Re: [liberationtech] Breaking Tor for $3K

2014-07-30 Thread Maxim Kammerer
On Tue, Jul 8, 2014 at 12:20 AM, Maxim Kammerer m...@dee.su wrote:
 Well, if we estimate total guard node bandwidth at 4GB/s, several
 controlled guard nodes with two gigabit links allow control of
 ~6% of Tor traffic, enabling a fair share of opportunistic
 deanonymization attacks on hidden services and their clients.

“Then the second class of attack they used, in conjunction with their
traffic confirmation attack, was a standard Sybil attack — they signed
up around 115 fast non-exit relays, all running on 50.7.0.0/16 or
204.45.0.0/16. Together these relays summed to about 6.4% of the Guard
capacity in the network.” [1]

 Simultaneously, I would inject arbitrary delays into all client
connections to controlled guard nodes, and watch for similar delays on
suspected hidden service nodes.

“The particular confirmation attack they used was an active attack
where the relay on one end injects a signal into the Tor protocol
headers, and then the relay on the other end reads the signal. These
attacking relays were stable enough to get the HSDir (suitable for
hidden service directory) and Guard (suitable for being an entry
guard) consensus flags. Then they injected the signal whenever they
were used as a hidden service directory, and looked for an injected
signal whenever they were used as an entry guard.” [1]

So they apparently found a more efficient and reliable way to transmit
the signal, at the cost of getting detected after half a year. Too bad
the talk was retracted, I was looking towards some actual
non-propaganda Tor hidden service statistics.

[1] 
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Re: [liberationtech] Breaking Tor for $3K

2014-07-30 Thread Griffin Boyce

Maxim Kammerer wrote:

Too bad the talk was retracted, I was looking towards some
actual non-propaganda Tor hidden service statistics.


Wait.
--
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change 
to digest, or change password by emailing moderator at compa...@stanford.edu.



[liberationtech] Breaking Tor for $3K

2014-07-07 Thread Richard Brooks
See:

https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget

Sounds like hype to me. Anyone else have an opinion?
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.



Re: [liberationtech] Breaking Tor for $3K

2014-07-07 Thread Maxim Kammerer
On Mon, Jul 7, 2014 at 11:13 PM, Richard Brooks r...@g.clemson.edu wrote:
 https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
 Sounds like hype to me. Anyone else have an opinion?

Well, if we estimate total guard node bandwidth at 4GB/s [1], several
controlled guard nodes with two gigabit links allow control of
~6% of Tor traffic, enabling a fair share of opportunistic
deanonymization attacks on hidden services and their clients. I would
approach this by constantly connecting to all known hidden services
using a distinct per-service traffic pattern, and this way determine
location of hidden services that eventually pick a controlled guard
node. Simultaneously, I would inject arbitrary delays into all client
connections to controlled guard nodes, and watch for similar delays on
suspected hidden service nodes.

All in all, sounds feasible to me, and I can't wait for some actual
Tor hidden services statistics that are not some boring wishful
thinking from “Users of Tor” page [2], but actual data.

[1] https://metrics.torproject.org/bandwidth.html
[2] https://www.torproject.org/about/torusers.html

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.