysis of the utility of timing
 correlation attacks against a moderately used anonymous network,
 specifically with respect to the Base Rate Fallacy[1] of Bayesian
 statistics. Via that same analysis, it also for the first time begins to
 quantify the utility that additional users bring to a low latency
 anonymous network in terms of resistance to timing attacks.

George Danezis has discussed this post on his blog:

 
http://conspicuouschatter.wordpress.com/2008/09/30/the-base-rate-fallacy-and-the-traffic-analysis-of-tor/

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


Re: IRC problems with Tor

2008-10-28 Thread David J. Bianco
The idea is that you then configure your IRC client to use 10.40.40.40
(or whatever IP you chose) as the server's IP address.  From your description,
I couldn't tell if you had also done that or not.  If not, that's probably
the reason it's not working.

David

Grozdan wrote:
 I then went to the freenode site and looked up information on how to make 
 freenode work with Tor. In the documentation, it said to add the below line 
 to my torrc file - http://freenode.net/irc_servers.shtml#tor
 
 mapaddress  10.40.40.40  mejokbp2brhw4omd.onion
 
 and then to restart Tor, which I did. But I keep getting the same response 
 from freenode and it doesn't allow me to connect at all.
 


Re: Geode: some more headaches for TorButton? :-P

2008-10-09 Thread J B

thanks to you guys who helped me unsubscribe.

however, note that actually my (yahoo) address has full headers and I dont see 
any way to unsubscribe, apart from how you guys said to do it.
I checked the headers and there is nothing about it, even under word search.
I think these headers only arrive to certain people, maybe using mail clients 
etc, yahoo doesn't deliver them or they get stripped out some how

Whoever is responsible for this list might wanna add an attachment to all 
emails on how to unsubscribe as none of the emails I ever got showed how to do 
so in headers or anywhere else. thanks good luck.

--- On Thu, 10/9/08, Tom Hek [EMAIL PROTECTED] wrote:

 From: Tom Hek [EMAIL PROTECTED]
 Subject: Re: Geode: some more headaches for TorButton? :-P
 To: or-talk@freehaven.net
 Date: Thursday, October 9, 2008, 4:11 AM
 It's really scary when a random website can request your
 physical 
 location imo.. I really hope you can disable that shit in
 the new 
 version of Firefox when they include it..
 
 Tom
 
 Marco Bonetti wrote:
  Link bounced from /.:
 http://labs.mozilla.com/2008/10/introducing-geode/
  
  Looks like the upcoming versions of firefox will ship
 the support for W3C
  geolocation specification: what's better for a tor
 attacker to ask
  directly to the browser where its user lives? ;-)
  I'm quite confident there'll be a way to
 (easily?) disable this feature
  but it's scaring stuff nevertheless.
  
  ciao
 


  


Re: same first hops

2008-10-08 Thread J B
someone tell me how to get off this list

i dont see any instructions included in any emails on how to leave
the emails are way way too much



--- On Wed, 10/8/08, F. Fox [EMAIL PROTECTED] wrote:

 From: F. Fox [EMAIL PROTECTED]
 Subject: Re: same first hops
 To: or-talk@freehaven.net
 Date: Wednesday, October 8, 2008, 2:15 PM
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256
 
 M wrote:
  Is there any reason i get the same first hope for a
 number of days? Even
  when i form a new identity in vidalia, i
 still get the same first
  hops. i dont feel comfortable with that.
  
 
 The first hop is an entry guard, which stays the same in
 order to
 prevent a well-known type of attack which could reveal your
 idenitity.
 
 You needn't worry - the first hop has no way of knowing
 what you're
 doing, or even who the last hop in your circuits are. =:o)
 
 - --
 F. Fox
 Owner of Tor node kitsune
 http://fenrisfox.livejournal.com
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.9 (GNU/Linux)
 Comment: Using GnuPG with Mozilla -
 http://enigmail.mozdev.org
 
 iQIcBAEBCAAGBQJI7SL+AAoJECxKjnsrYHNHf6IP/RohJowRZjASFarQK+FxbrNF
 bnOsKeoDQV1ZU2l9NYgiSR6LWGGLvGzAYIBwQyhLUL6aIhSEY+0EGlFQ5sYUEJYF
 IMIzGl2IxC5lwwXrW+RwGS33e/U0y4aC8Aslgg06JqOhWAC5NIEDeA4NUbjPpV1g
 B46GRzaHoBUDgXPfIRyMfCtHJAmZEJI94GqlPtNg2qHX+NkshY4y7wJKa5KTXKmA
 m2aWUTLlvT51aW04qqmXefKCqybd9et1daYjr+JIg8Xxt6cjLzR/5185q+9BQnOb
 V/R6KqmTiJgJ2Xq0N2AoiOoalKo6OrtgBDyLbqzeYpaL/q6Z6LXAzEMmeuEKI4CI
 7x4JGTcl4U4Lh3drgaPIfTOonezbhRzOlp6rAMEBCGGl1kjvQyqYD7T2Qzqeyp7C
 kj2Rs6+9HbQlx5xnr4hFgi546oDYe/9RhxB+6y6C3s9kj6yvUQrNYTi5BuX4SUYa
 0h5+ttm3Zbkfsy4j+3KpQQgwcuaqTKBwQbAdd3dF63TX6Als0bno25aPkmpgGmQy
 SfdQGnQZQAXG5Mb9Oy43z+CNKrpOfxYOIrZEDeklBa3Yg7C/pEhaGC799gJrwKwM
 3IKqMbk3hnpXrv01/gPl7kh4XdUc1kpeJokz86KRkt5RttZ3JJbb9NWPqmX36ZWE
 ZaLi4+XwCq9ZpSfIJ87W
 =oyk9
 -END PGP SIGNATURE-


  


Re: how much does opera leak?

2008-10-05 Thread J B
does anyone know how i can unsubscribe from this site these emails are getting 
way too many? thanks


--- On Sun, 10/5/08, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

 From: [EMAIL PROTECTED] [EMAIL PROTECTED]
 Subject: Re: how much does opera leak?
 To: or-talk@freehaven.net
 Date: Sunday, October 5, 2008, 5:56 AM
 On Sun, Oct 05, 2008 at 05:47:39AM -0700,
 [EMAIL PROTECTED] wrote 2.4K bytes in 81 lines about:
 : Maybe I need to set a particular filter on wireshark to
 see leaked dns requests from Opera via Tor, or should these
 show up in brilliant blue anyway?
 
 Or maybe the version of Opera you are using doesn't
 leak dns requests
 anymore.
 
 -- 
 Andrew


  


Re: More GSoC Ideas

2008-03-24 Thread David J. Bianco
Jonathan Addington wrote:

 2. On *nix systems, make it easy for snort to filter out tor traffic
 on a protocol level. I realize there are plenty of legal uses for
 BitTorrent, Gnutella, etc., but most of them do not require anonymity
 in a strong sense. That is, they can get the same content through http
 (most of the time) anyway, and downloading a Linux distribution (or
 whatever) won't be flagged by most governments/agencies/whatever. It's
 my bandwidth, I have the right to let *others'* use it as I see fit.
 

You probably don't need a whole project for this.  There are already
some Snort rules to detect Tor usage, and if you can detect it, you're
98% of the way to asking Snort to ignore it.

For example, Emerging Threats has a set of snort rules in their policy
section that detect Tor.  Here's one:

alert tcp $HOME_NET any - $EXTERNAL_NET any (msg:ET POLICY TOR 1.0\
Server Key Retrieval; flow:established,to_server;  \
content:|47 45 54 20 2f 74 6f 72 2f 73 65 72 76 65 72 2f|;\
threshold:type limit, track by_src, count 1, seconds 60;\   
classtype:policy-violation; reference:url,tor.eff.org;  \
sid:2002950; rev:4;)

Now, you can easily cause this rule to set a flowbit when it fires.  Flow
bits are pretty much just what they sound like: a user-definable status
bit that you can turn on or off for specific network flows (sessions).
In this case, we can add a flowbit call is_tor:

alert tcp $HOME_NET any - $EXTERNAL_NET any (msg:ET POLICY TOR 1.0\
Server Key Retrieval; flow:established,to_server;  \
content:|47 45 54 20 2f 74 6f 72 2f 73 65 72 76 65 72 2f|;\
threshold:type limit, track by_src, count 1, seconds 60;\   
flowbits:set,is_tor; flowbits:noalert;  \
classtype:policy-violation; reference:url,tor.eff.org;  \
sid:2002950; rev:4;)

Notice the extra flowbits:set,is_tor; flowbits:noalert; line there.
that takes care of both setting the bit and of making sure that this rule
itself doesn't cause an alert to be generated.

For the second part, we can set up a pass rule that will tell snort to
avoid processing that traffic through the rules engine, but only if the
flowbit is_tor is set:

pass tcp any any - any any (msg:PASS Tor traffic;\
flowbits:isset,is_tor;  sid:100; rev:1;)

Granted, that first rule may not be the only way to detect Tor traffic, or
even the best way anymore (I'm not sure of the current status of the Tor
protocol).  Also, as written, the ET rule is specifically looking for
clients on your network talking to Tor servers on the Internet, but the
general technique should still hold.  If Snort can detect the Tor traffic,
it can also easily be made to ignore the traffic without having to write
custom code.

David



Re: New Tor distribution for testing: Tor Browser Bundle

2008-02-03 Thread Steven J. Murdoch
On Sun, Feb 03, 2008 at 02:36:10AM -0500, Silivrenion wrote:
 I did notice torbrowser was in the directory format that is friendly with
 PortableApps format applications, so props on that.
 
 Interesting take, taking what Portable Tor http://portabletor.sf.net has
 done and bringing it to an all inclusive bundle.

Yes, I did look at how Portable Tor worked when I started, and it was
very helpful to see that it could be done, though I've taken a bit of
a different approach, based on my guess at user requirements. 

The main architectural change, is that Vidalia controls most of the
process. The major advantage is that Vidalia receives and understands
status messages from Tor and can act accordingly. It's also easy to
extend without needed extra build components.

I added new configuration options to handle starting Polipo and Firefox:
 - BrowserExecutable: location of the web browser to be started when
Tor successfully builds a circuit. When the browser exits, Vidalia
will shut down too
 - ProxyExecutable: location of the proxy server, started when Vidalia
does and will be killed as Vidalia exits.

These changes are now in the mainline Vidalia source tree, so might be
useful for other bundles of Tor too. The Tor Browser Bundle is still
in development so assuming we stick to this architecture there might
be some more.

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


Re: New Tor distribution for testing: Tor Browser Bundle

2008-02-03 Thread Steven J. Murdoch
On Sun, Feb 03, 2008 at 10:19:54PM +0100, Michael Schmidt wrote:
 Steven, i suggest to make it hardcoded default and a Must, that each user,
 using this browser, is as well running an tor **exit** node,
 tit for tat. like emule partials: upload is a MUST.

I don't think this is likely in the near future. One of the important
target classes of users is people who are at risk of persecution by
their government and want to keep a low profile. Many of these users
are also not fully computer literate and there may not be fully
translated Tor documentation in their language.

The goals of the bundle include being easy to set up and to leave
limited traces (both are still being worked on). In this scenario, to
broadcast the fact that someone is using Tor is in my opinion an
unacceptable risk. There would need to be some way to protect these
users before mandatory server operation is the standard.

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


New Tor distribution for testing: Tor Browser Bundle

2008-01-29 Thread Steven J. Murdoch
Recently I have been working on creating a distribution of Tor which
includes a pre-configured browser -- the Tor Browser Bundle. It is
intended for being run off an USB flash drive, but will probably also
be helpful to users who want an easy-to-setup packaging of Tor.

More information and download links can be found here:

 http://torbrowser.torproject.org/

The bundle contains Firefox, Tor, Vidalia, Polipo and Torbutton. No
installation is needed (just unpack the contents). All the components
are automatically started by one double-click.

The bundle is new, and contains development versions of Tor, Vidalia
and Torbutton, so should be considered a testing release. I do hope it
will be useful, and I'd appreciate comments, suggestions, and bug
reports.

Thanks,
Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


Re: New attack-vector via covert and side channel

2007-12-11 Thread Steven J. Murdoch
On Tue, Dec 11, 2007 at 03:59:59PM +0100, kazaam wrote:
 I dunno how public it is but I found today this dissertation by
 Steven Murdoch about attacking the tor-network via covert- and
 sidechannels: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf

This results discussed aren't actually that new. Chapters 4 and 5,
which are on Tor, are based on papers published in May 2005 and
October 2006 respectively.

 http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf
 http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf

I've now published the thesis version of these papers, which have more
diagrams and other improvements, but the underlying data and
conclusions are the same.

To quote from my previous message:

 To avoid any misunderstanding, I should add that there is no reason
 to panic. Primarily the paper is designed to feed into the future
 design of Tor rather than suggest any short term fixes. There are
 already known attacks on Tor which will probably work better than
 this, but the proposed defences to these will not fix the problem I
 discuss in the paper.

 Also, in the paper, I say that for clarity the results in the paper
 are mainly from a private Tor network and running it in reality will
 be more messy. However, as the performace of the Tor network improves,
 the attack will be more effective, so is worth bearing in mind for the
 future.

 -- http://archives.seul.org/or/talk/Sep-2006/msg00080.html

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


Re: Unsubscribe

2007-10-01 Thread j xd
Unsubscribe


Re: List of NODES in IP form

2006-10-10 Thread David J. Bianco
I wrote a little script a while ago that may be useful to you:

http://infosecpotpourri.blogspot.com/2006/08/listing-active-tor-servers.html

Whenever you run it, the script queries one of the authoritative
directory servers and dumps that server's list of known nodes.  A
quick-and-dirty hack, to be sure, but maybe useful to you, even if just
as a starting point for your own code.

David

Mr. Blue wrote:
 Hello,
 
 this is my first post here.
 
 So, client(user) obtains a list of Tor nodes from a
 directory server.
 Now I'm developing web-apps in PHP 5 and I would like
 someone to tell me, 
 how to get all IPs of those Tor nodes and put them in
 a .txt file.
 (each IP of a node on a new line in .txt file)
 
 When that .txt file is created my PHP script can start
 utilizing it.
 
 Thanks for a help in advance
 
 Oh, one more question...
 When I use tor and check my IP with some web service,
 it is actualy showing IP of a last node.
 Is that correct? ...or not?
 
 Thx...!
 
 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around 
 http://mail.yahoo.com 


Re[4]: TorPark mentioned on BoingBoing

2006-05-10 Thread Michael J Freedman

On Wed, 10 May 2006, Arrakistor wrote:


Date: Wed, 10 May 2006 12:59:20 +0100
From: Arrakistor [EMAIL PROTECTED]
Reply-To: or-talk@freehaven.net
To: Jake Appelbaum or-talk@freehaven.net
Subject: Re[4]: TorPark mentioned on BoingBoing

Jake, et al

It  appears  that the CORALized mirrors had not updated the version of
the source tar it was distributing.


Your server needs to provide proper Cache-Control (i.e., expires) headers 
when using CoralCDN if you'd like it to actually update your site 
regularly, following HTTP caching conventions. Otherwise, CoralCDN's 
default expiry period is 24 hours.


Thanks,
Mike Freedman
CoralCDN Project Lead