Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 70 71 [72] 73 74 ... 208
1066
Security / Re: Liberte Vs Tails Vs Ubuntu?
« on: June 14, 2013, 02:18 am »
now as soon as i shut down/restart and take out the USB, TOR/PGP4USB will no longer be installed. For me this is not a pain in the ass as they take 5 minutes to reinstall.

Except you lose your PGP key unless you backed it up somewhere. You can enable a persistent volume with the Ubuntu Live CD, but it won't be encrypted by default. It may be possible to do some LUKS/dm-crypt magic on it, but I'm not sure.

I think it's easier just to use Tails.

1067
Security / Re: Should we open clearnet pages in Tor?
« on: June 13, 2013, 07:01 pm »
I create a web site that isn't indexed by any search engines. I post the the link on this forum so only SR community members know about it. Like all web servers, mine records the IP address of everyone that accesses my site. I filter out the Tor exit nodes. Now I have a list of SR members' real IP addresses.

Some people use VPNs, but those are relatively easy to filter out too, since the IP address belongs to a hosting provider instead of a residential ISP. Mullvad uses Leaseweb, Private Internet Access uses FDC Servers. If I was serious about performing the attack, I would get lists of the top residential ISPs in the most represented countries: US, UK, Australia, Germany and on down the list. It would be easy to identify the people accessing the site from home.

Visiting a link like cnn.com is probably safe because so many people visit that site, but if it's some obscure web site, or a site you've never heard of before, definitely only visit it over Tor.

1068
Silk Road discussion / Re: A threat to SR?
« on: June 13, 2013, 04:56 pm »
ANYONE WHO IS A THREAT TO THE ROAD SHOULD BE KILLED!!               PERIOD!


its the best way to protect anything

Oh cool. Then we become another violent cartel.

1069
I can tell you that there are a lot of people thinking of ways to completely decentralize online marketplaces. It is a technically challenging endeavor to say the least, but I wouldn't be surprised if in five years there is a massive, leaderless and fully decentralized marketplace. Of course anything would be available, it wouldn't be drug oriented, but drugs would be on the list of available items. I will be surprised if in five years we are not using something based on Bitcoin, but I will also be surprised if in five years we are still using a centralized marketplace.

You mean like this? :)

http://dkn255hz262ypmii.onion/index.php?topic=157711.msg1112047#msg1112047


1070
Perhaps it's too technical a topic for the popular press, but anonymity networks and cryptocurrencies need to innovate just as much as markets to stay ahead of LE. Zerocoin should greatly improve Bitcoin, but I don't know if Tor can innovate fast enough. The really big change in 5 years may be that SR and other black markets will be hidden behind a different anonymity network.

1071
Security / Re: Question
« on: June 13, 2013, 02:45 am »
You mean, can they see what address the coins came from when they were deposited to your MtGox address?

Of course, the transaction is in the block chain.

1072
Yep, the longterm solution is to make descriptor IDs unpredictable by having the directory authorities publish a consensus random string an hour or two before each GMT date. The short term solution would be to run dozens of onion addresses.

1073
Silk Road discussion / Re: A threat to SR?
« on: June 12, 2013, 09:07 pm »
That's... not, quite accurate.  It's leaving out guards, which is what had me thinking it was the protocol before their introduction.  But sure, maybe they skimmed over it (or I missed it in my own skimming).  But further on, they clearly state:
....

Sure, that's all well and good... except they STILL haven't mentioned the fucking guards?  It's like they're analyzing the network before guards were introduced.  Now in fairness they go on to talk about them when detailing their next attack, but there's weirdness there.  Before skipping to VI A though, this line in V A caught my eye:

Well, they're describing the first part of the attack. The other part is to flood the network with guards, the economics of which is described in VI.C:

Quote
In early 2012 we operated a guard node that we rented from a large European hosting company (Server4You, product EcoServer Large X5) for EUR 45 (approx. USD 60) per month. Averaging over a month and taking the bandwidth weights into account we calculated that the probability for this node to be chosen as a guard node was approximately 0.6% on average for each try a Tor client made that month. As each hidden service chooses three guard nodes initially, we expect over 450 hidden services to have chosen this node as a guard node10 . Running these numbers for a targeted (non-opportunistic) version of the attack described in Section VI-A shows us that by renting 23 servers of this same type would give us a chance of 13.8% for any of these servers to be chosen. This means that within 8 months, the probability to deanonymize a long-running hidden service by one of these servers becoming its guard node is more than 90%, for a cost of EUR 8280 (approximately USD 11,000).


Quote from: Section V A
Just like any Tor client, an attacker is able to compute the descriptor IDs of the hidden service for any moment in the future and find the fingerprints of expected responsible HS directories.  After that she can compute the private/public key pairs so that SHA-1 hash of the public keys would be in-between the descriptor ID and the fingerprint of the first responsible hidden service directory.  The attacker then runs Tor relays with the computer public/private key pairs and waits for 25 hours until they obtain the HSDir flag.

I thought you could only calculate the descriptor IDs 24 hours in advance

Unless a cookie is set with the HiddenServiceAuthorizeClient option, the descriptor IDs are deterministic and computable arbitrarily into the future:

Quote
Tor hidden service desc_id‘s are calculated deterministically and if there is no ‘descriptor cookie’ set in the hidden service Tor config anyone can determine the desc id‘s for any hidden service at any point in time.This is a requirement for the current hidden service protocol as clients must calculate the current descriptor id to request hidden service descriptors from the HSDir’s. The descriptor ID’s are calculated as follows:

descriptor-id = H(permanent-id | H(time-period | descriptor-cookie | replica))

The replica is an integer, currently either 0 or 1 which will generate two separate descriptor ID’s, distributing the descriptor to two sets of 3 consecutive nodes in the DHT. The permanent-id is derived from the service public key. The hash function is SHA1.

time-period = (current-time + permanent-id-byte * 86400 / 256) / 86400

The time-period changes every 24 hours. The first byte of the permanent_id is added to make sure the hidden services do not all try to update their descriptors at the same time.

identity-digest = H(server-identity-key)

The identity-digest is the SHA1 hash of the public key generated from the secret_id_key file in Tor’s keys directory. Normally it should never change for a node as it is used for to determine the router’s long-term fingerprint, but the key is completely user controlled.

but whatever, skipping that: how can this be possible at all, since even assuming they get to the point of impersonating the HSDirs in question due to the properties of the distributed hash table... they still won't have the private key for those servers that the 6 (is it 6?) authoritative directories will be checking for, and so will be ignored anyway?

I'm not sure what you're asking here.

Quote from: Section VI A
In order to confirm that an attacker controls a guard node of a hidden service she needs to control at least one more Tor non-exit relay.  In the attack, the hidden service is forced to establish rendezvous circuits to the rendezvous point controlled by the attacker.
...
If all the conditions are satisfied, the attacker decides that her guard node was chosen for the hidden service's rendezvous circuit and marks the previous node in the circuit as the origin of the hidden service.

I skipped over some stuff because I"m tired, but I don't understand how this is possible, unless you're running Tor over Tor...?  How can a guard ever be chosen as an introduction point for a hidden service -- the guard knows what hidden service it's a guard for, why in God's name would it blindly say "sure, I'll be the rendezvous point for my pal there!"  ???

The guard node isn't the intro point. The guard and rendezvous nodes are controlled by the attacker.

1074
So has the latest TOR update been released to solve these discrepancies and potential threats?

No. 0.2.4 still has 8 tickets: https://trac.torproject.org/projects/tor/milestone/Tor%3A%200.2.4.x-final

It was supposed to be released in March, so it's months behind schedule now. The major fix for this attack, a random salt for the descriptor ID, is scheduled for 0.2.5, which will probably come out a year from now.

1075
Silk Road discussion / Re: A threat to SR?
« on: June 12, 2013, 07:04 am »
*cue dramatic music*

It's pretty well known that Tor is insecure with respect to the default configuration for hidden services. An attacker can find the entry guards in under 2 hours. That's not news. One such attack has been in the literature since 2006.

However, there are measures a hidden service can take to mitigate these attacks, and I'm sure DPR and gang are well ahead of LE and researchers in their defenses.

1076
Silk Road discussion / Re: A threat to SR?
« on: June 12, 2013, 06:41 am »
FYI, Mike Hearn is a Google employee and Bitcoin developer.

Anyway: http://dkn255hz262ypmii.onion/index.php?topic=161391.msg1160970#msg1160970

The threat is real.

1077
I always imagined scout in a Barry White voice.

1078
Off topic / Re: Tell a stranger a secret
« on: June 12, 2013, 03:19 am »
I'm not a xtacy fan  :(

Say what!?

I've never heard anyone (that used real MDMA) say this before.

I feel the same way but I've seen maybe five other members here say that they don't like it and would never do it again.  MDMA that they got off the road too!  Craziness!!!

I find that almost impossible to believe. MDMA was my first drug experience and the hedonic peak of my life. People who don't like it either got bunk shit or they were on antidepressants.

1079
@windmillz

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=i8Ra
-----END PGP PUBLIC KEY BLOCK-----

1080
Security / Re: Zerocoins
« on: June 11, 2013, 11:13 pm »
It's like any mixing service, put in more than you need and split it out, or submit it in smaller increments and take it out as one lump sum, or some combination of the two. You can do 3 in and 3 out, but make them different amounts coming out and don't send them to the same address.

I don't trust mixing services like blockchain.info, where they charge a flat fee of 0.5%. So you send them 1 BTC and a few minutes later there are (always) exactly two transactions to the same address that total 99.5% of the other one. Anyone looking at the block chain can figure that out, especially since the transactions are so close to each other.

Pages: 1 ... 70 71 [72] 73 74 ... 208