Re: Security Focus story

2007-03-09 Thread Eugen Leitl
On Fri, Mar 09, 2007 at 08:37:58AM +0100, Alexander W. Janssen wrote:

 If TOR would legally qualify as an ISP, we're in deep trouble.

We don't provide access to the Internet, and we're not charging
for it. Last time I looked the data retention laws also allowed
a loophole for very small providers.

 Keyword: the upcoming data-retention laws in Europe.

Even if you ran a Tor node with logging, and you gave
BKA a slice for the time window they ask you for, that
would be quite useless. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: Warnings on the download page

2007-03-09 Thread Roger Dingledine
On Thu, Mar 08, 2007 at 07:17:09PM -0600, Mike Perry wrote:
  The current simplest advice I can give people is to remove all plugins:
  http://tor.eff.org/download.html.en#Warning
  Do you have any suggestions on safe ways to back off from that?
 
 I have a couple more points - the second browser phrase should link to
 http://portableapps.com/apps/internet/firefox_portable because
 otherwise it's not really easy to have a second firefox installed.

I hear from people on OS X who use Firefox for safe stuff and Safari
or something else for non-safe stuff. They seem happy enough.

I'm not comfortable recommending portable firefox yet, due to a problem
that Steven Murdoch found a while ago: when firefox starts up, it hunts
around on your hard drive to see if there are any plugins, and then it
enables those. I think there are some ways to disable this behavior,
but it's not disabled by default... so it's not so easy as just adding
a link. :(

Also, isn't Portable Firefox Windows-only? Or am I confused?

 I think we should also mention that we do scan the exits to try to
 verify they are behaving well, but we may miss some.

How often are you doing this scanning at this point?

Speaking of which, a frequently asked question that isn't answered on
the FAQ is: I'm pretty sure my exit node is screwing with me. How do
I figure out which exit node it is? My answers so far have been
  - Run at loglevel info and go look through all the stuff that
makes no sense to you. Not so easy.
  - Use Vidalia's Network Map window and watch which circuit your
stream is connecting to. Easy -- if you use Vidalia.
  - Connect to the control port manually and ask for stream and
circuit events and then let it scroll. When something goes
wrong, look at the output and piece it back together.

Any ideas on a more foolproof approach? :)

--Roger



Re: Security Focus story

2007-03-09 Thread Alexander W. Janssen

On 3/9/07, Eugen Leitl [EMAIL PROTECTED] wrote:

On Fri, Mar 09, 2007 at 08:37:58AM +0100, Alexander W. Janssen wrote:

 If TOR would legally qualify as an ISP, we're in deep trouble.

We don't provide access to the Internet, and we're not charging
for it. Last time I looked the data retention laws also allowed
a loophole for very small providers.


I hope so, although I wonder how small will be defined. How would
you tell how many users your have on your TOR-node?


 Keyword: the upcoming data-retention laws in Europe.

Even if you ran a Tor node with logging, and you gave
BKA a slice for the time window they ask you for, that
would be quite useless.


No; the point is if you'd qualify as an access provider you need to
enable relevant logging. ETSI already defined interfaces and
data-sets which would come quite handy.

But I agree with you: The law isn't here yet.

Alex.


--
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
-- Simon Cameron, U.S. Senator, on the Smithsonian Institute, 1901.


Re: Warnings on the download page

2007-03-09 Thread Eugen Leitl
On Thu, Mar 08, 2007 at 08:33:29PM -0600, H D Moore wrote:

 Seems like two big items I need to add to decloak are Flash and the shiny 
 no-proxy Java connection mode (which seems to apply to TCP sockets only).

What does the current Torpark ship with? It would seem like a hardened
version of Firefox would be good to use.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: Warnings on the download page

2007-03-09 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 Also, isn't Portable Firefox Windows-only? Or am I confused?

True, just going for what I assume is the majority of our
userbase first. Especially people who are going to have difficulty
with this stuff. Was also in a rush and didn't check out the plugin
thing right away, sorry.
 
  I think we should also mention that we do scan the exits to try to
  verify they are behaving well, but we may miss some.
 
 How often are you doing this scanning at this point?

Couple times a week for overnight runs. Pretty much whenever I add new
functionality to the stats gatherering system I do an SSL + http scan
with the old perl scanner controlling the new python core before
checkin.

The problem is the http scanner itself is MD5 based, and it does
nothing to find nodes that deliberately target dynamic content.. So
maybe I'm doing nothing of substance at this point.

 Speaking of which, a frequently asked question that isn't answered on
 the FAQ is: I'm pretty sure my exit node is screwing with me. How do
 I figure out which exit node it is? My answers so far have been
   - Run at loglevel info and go look through all the stuff that
 makes no sense to you. Not so easy.
   - Use Vidalia's Network Map window and watch which circuit your
 stream is connecting to. Easy -- if you use Vidalia.
   - Connect to the control port manually and ask for stream and
 circuit events and then let it scroll. When something goes
 wrong, look at the output and piece it back together.
 
 Any ideas on a more foolproof approach? :)

Heh. I haven't had much luck with 'foolproof' anything lately. It
definitely shouldn't be anything other than in-memory. It would be
nice is Vidalia had a list of recently used exits and a list if IPs
visited for each (with some expiration time of like 5 min?) 

Even with Vidalia it is hard to open the network window while the
stream is still attached to your circuit. Usually by the time you
notice its long closed.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Building tracking system to nab Tor pedophiles

2007-03-09 Thread cesare VoltZ

The approaches suggested won't work if you use Firefox with NoScript set
to disable JavaScript, Java, Flash and any other plugins.


Agreed. Firefox work better on security site nor IE is a big hole.

Cesare


Re: Building tracking system to nab Tor pedophiles

2007-03-09 Thread Marco A. Calamari
On Wed, 2007-03-07 at 14:02 -0500, Michael Holstein wrote: 
  I've seen a VM that routes all traffic over TOR, invisibly to the O/S.  
  (Not sure what they do about UDP).
  Developed at Georgia Tech.
 
 One better .. TOR on OpenWRT on a Linksys router.
 
 Tor at the *hardware* level.

WRT and things liket this have not enought juice for Tor

But something similar already exist

http://www.winstonsmith.info/pbox/index-e.html

HTH

-- 

+--- http://www.winstonsmith.info ---+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother  |
| Marco A. Calamari [EMAIL PROTECTED]  http://www.marcoc.it   |
| DSS/DH:  8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 --+



signature.asc
Description: This is a digitally signed message part


Re: Warnings on the download page

2007-03-09 Thread Freemor
I've been watching this thread with some interest and as the Talk of
mis-onfigured browsers and mis-behaving plug-ins grew I found myself
thinking that there must be an easier way to fix the problem. It occured
to me that what is needed (at least until a more permenant solution can
be found) is a way to stop the offending material from making it to a
potentially misconfigured application. 

  So I started thinking about another proxy in the chain to strip all
java and java script etc.. it then occured to me that Privoxy can most
likely do this if a much more strict action file were written.

so my questions are:

  1 - Can a modified actions file be made that would strip all
Java/javascript, flash, steaming media, etc. From looking at the Privoxy
documentation it looks possible so far (but I'm no privoxy guru)

  2 - If 1 is possible wouldn't it be easiest to include the stricter
action file in the tor/privoxy/vidalia bundle. Tell people look, a lot
of stuff isn't going to fly.. but trust us.. you don't want it too

Just wondering
Freemor

--

Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG




signature.asc
Description: This is a digitally signed message part


Re: Warnings on the download page

2007-03-09 Thread lists
On 9 Mar 2007 03:21:05 -0600, Mike Perry wrote:
 
 Just tested windows media player 10 plugin, which I believe is
 installed by default on pretty much every windows box.. It ignores
 proxy settings. Great.
 

I found most applications on a Windows system respect the settings
configured under Internet Options (i.e., XP SP 2 under Control
Panel-Internet Options-Connections-LAN settings, or through IE7 on XP
SP2 under Tools-Internet Options-Connections-LAN settings). I have
also found that most applications on a Windows system know nothing about
Firefox's proxy settings. I am not writing this from a Windows box, but
I wonder if WM10 is the same.

Also, I tend to firewall off all connections that go to the outside
world when using Tor, except those connections by Tor itself. On
Windows, I generally use per application settings through my personal
firewall. For example, Firefox is configured to only be permitted to
connect to the local system, not the outside world, and WM10 is not
permitted to connect to anything. Not perfect by any means, but it helps
to prevent accidents.

-Andrew


Re: Warnings on the download page

2007-03-09 Thread H D Moore
This would have to support all sorts of variations for media files:

document.location = something.ext
meta refresh URL=something.ext
iframe src=something.ext
frame src=something.ext
img src=something.ext (some cases)
bgsound=something.ext

..etc

Seems easier to lock down the browser and prevent any and all 
media/plugins from executing.

-HD

On Friday 09 March 2007 11:37, Freemor wrote:
   1 - Can a modified actions file be made that would strip all
 Java/javascript, flash, steaming media, etc. From looking at the
 Privoxy documentation it looks possible so far (but I'm no privoxy
 guru)


Re: Warnings on the download page

2007-03-09 Thread light zoo

--- Freemor [EMAIL PROTECTED] wrote:

 
 so my questions are:
 
   1 - Can a modified actions file be made that
 would strip all Java/javascript, flash, steaming
 media, etc. From looking at the Privoxy 
 documentation it looks possible so far (but I'm no
 privoxy guru)

(Note: Mr. Keil is the authority on Privoxy in this
list so he may have better information.)

Privoxy doesn't filter HTTPS and IMO that makes
Privoxy a non-starter in regards to filtering.  
  
IMO all filtering, User-Agent spoofing, etc should be
handled by the browser (about:config is your friend)
because the HTTP/S protocol is filtered.

The 'warning' intro Mr. Perry and Mr. Dingledine wrote
should be followed.
http://tor.eff.org/download.html.en#Warning


These are the extensions I use:
TorButton
CookiesCuller
QuickJava
NoScript
Flashblock
AdBlockPlus
Filterset G. Updater
RefControl (spoof referrer)
http://www.stardrifter.org/refcontrol/

I have my about:config edited to spoof my User-Agent


Cheers,


 

Get your own web address.  
Have a HUGE year through Yahoo! Small Business.
http://smallbusiness.yahoo.com/domains/?p=BESTDEAL


Re: Boulder Tech report on low-resource routing attacks on Tor

2007-03-09 Thread Eugene Y. Vasserman
Hi all,
I've been thinking about how exit and entry nodes controlled by the same 
adversary can easily determine if they are in the same circuit due to the 
predictable nature of circuit set-up (timing). Well, what about altering that? 
Perhaps Tor nodes should form long-lived exploratory circuits (a la I2P). Tor 
should slowly extend these, with unpredictable timing intervals, perhaps over 
the period of dozens of minutes, or even hours. Most of these circuits are not 
completely formed, and thus should not be used to route data. Since there are 
many of these, if one dies (they are long-lived so chances of early death are 
not negligible), so be it. This will allow circuit formation timing to be less 
predictable. As an added benefit, a Tor node may have a number of 1-hop or 
2-hop circuits that it can use at any time, and by extending those, instead of 
forming new, full-length circuits from scratch, we can make recovery from 
circuit failure faster.
Thoughts?
Thanks,
Eugene

Thus spake Paul Syverson on Wed, 07 Mar 2007:

 From: Paul Syverson [EMAIL PROTECTED]
 Subject: Boulder Tech report on low-resource routing attacks on Tor
 Date: Wed, 7 Mar 2007 17:16:43 -0500
 Cc: Kevin Bauer [EMAIL PROTECTED],
   Damon McCoy [EMAIL PROTECTED],
   Dirk Grunwald [EMAIL PROTECTED],
   Douglas C. Sicker [EMAIL PROTECTED]
 To: or-talk@freehaven.net
 Reply-To: or-talk@freehaven.net
 
 
 The following are some comments on the Univ. Colorado at Boulder tech
 report Low-Resource Routing Attacks Against Anonymous Systems that
 has been getting lots of press and other web attention lately and been
 somewhat discussed on this list.  It is only today that I have managed
 to find time to sit down and read the paper.
 
 The nutshell for people that don't want to read the details below:
 
 A good paper. It does _not_ show Tor to be broken. (Nor did it ever
 claim to. I only state that because of some of what has appeared in
 the blagnpress, which to their credit, the authors tried to curtail.)
 It is a nice contribution, especially in showing the limitations of
 the current approach to entry guard selection. Overstates its novelty
 over prior work, which is really unnecessary because it makes valuable
 contributions of its own (and which is more or less my fault not theirs,
 cf. below).
 
 More details:
 
 This is a nice piece of work. Its greatest contribution is in
 directing attacks on entry guards. In the theory and simulation work
 in which such ideas were introduced by Wright et al. they were
 introduced (as helper nodes) to reduce vulnerability.  As a recent
 addition to Tor, the nature of defense they provide but also the
 possible risks from how they are used in actual implementation and
 deployment needed to be explored. It was understood from the start
 that there is something of a tradeoff in introducing them. It was
 realized that profiling without entry guards was in practice trivial
 enough that the additional risk of adding entry guards and thus
 simplifying and enhancing profiling for anyone who unfortunately had
 an adversary guard node was clearly worth it. I don't think this paper
 changes that. However, by attacking the guard selection process
 itself, the research forces us to examine it more closely.
 
 
 What they did was apply techniques that Lasse and I developed in
 Locating Hidden Services to ordinary client circuits. Though we had
 said this would be straightforward to do, we didn't actually do it.
 Because we were focused on the deployed Tor network we could not
 pursue this sort of attack there. We were also focused primarily on
 what could be accomplished with a single hostile node. This limits to
 cases of either a hostile website (as in Murdoch and Danezis and as
 mentioned on p. 10 of this tech report) or a hostile client and a
 hidden service, which is what we reported on.
 
 Deploying a Tor network on PlanetLab and using synthetically generated
 data removes some of the in the wild reality from the results.  But,
 by accepting this limitation, it allowed them to obtain data at all
 about Tor circuits for ordinary use (not hidden services). Much in the
 practicality spirit of onion routing. 
 
 The experimental networks were more than an order of magnituded
 smaller than the current deployed Tor network. One cannot be sure
 something will scale until actually trying it, but in this case there
 is no reason to doubt it does scale. Still if we take the 9 percent
 figure given by the authors as an arbitrary line at which attacks
 become significant, that is still almost a hundred nodes in the
 current network. At about twice the entire size of the experimental
 networks that were set up this starts to be a bit more than
 low-resource.  Still one could do quite a bit with less than 9
 percent. Also, as a counter to my own point, see On the
 countermeasures below.
 
 On prior work:
 
 Before I start noting all the things that the authors didn't properly
 cite, I should observer that 

Re: Removing 1 modular exponentiation

2007-03-09 Thread Watson Ladd
James Muir wrote:
 The following recent preprint deals with the subject of this thread:
 
 A. Kate, G. Zaverucha and I. Goldberg
 Pairing-Based Onion Routing   pdf
 CACR 2007-08
 
 http://www.cacr.math.uwaterloo.ca/techreports/2007/cacr2007-08.pdf
 
 -James
 
Nice. Patents are going to be an issue for this one and we will
need a ECC library. And the distributed key-issuing thing will need to
be figured out. PBC, cited in the paper could sove issues 1 and 2.
I did find http://www.argreenhouse.com/society/wcan06/wcan06s1p2.pdf as
a solution to issue 3. Look at section 2.2. So now I have to ask the
ugly question: How do we run this concurrently with the old protocol?
Thanks,
Watson Ladd



signature.asc
Description: OpenPGP digital signature


Re: need help with Uninstall for Mac

2007-03-09 Thread phobos
On Fri, Mar 09, 2007 at 01:40:28AM -0500, [EMAIL PROTECTED] wrote 0.4K bytes in 
16 lines about:
: I installed the bundled package posted on the site last week. I don't 
: know the Terminal well but this is what I get back...

Which bundle?  And does the uninstall script exist in
/Library/Tor?

-- 
Andrew


Re: need help with Uninstall for Mac

2007-03-09 Thread Jason Edwards
It was the Mac OS X 10.4 (Tiger) Universal Binary 0.1.1.29 bundle.  When 
I open OSX/Library/Tor  I do not see an uninstall script.  Any 
suggestions?


Jay


[EMAIL PROTECTED] wrote:

On Fri, Mar 09, 2007 at 01:40:28AM -0500, [EMAIL PROTECTED] wrote 0.4K bytes in 
16 lines about:
: I installed the bundled package posted on the site last week. I don't 
: know the Terminal well but this is what I get back...


Which bundle?  And does the uninstall script exist in
/Library/Tor?

  




Re: Removing 1 modular exponentiation

2007-03-09 Thread Watson Ladd
Fergie wrote:
 -- James Muir [EMAIL PROTECTED] wrote:
 
 The following recent preprint deals with the subject of this thread:
 
 A. Kate, G. Zaverucha and I. Goldberg
 Pairing-Based Onion Routing   pdf
 CACR 2007-08
 
 http://www.cacr.math.uwaterloo.ca/techreports/2007/cacr2007-08.pdf
 
 
 I'm quite happy to see some objective dialog on the list
 again. :-)
 
 - ferg
 
I have a very incomplete proposal for adding this to tor. It is badly
written and probably breaks a lot of stuff.  A lot more work needs
doing, like on how we get a distributed PKG.
---
Watson Ladd



Filename:107-PBC.txt
Title:The pairing-based key negotiation protocol
Version:0.0.1
Last modified:
Author:Watson Ladd
Created:9-March-2007
Status:Open

Overview: This document describes a new version of the tor protocol
  that uses pairing-based cryptography following [1].

Motivation: The protocol described in [1] is much more efficient in both
bandwith and CPU then the current protocol.

Backwards-compatability: Sadly, use of the VERSION cell will negate some of the
 advantages of the new protocol. This is very much
 a work in progress. Current solution is a new cell
 type.

Proposal:
Section 0.0: Magic Numbers
Section 1.0: Circuit Establisment
Section 1.1: The distributed PKG.
Section 2.1: The new directory format

Section 0.0: Magic Numbers
Curve P-521 in FIPS 186 [2] is to be used. New cell types is defined:
[7] CREATE_WARPSPEED, and [8] EXITING_HYPERSPACE
 The master key expiration period is 24 hours exact to the nearest
 second. The private key expiration period is one hour to the nearest
 second.

Section 1.0: Circuit establishment
In 1.1 the orgin of v_m, U, and sU will be mentioned. v_m is a
timestamp consisting of the number of seconds since midnight
Jan 1, 1970 to the begining of the Master Key Validity Period.
Let i be an index variable taken over all OR's in the circuit.
Then let Q_vi=H(v||ID_i) where v is the timestamp at the begining
of the Private Key Validity Period, and ID_i is the ID of router i.
Then let y_vi=P(sU, Q_vi). Let r_i be random integers not zero in
Z_n where n is the size of the group. r_i's are selected randomly
for each OR i. Then let P_i=r_iU and compute y_vi^r_i for each OR i.
From each y_vi^r_i a forwards key K_f_i and backwards key K_b_i are
computed.

Let A,..,N be the nodes being put into an onion circuit. Then the
CREATE_WARPSPEED cell being sent to A has the following payload:
cid,r_AU,{B, r_BU,{ ... {N, r_NU, {NULL}_{K_f_N}}...}_{K_f_B}}_{K_f_A}
On recipt of a CREATE_WARPSPEED cell the OR i computes P(r_iU,d_vi)
and from it derives K_f_i and K_b_i. It then finds out what router
to send the next CREATE_WARPSPEED cell to. In the process it chops off
the router's name and replaces it with the circuit id it wants to use
for that link of the circuit. The NULL message is a EXITING_HYPERSPACE 
cell.
On noticing that the decrypted message is an EXITING_HYPERSPACE cell, 
the OR is
expected to send a CIRCUIT_CREATED cell back, encrypting it with K_b_i, 
just like
all traffic on the newly established circuit.

Section 1.1 TODO
Section 1.2 TODO


signature.asc
Description: OpenPGP digital signature


Slightly OT: 'Big brother' surveillance makes waves in Sweden

2007-03-09 Thread xiando
Almost On Topic (related, anyway): http://www.thelocal.se/6619/20070307/

A far-reaching wiretapping programme proposed by Sweden's government to 
defend against foreign threats, including monitoring emails and telephone 
calls, has stirred up a fiery debate in the past few weeks, with critics 
decrying the creation of a big brother state.

The new legislation, to be presented to parliament on Thursday, would enable 
the National Defence Radio Establishment (FRA) to tap all Internet and 
telephone communication in and out of Sweden.

Beware, people of Sweden, and the west in general. Very good reason to use Tor 
right there.

More Slightly Off-Topic: 

FRA is visiting websites with information about Tor. And they are not using 
Tor to do it (Yes, I realize the Xiando Total Surveillance Office is evil. 
But you guys are using Tor, aren't you?)

(Please don't reply to this unless you absolutely have to, this isn't 
immensily Tor-related, only something which makes a very good argument when 
you're explaining Why You Should Use Tor within Sweden - and the west in 
general)


How to run Tor from USB with Linux (Kubuntu 6.10)

2007-03-09 Thread light zoo
Hi,

Forgive the naive nature of this question...

I have compiled Tor and I want to run it off my USB
HDD but I'm not sure how.  Should I just copy over the
build directory ~/tor-0.1.2.10-rc/? If so what are
essential files? 

What should the DataDirectory option be set to?

Regards,




 

Food fight? Enjoy some healthy debate 
in the Yahoo! Answers Food  Drink QA.
http://answers.yahoo.com/dir/?link=listsid=396545367