Re: Stripping code with Privoxy (was: Warnings on the download page)

2007-03-10 Thread Fabian Keil
Freemor [EMAIL PROTECTED] wrote:

 I've been watching this thread with some interest and as the Talk of
 mis-onfigured browsers and mis-behaving plug-ins grew I found myself
 thinking that there must be an easier way to fix the problem. It occured
 to me that what is needed (at least until a more permenant solution can
 be found) is a way to stop the offending material from making it to a
 potentially misconfigured application. 
 
   So I started thinking about another proxy in the chain to strip all
 java and java script etc.. it then occured to me that Privoxy can most
 likely do this if a much more strict action file were written.
 
 so my questions are:
 
   1 - Can a modified actions file be made that would strip all
 Java/javascript, flash, steaming media, etc. From looking at the Privoxy
 documentation it looks possible so far (but I'm no privoxy guru)

There are too many different ways to embed or reference
code in HTML. Creating such a Privoxy filter would take a lot
of time and I doubt that it would ever work reliable enough to
be remotely useful, even if you ignore the fact that it would
only work for HTTP anyway.

The filter would only remove the stuff its creators knew about,
and while that may (or may not) be a lot, it would still default
to permit.

Default permit is OK when it comes to blocking ads and other minor
annoyances, but it's a really bad idea when it comes to security: 
http://www.ranum.com/security/computer_security/editorials/dumb/

   2 - If 1 is possible wouldn't it be easiest to include the stricter
 action file in the tor/privoxy/vidalia bundle. Tell people look, a lot
 of stuff isn't going to fly.. but trust us.. you don't want it too

If people wouldn't want this stuff, they shouldn't install the plugins
in the first place and disable remote code execution in the browser.

Don't want to get owned because of Java, PDF, flash or whatever?
Just don't install the plugins.

Can't trust your browser if JavaScript is enabled? Just disable it.

It's that simple.

Fabian


signature.asc
Description: PGP signature


Re: Warnings on the download page

2007-03-09 Thread Roger Dingledine
On Thu, Mar 08, 2007 at 07:17:09PM -0600, Mike Perry wrote:
  The current simplest advice I can give people is to remove all plugins:
  http://tor.eff.org/download.html.en#Warning
  Do you have any suggestions on safe ways to back off from that?
 
 I have a couple more points - the second browser phrase should link to
 http://portableapps.com/apps/internet/firefox_portable because
 otherwise it's not really easy to have a second firefox installed.

I hear from people on OS X who use Firefox for safe stuff and Safari
or something else for non-safe stuff. They seem happy enough.

I'm not comfortable recommending portable firefox yet, due to a problem
that Steven Murdoch found a while ago: when firefox starts up, it hunts
around on your hard drive to see if there are any plugins, and then it
enables those. I think there are some ways to disable this behavior,
but it's not disabled by default... so it's not so easy as just adding
a link. :(

Also, isn't Portable Firefox Windows-only? Or am I confused?

 I think we should also mention that we do scan the exits to try to
 verify they are behaving well, but we may miss some.

How often are you doing this scanning at this point?

Speaking of which, a frequently asked question that isn't answered on
the FAQ is: I'm pretty sure my exit node is screwing with me. How do
I figure out which exit node it is? My answers so far have been
  - Run at loglevel info and go look through all the stuff that
makes no sense to you. Not so easy.
  - Use Vidalia's Network Map window and watch which circuit your
stream is connecting to. Easy -- if you use Vidalia.
  - Connect to the control port manually and ask for stream and
circuit events and then let it scroll. When something goes
wrong, look at the output and piece it back together.

Any ideas on a more foolproof approach? :)

--Roger



Re: Warnings on the download page

2007-03-09 Thread Eugen Leitl
On Thu, Mar 08, 2007 at 08:33:29PM -0600, H D Moore wrote:

 Seems like two big items I need to add to decloak are Flash and the shiny 
 no-proxy Java connection mode (which seems to apply to TCP sockets only).

What does the current Torpark ship with? It would seem like a hardened
version of Firefox would be good to use.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: Warnings on the download page

2007-03-09 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 Also, isn't Portable Firefox Windows-only? Or am I confused?

True, just going for what I assume is the majority of our
userbase first. Especially people who are going to have difficulty
with this stuff. Was also in a rush and didn't check out the plugin
thing right away, sorry.
 
  I think we should also mention that we do scan the exits to try to
  verify they are behaving well, but we may miss some.
 
 How often are you doing this scanning at this point?

Couple times a week for overnight runs. Pretty much whenever I add new
functionality to the stats gatherering system I do an SSL + http scan
with the old perl scanner controlling the new python core before
checkin.

The problem is the http scanner itself is MD5 based, and it does
nothing to find nodes that deliberately target dynamic content.. So
maybe I'm doing nothing of substance at this point.

 Speaking of which, a frequently asked question that isn't answered on
 the FAQ is: I'm pretty sure my exit node is screwing with me. How do
 I figure out which exit node it is? My answers so far have been
   - Run at loglevel info and go look through all the stuff that
 makes no sense to you. Not so easy.
   - Use Vidalia's Network Map window and watch which circuit your
 stream is connecting to. Easy -- if you use Vidalia.
   - Connect to the control port manually and ask for stream and
 circuit events and then let it scroll. When something goes
 wrong, look at the output and piece it back together.
 
 Any ideas on a more foolproof approach? :)

Heh. I haven't had much luck with 'foolproof' anything lately. It
definitely shouldn't be anything other than in-memory. It would be
nice is Vidalia had a list of recently used exits and a list if IPs
visited for each (with some expiration time of like 5 min?) 

Even with Vidalia it is hard to open the network window while the
stream is still attached to your circuit. Usually by the time you
notice its long closed.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-09 Thread Freemor
I've been watching this thread with some interest and as the Talk of
mis-onfigured browsers and mis-behaving plug-ins grew I found myself
thinking that there must be an easier way to fix the problem. It occured
to me that what is needed (at least until a more permenant solution can
be found) is a way to stop the offending material from making it to a
potentially misconfigured application. 

  So I started thinking about another proxy in the chain to strip all
java and java script etc.. it then occured to me that Privoxy can most
likely do this if a much more strict action file were written.

so my questions are:

  1 - Can a modified actions file be made that would strip all
Java/javascript, flash, steaming media, etc. From looking at the Privoxy
documentation it looks possible so far (but I'm no privoxy guru)

  2 - If 1 is possible wouldn't it be easiest to include the stricter
action file in the tor/privoxy/vidalia bundle. Tell people look, a lot
of stuff isn't going to fly.. but trust us.. you don't want it too

Just wondering
Freemor

--

Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG




signature.asc
Description: This is a digitally signed message part


Re: Warnings on the download page

2007-03-09 Thread lists
On 9 Mar 2007 03:21:05 -0600, Mike Perry wrote:
 
 Just tested windows media player 10 plugin, which I believe is
 installed by default on pretty much every windows box.. It ignores
 proxy settings. Great.
 

I found most applications on a Windows system respect the settings
configured under Internet Options (i.e., XP SP 2 under Control
Panel-Internet Options-Connections-LAN settings, or through IE7 on XP
SP2 under Tools-Internet Options-Connections-LAN settings). I have
also found that most applications on a Windows system know nothing about
Firefox's proxy settings. I am not writing this from a Windows box, but
I wonder if WM10 is the same.

Also, I tend to firewall off all connections that go to the outside
world when using Tor, except those connections by Tor itself. On
Windows, I generally use per application settings through my personal
firewall. For example, Firefox is configured to only be permitted to
connect to the local system, not the outside world, and WM10 is not
permitted to connect to anything. Not perfect by any means, but it helps
to prevent accidents.

-Andrew


Re: Warnings on the download page

2007-03-09 Thread H D Moore
This would have to support all sorts of variations for media files:

document.location = something.ext
meta refresh URL=something.ext
iframe src=something.ext
frame src=something.ext
img src=something.ext (some cases)
bgsound=something.ext

..etc

Seems easier to lock down the browser and prevent any and all 
media/plugins from executing.

-HD

On Friday 09 March 2007 11:37, Freemor wrote:
   1 - Can a modified actions file be made that would strip all
 Java/javascript, flash, steaming media, etc. From looking at the
 Privoxy documentation it looks possible so far (but I'm no privoxy
 guru)


Re: Warnings on the download page

2007-03-09 Thread light zoo

--- Freemor [EMAIL PROTECTED] wrote:

 
 so my questions are:
 
   1 - Can a modified actions file be made that
 would strip all Java/javascript, flash, steaming
 media, etc. From looking at the Privoxy 
 documentation it looks possible so far (but I'm no
 privoxy guru)

(Note: Mr. Keil is the authority on Privoxy in this
list so he may have better information.)

Privoxy doesn't filter HTTPS and IMO that makes
Privoxy a non-starter in regards to filtering.  
  
IMO all filtering, User-Agent spoofing, etc should be
handled by the browser (about:config is your friend)
because the HTTP/S protocol is filtered.

The 'warning' intro Mr. Perry and Mr. Dingledine wrote
should be followed.
http://tor.eff.org/download.html.en#Warning


These are the extensions I use:
TorButton
CookiesCuller
QuickJava
NoScript
Flashblock
AdBlockPlus
Filterset G. Updater
RefControl (spoof referrer)
http://www.stardrifter.org/refcontrol/

I have my about:config edited to spoof my User-Agent


Cheers,


 

Get your own web address.  
Have a HUGE year through Yahoo! Small Business.
http://smallbusiness.yahoo.com/domains/?p=BESTDEAL


Warnings on the download page (was: yet another tor attack)

2007-03-08 Thread Roger Dingledine
On Wed, Mar 07, 2007 at 02:14:33PM -0600, Mike Perry wrote:
 The Tor download page should have a concice Things to know before
 downloading section that lists a few key points about the most easy
 ways your identity can be revealed through Tor. Something like

Mike and I just whipped up an early version of this here:

http://tor.eff.org/download.html.en#Warning

(Thanks Mike!)

Let us know if you have any fixes or more issues to list. Eventually
this should get its own page, with more details, etc, and then we can
put just a concise summary (ha ha) on the download page. There are so
many permutations of applications out there...it's depressing sometimes
how hard it is to secure the whole Internet.

Also, somebody should write up a page with recommendations for
configurations/etc of common applications that work well with Tor, for
tasks other than web browsing -- Gaim comes to mind first for AIM + IRC,
and we can recommend OTR at the same time. What else is a very common
task by Tor users who need basic documentation? We probably shouldn't
try to document Torifying mail delivery at this point (other than use
web mail) or Skype (don't bother, stick with web browsing).

This document could be based on
http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO but needs to
be simpler and more right. I'm guessing the somebody will end up being
me, but if you send me drafts/notes/etc it'll happen faster. :)

Whee,
--Roger



Re: Warnings on the download page

2007-03-08 Thread sy16
My suggestions as a no-tech user:

Perhaps the Warning should be put on top of the page, before the download links 
- sometimes people don't go further than the download links.

Also, might I suggest NoScript to be used in conjunction with QuickJava? And 
please add a line reminding users to reload the page if they use QuickJava. 
NoScript reloads automatically but not QuickJava.

About the evil exit nodes, these extensions might help detect false pages: 
HostIP.Geolocation plugin, netcrafttoolbar, FormFox, and Shazou. FormFox is 
somewhat paranoid and not always accurate, but it serves as a reminder of 
thinking before clicking submit.

About mail client: I configure my Thunderbird 995 and 465, same server name for 
pop and smtp, with Torbutton. So far I have had no problem retrieving and 
sending. There have been mentions in this list about problems with smtp, so 
maybe I am missing something. Am I blithely assuming my getting and sending 
mail  through tor and SSL?

About Windows (sorry guys) security, set up a normal user account for browsing, 
like they do in Linux. Change Administrator to some other moniker and set a 
password. And disable remote administration if you don't need this enabled.

Voila, my 2centsworth.


Roger Dingledine [EMAIL PROTECTED] wrote: On Wed, Mar 07, 2007 at 02:14:33PM 
-0600, Mike Perry wrote:
 The Tor download page should have a concice Things to know before
 downloading section that lists a few key points about the most easy
 ways your identity can be revealed through Tor. Something like

Mike and I just whipped up an early version of this here:

http://tor.eff.org/download.html.en#Warning





-
 Inbox full of unwanted email? Get leading protection and 1GB storage with All 
New Yahoo! Mail.

Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake sy16 ([EMAIL PROTECTED]):

 My suggestions as a no-tech user:
 
 Perhaps the Warning should be put on top of the page, before the
 download links - sometimes people don't go further than the download
 links.
 
 Also, might I suggest NoScript to be used in conjunction with
 QuickJava? And please add a line reminding users to reload the page
 if they use QuickJava. NoScript reloads automatically but not
 QuickJava.

The problem with NoScript is that it is incredibly complex, and unless
you configure it properly (which is NOT the default), it is really no
protection against an attack like Moore's. The default whitelist is
enough for him to abuse. A bad tor node can fake any host it wants.

Even worse, it is possible to THINK you are configuring NoScript
properly and make yourself even more insecure. For example, the
addons.mozilla.org people got the brilliant idea to transmit
extensions over http (even though the site itself is https). They
verify MD5s using javascript that runs on the https connection.. If
you disable javascript for them, you are downloading extensions
without any verification :(.

Unfortunately, QuickJava by itself is not enough to disable java
launched from a moore-style attack.
http://metasploit.com/research/misc/decloak/ actually builds the
applet html in a hidden div using javascript. QuickJava lets it
through.. On the plus side, Sun Java 5.0r10 seems to obey SOCKS for
his datagramsocket test, which is a huge surprise... Who knows if the
same can be said for MS Java.

This last point puts us in a catch-22. Personally, I think even if we
could describe to people how to use NoScript, it is going to be waay
too much of a hassle and too error prone to work reliabily for the
average user, especially as more and more sites go AJAX with no other
option. On the plus side, the author of QuickJava has also authored an
anonymity extension for anonmouse. Perhaps he would be amenable to
fixing his extension against moore's on-the-fly HTML generation.
However his email address is not listed on the author page :(



 About the evil exit nodes, these extensions might help detect false
 pages: HostIP.Geolocation plugin, netcrafttoolbar, FormFox, and
 Shazou. FormFox is somewhat paranoid and not always accurate, but it
 serves as a reminder of thinking before clicking submit.
 
 About mail client: I configure my Thunderbird 995 and 465, same
 server name for pop and smtp, with Torbutton. So far I have had no
 problem retrieving and sending. There have been mentions in this
 list about problems with smtp, so maybe I am missing something. Am I
 blithely assuming my getting and sending mail  through tor and SSL?
 
 About Windows (sorry guys) security, set up a normal user account
 for browsing, like they do in Linux. Change Administrator to some
 other moniker and set a password. And disable remote administration
 if you don't need this enabled.

Yea, these are good ideas for a second page. But on the front page we
just want a few paragraphs that covers all the bases.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page (Re: QuickJava update req)

2007-03-08 Thread light zoo

--- Mike Perry [EMAIL PROTECTED] wrote:

 Perhaps he would be amenable to fixing his
 extension against moore's on-the-fly HTML
 generation.  However his email address is not
 listed on the author page :(

Well it looks like Mr. Greene prefers to receive
feature requests on his blog, not email.  He seems
very open to feature requests and suggestions:

Quote Mr. Green:
--
Please leave comments for feature requests here to be
considered.
--

Mr. Green's blog entry page:
http://www.blogger.com/comment.g?blogID=17969172postID=112982970672088922


Cheers, lightzoo





 

Be a PS3 game guru.
Get your game face on with the latest PS3 news and previews at Yahoo! Games.
http://videogames.yahoo.com/platform?platform=120121


Re: Warnings on the download page (Re: QuickJava update req)

2007-03-08 Thread Mike Perry
Thus spake light zoo ([EMAIL PROTECTED]):

 
 --- Mike Perry [EMAIL PROTECTED] wrote:
 
  Perhaps he would be amenable to fixing his
  extension against moore's on-the-fly HTML
  generation.  However his email address is not
  listed on the author page :(
 
 Well it looks like Mr. Greene prefers to receive
 feature requests on his blog, not email.  He seems
 very open to feature requests and suggestions:
 
 Quote Mr. Green:
 --
 Please leave comments for feature requests here to be
 considered.
 --
 
 Mr. Green's blog entry page:
 http://www.blogger.com/comment.g?blogID=17969172postID=112982970672088922

Yeah, I left a feature request for him. 
http://quickjavaplugin.blogspot.com/2006/12/features-requested.html

On further investigation his plugin seems to rely on the Firefox
setting 'security.enable_java', so perhaps he would have direct
ability in fixing this bug.. But on the plus side, maybe the fact that
this setting is under 'security' and can still be bypassed will
warrant prompt response from the Firefox team.. I'm probably occupied
for today.. If anyone wants to test this option for firefox 1.5 and
2.0 latest with moore's page please do so and post here. Note it's
hard to tell if the applet is running. You probably have to use
wireshark and filter on udp while hitting the page with tor disabled.
The udp packet is to red.metasploit.com. It is easy to see with a
filter of 'udp'.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page (Re: QuickJava update req)

2007-03-08 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 Thus spake light zoo ([EMAIL PROTECTED]):
 
  
  --- Mike Perry [EMAIL PROTECTED] wrote:
  
   Perhaps he would be amenable to fixing his
   extension against moore's on-the-fly HTML
   generation.  However his email address is not
   listed on the author page :(
  
  Well it looks like Mr. Greene prefers to receive
  feature requests on his blog, not email.  He seems
  very open to feature requests and suggestions:
  
  Quote Mr. Green:
  --
  Please leave comments for feature requests here to be
  considered.
  --
  
  Mr. Green's blog entry page:
  http://www.blogger.com/comment.g?blogID=17969172postID=112982970672088922
 
 Yeah, I left a feature request for him. 
 http://quickjavaplugin.blogspot.com/2006/12/features-requested.html
 
 On further investigation his plugin seems to rely on the Firefox
 setting 'security.enable_java', so perhaps he would have direct
 ability in fixing this bug.. But on the plus side, maybe the fact that

Err. rather he probably has NO direct ability to fix it.

 this setting is under 'security' and can still be bypassed will
 warrant prompt response from the Firefox team.. I'm probably occupied
 for today.. If anyone wants to test this option for firefox 1.5 and
 2.0 latest with moore's page please do so and post here. Note it's
 hard to tell if the applet is running. You probably have to use
 wireshark and filter on udp while hitting the page with tor disabled.
 The udp packet is to red.metasploit.com. It is easy to see with a
 filter of 'udp'.

http://metasploit.com/research/misc/decloak/ is his url (mentioned in
a previous post). Hit that with JS enabled but java disabled to test.
The more platforms + JVM combos we have the better our odds are of
someone at firefox listening to us and fixing it promptly and
correctly. It's possible the behavior of this 'security.enable_java'
flag is OS+JVM dependent. I will do what I can, but I'm probably
going to be pretty occupied for the next few days with other things.

Also, as much as we have given him shit, HD Moore does deserve some
thanks about providing an open example of all this for us to test.
That is much better than the others who have studied this have done.
(Though I do suspect he may in fact simply hate Tor, at least his
security and research ethics are intact).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread H D Moore
Hello,

I just subscribed to the or-talk list and would be happy to answer any 
questions related to the recent catching pedophiles article and the 
decloak test tool. I am in the process of updating the decloak 
demonstration to explain each of the tests and provide source code for 
the components. What may not be obvious (especially from the ZDNet 
article), is that I believe in the Tor project's goals and am not 
developing these types of tests to damage the project. 

I will not respond to any questions regarding the legallity of Tor traffic 
capture and manipulation. I believe this is still a gray area, since it 
depends on whether a Tor node qualifies as a service provider or meets 
the safe harbor requirements. I will not respond to questions about what, 
if any, Tor nodes I operate.

I am able to answer any technical questions related to the research I have 
done (which includes generic content-detection and filtering, as well 
decloaking/deanonymization tests). 

Some quick URLs for anyone who needs them:

Decloak:
 - http://metasploit.com/research/misc/decloak/ (this starts Java)

Torment (outdated tor source + ruby patch):
 - http://metasploit.com/svn/torment/trunk/

-HD


Re: Warnings on the download page

2007-03-08 Thread Roger Dingledine
On Thu, Mar 08, 2007 at 04:12:10PM -0600, H D Moore wrote:
 I am in the process of updating the decloak 
 demonstration to explain each of the tests and provide source code for 
 the components. What may not be obvious (especially from the ZDNet 
 article), is that I believe in the Tor project's goals and am not 
 developing these types of tests to damage the project. 

Hi HD,

Thanks for joining the discussion, and welcome. We (the Tor developers)
have been working mostly on making Tor itself work, and hoping that
other people would step up to help us figure out how to safely configure
the supporting applications (web browsers, etc). We could sure use some
help. :)

The current simplest advice I can give people is to remove all plugins:
http://tor.eff.org/download.html.en#Warning
Do you have any suggestions on safe ways to back off from that?

Thanks,
--Roger



Re: Warnings on the download page

2007-03-08 Thread H D Moore
Thanks for the feedback! Keep in mind this is the first applet I have ever 
written :-) Any information about the new API would be appreciated. Do 
you happen to know what versions it is compatible with? Bizzare that they 
would explicitly allow non-proxied connections. I used the Datagram 
Socket was so that I could send requests directly to the DNS server and 
not have to do any extra processing on the server side. 

The next version of decloak should be able to avoid Java/Javascript 
completely by loading up streaming media, PDFs, and so on within IFRAME 
tags inside the HTML. These media files would reference the magic DNS 
domain or custom services running on my server. An easy hack would be to 
stick a fake SMB service on the server and then embed UNC paths into the 
HTML. The tricky part is implementing enough of CIFS that I could extract 
a unique identifier from client's request.

-HD

On Thursday 08 March 2007 17:30, James Muir wrote:
 I discovered this back in January 2006 and wrote about it in a tech
 report.  I can give you a pointer to the tech report if you are
 interested.  I also have a demo which I will eventually post a URL for
 here once I clean it up a bit.


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake H D Moore ([EMAIL PROTECTED]):

 Thanks for the feedback! Keep in mind this is the first applet I have ever 
 written :-) Any information about the new API would be appreciated. Do 
 you happen to know what versions it is compatible with? Bizzare that they 
 would explicitly allow non-proxied connections. I used the Datagram 
 Socket was so that I could send requests directly to the DNS server and 
 not have to do any extra processing on the server side. 

Actually, I'm also curious about your on-the-fly applet tag
generation. Were you aware that it would bypass that
security.enable_java setting or was it just a general evasive thing
you did for filtering? Do you have any information if this is specific
to certain versions/JVMs or if it is a universal hack?

Have you contacted the Firefox people?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Thu, Mar 08, 2007 at 04:12:10PM -0600, H D Moore wrote:
  I am in the process of updating the decloak 
  demonstration to explain each of the tests and provide source code for 
  the components. What may not be obvious (especially from the ZDNet 
  article), is that I believe in the Tor project's goals and am not 
  developing these types of tests to damage the project. 
 
 Hi HD,
 
 Thanks for joining the discussion, and welcome. We (the Tor developers)
 have been working mostly on making Tor itself work, and hoping that
 other people would step up to help us figure out how to safely configure
 the supporting applications (web browsers, etc). We could sure use some
 help. :)
 
 The current simplest advice I can give people is to remove all plugins:
 http://tor.eff.org/download.html.en#Warning
 Do you have any suggestions on safe ways to back off from that?

I have a couple more points - the second browser phrase should link to
http://portableapps.com/apps/internet/firefox_portable because
otherwise it's not really easy to have a second firefox installed.
 
I think we should also mention that we do scan the exits to try to
verify they are behaving well, but we may miss some. 

While developing the next generation of my scanner I still do scan for
matching MD5s inside/outside Tor from time to time, and the next
generation scanning script itself will examine script+embedded tags to
handle odd content/URLS in dynamic pages, but the main danger though
is in people targeting small segments of the population that I do not
speak the language of to issue queries for..  Tibetan sympathizers in
China come to mind..  Well, pretty much everyone in China comes to
mind, and I'm sure there are plenty of other marginal groups this
applies to as well (other than child porn viewers).

Scanning doesn't help Moore's point 3, but hopefully some statement of
vigilance on our part will help Tor seem a little less like a
perpetual connection through the wireless net at Defcon.. Though
unfortunately that is the level of precaution Tor users should
probably be ready to take.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Watson Ladd


 If there is a security manager, its checkConnect method is called
 with the proxy host address and port number as its arguments. This
 could result in a SecurityException.
Just configure the security manager to prevent unproxyed connections.



signature.asc
Description: OpenPGP digital signature


Re: Warnings on the download page

2007-03-08 Thread H D Moore
On Thursday 08 March 2007 19:05, Mike Perry wrote:
 Actually, I'm also curious about your on-the-fly applet tag
 generation. Were you aware that it would bypass that
 security.enable_java setting or was it just a general evasive thing
 you did for filtering? Do you have any information if this is specific
 to certain versions/JVMs or if it is a universal hack?

This wasn't meant to be evasive and does not bypass the enable java 
setting on my browser (latest firefox + sun-jre-1.6.0). The reason for 
generating the applet tag on the fly is to enable injection by embedding 
a script src= into an HTML response.

 Have you contacted the Firefox people?

I didn't realize it was a vulnerability. I went to about:config, 
configured this setting to false, and the Java applet no longer loads on 
my system. What systems have you seen this fail on?

-HD


Re: Warnings on the download page

2007-03-08 Thread H D Moore
 Looks like the Practical Onion Hacking paper covered many features I 
was working on, as well as touching on the warez/movie/music leeches and 
the child pornography traffic. I should have released this back in August 
when I presented on it the first time :-)

The big differences are:

1) They use iptables to modify and reinject traffic, I use an embedded 
Ruby interpreter in the Tor software.

2) They perform DNS tracking, but don't actually record or cross-reference 
the data.

3) They use Flash instead of Java to obtain the real external address of 
the user.

Similarities include:

1) Web-bug injection via HTML response
2) DNS tracking via wildcard domain
3) Use of JS/Java bridge to get the internal address

Seems like two big items I need to add to decloak are Flash and the shiny 
no-proxy Java connection mode (which seems to apply to TCP sockets only).

-HD

On Thursday 08 March 2007 19:02, James Muir wrote:
 You should read the Fort Consult White paper Practical Onion Hacking
 as some of things you mention (SMB, CIFS) are mentioned there, I think.
   VB and ActiveX are probably worth exploring.


Re: Warnings on the download page

2007-03-08 Thread James Muir

Watson Ladd wrote:

If there is a security manager, its checkConnect method is called
with the proxy host address and port number as its arguments. This
could result in a SecurityException.

Just configure the security manager to prevent unproxyed connections.


Even if all Java connections are proxied through Tor, it is still 
possible to read the end user's IP address locally and submit it to the 
server that originated the applet.  Java, along with all other browser 
plugins, should be disabled.


By the way, I just had another look at Roger and Mike's warning on the 
download page (it's now repositioned above the download links).  I think 
 it's very well done.  Good work!


-James


Re: Warnings on the download page

2007-03-08 Thread H D Moore
Flash is now supported:
http://metasploit.com/research/misc/decloak/

-HD

On Thursday 08 March 2007 20:33, H D Moore wrote:
 Seems like two big items I need to add to decloak are Flash and the
 shiny no-proxy Java connection mode (which seems to apply to TCP
 sockets only).


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 Thus spake Roger Dingledine ([EMAIL PROTECTED]):
 
  On Thu, Mar 08, 2007 at 04:12:10PM -0600, H D Moore wrote:
   I am in the process of updating the decloak 
   demonstration to explain each of the tests and provide source code for 
   the components. What may not be obvious (especially from the ZDNet 
   article), is that I believe in the Tor project's goals and am not 
   developing these types of tests to damage the project. 
  
  Hi HD,
  
  Thanks for joining the discussion, and welcome. We (the Tor developers)
  have been working mostly on making Tor itself work, and hoping that
  other people would step up to help us figure out how to safely configure
  the supporting applications (web browsers, etc). We could sure use some
  help. :)
  
  The current simplest advice I can give people is to remove all plugins:
  http://tor.eff.org/download.html.en#Warning
  Do you have any suggestions on safe ways to back off from that?
 
 I have a couple more points - the second browser phrase should link to
 http://portableapps.com/apps/internet/firefox_portable because
 otherwise it's not really easy to have a second firefox installed.

Actually, negative on this. Cookies, extensions, and bookmarks are not
transfered over, but existing plugins from other firefox installs are
still detected. We just can't seem to catch a break here.. There
doesn't seem to be any way to disable plugins once you have installed
them... The 'about:plugins' chart does have an Enabled column..
maybe burried somewhere is a way to disable them with extensions..

Does anyone know anything about wrting firefox extensions? How do I go
about finding these plugin enabled properties, if they even exist
outside the compiled code?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs