New attack-vector via covert and side channel

2007-12-11 Thread kazaam
I dunno how public it is but I found today this dissertation by Steven Murdoch 
about attacking the tor-network via covert- and sidechannels: 
http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf

greets

-- 
kazaam [EMAIL PROTECTED]


pgpft0S0eAfki.pgp
Description: PGP signature


Re: New attack-vector via covert and side channel

2007-12-11 Thread Steven J. Murdoch
On Tue, Dec 11, 2007 at 03:59:59PM +0100, kazaam wrote:
 I dunno how public it is but I found today this dissertation by
 Steven Murdoch about attacking the tor-network via covert- and
 sidechannels: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf

This results discussed aren't actually that new. Chapters 4 and 5,
which are on Tor, are based on papers published in May 2005 and
October 2006 respectively.

 http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf
 http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf

I've now published the thesis version of these papers, which have more
diagrams and other improvements, but the underlying data and
conclusions are the same.

To quote from my previous message:

 To avoid any misunderstanding, I should add that there is no reason
 to panic. Primarily the paper is designed to feed into the future
 design of Tor rather than suggest any short term fixes. There are
 already known attacks on Tor which will probably work better than
 this, but the proposed defences to these will not fix the problem I
 discuss in the paper.

 Also, in the paper, I say that for clarity the results in the paper
 are mainly from a private Tor network and running it in reality will
 be more messy. However, as the performace of the Tor network improves,
 the attack will be more effective, so is worth bearing in mind for the
 future.

 -- http://archives.seul.org/or/talk/Sep-2006/msg00080.html

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


possible DoS attack?

2007-12-11 Thread Scott Bennett
 In the last couple of days, I've noticed my tor server maxing out the
transmit side (~110-~115 KB/s) of my ADSL while typically using 10 KB/s of
the receive side, usually for long periods of time.  Curious about this oddity,
I began looking at netstat output more frequently to see what was up.  What I
found that seemed out of the ordinary was many dozens of connections to my
directory mirror port from 83.103.38.65 (fastweb65.ietnet.net), most with
32 KB or more in the output queue for the ethernet interface.  Occasionally,
these mostly go away for a while, and the transmit rate begins to fluctuate
more normally between 10 KB/s and, say, 60 KB/s, as traffic begins to adapt
to the increase in available bandwidth.  Often these breaks in the demand by
fastweb65.ietnet.net last no more than a couple of minutes before
fastweb65.ietnet.net resumes connecting and demanding directories at its
previous pace.
 83.103.38.65 does not appear in my cached-consensus or cached-descriptors*
files, so these are not simply tunneled directory connections from random
sites getting funneled through one tor server in Italy.
 Can anyone tell me whether this is legitimate activity or whether I should
begin blocking it at my router to encourage it to go away?


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Why does TOR stream data when it#8217;s not in use?

2007-12-11 Thread MORTEN HAGEN
Hi, I#8217;m new to TOR. I#8217;ve been using it for some weeks for
online privacy. I#8217;ve installed TOR and Privoxy from the latest
Windows Vidalia Bundle and configured my Internet Explorer 7 manually.
Everything seems to work fine when I test my connection on such testing
sites on the internet. My question is: When I start Privoxy and TOR, my
computer starts immediately to stream data over the internet. It mostly
downloads, and sometimes it downloads 1MB of data each minute, or more,
for a long while. It also sends data, but in a much lower rate. This
seems to be strange, because I don#8217;t have any active internet
application running - and as soon as I shut down the TOR engine, the
streaming stops. The reason for me looking at this as strange or
suspicious is because sometimes this happens and sometime it
doesn#8217;t when I start the TOR engine. Sometimes I just need to shut
it down and restart it, and after a new circuit is made, the connection
is inactive unless I start to use internet application, such as browsing
the web. Why does this happen?
Is every TOR user a TOR Server or Exit Node as well? Thanks in advance,
Greetings from Norway

-- 
10 Great Gift Ideas- Take a Look!
http://mail.shopping.com/?linkin_id=8033174



Re: possible DoS attack?

2007-12-11 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Scott Bennett wrote:
(snip)
 What I
 found that seemed out of the ordinary was many dozens of connections to my
 directory mirror port from 83.103.38.65 (fastweb65.ietnet.net)
(snip)
  83.103.38.65 does not appear in my cached-consensus or 
 cached-descriptors*
 files, so these are not simply tunneled directory connections from random
 sites getting funneled through one tor server in Italy.
  Can anyone tell me whether this is legitimate activity or whether I 
 should
 begin blocking it at my router to encourage it to go away?
(snip)

It sounds mighty suspicious, in my opinion.

If I recall correctly, directory mirroring is based on HTTP (hence, why
it's encouraged to host it on port 80 for fascist firewalled folks, if
at all possible). Therefore, it would be vulnerable to any fundamental
attack (i.e., based on the nature of TCP or HTTP) that any Web server
would be.

Given that the system you mention doesn't seem to be a Tor node, I say
that if it's not an attack, then something's pretty weird.

I'm no expert, but I say block the offending system. Does anyone else
concur?

- --
F. Fox
Owner of Tor node kitsune
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHXzJobgkxCAzYBCMRArCRAJ0Xv7oRjoXcnHuETZ7vn6k4IpsaGwCfcJ9t
sfTLWKVAzbOMtURdnEswPW0=
=F8zz
-END PGP SIGNATURE-


Re: Why does TOR stream data when it#8217;s not in use?

2007-12-11 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

MORTEN HAGEN wrote:
 Hi,
  
 I’m new to TOR. I’ve been using it for some weeks for online privacy.
  
 I’ve installed TOR and Privoxy from the latest Windows Vidalia Bundle
 and configured my Internet Explorer 7 manually. Everything seems to work
 fine when I test my connection on such testing sites on the internet.
  
 My question is: When I start Privoxy and TOR, my computer starts
 immediately to stream data over the internet. It mostly downloads, and
 sometimes it downloads 1MB of data each minute, or more, for a long
 while. It also sends data, but in a much lower rate.
(snip)

AFAIK, when activated, Tor will:

1.) Download some directory information - this can be quite a bit, if
it's the first time Tor's been run on a particular install;

2.) Send some data for the purpose of opening up a few circuits, so it's
ready for use when an application wants it.

If by a long while you mean more than a couple of minutes, I'd say
that's pretty odd - that's much more than is needed for a directory
download (IIRC).

 Is every TOR user a TOR Server or Exit Node as well?
(snip)

By default, Tor will act only as a client; it will not relay data, nor
act as an exit node.

- --
F. Fox: A+, Network+, Security+
Owner of Tor node kitsune
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHXzbFbgkxCAzYBCMRAs3NAJ4pKP3bfyZ33mxLYGc61TrdKINUOQCfZ6iR
KqdImPJTy/ch46FoTiLAI3w=
=T8az
-END PGP SIGNATURE-