Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 79 80 [81] 82 83 ... 208
1201
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 05:14 pm »
In like 2004 to maybe 2007 when TOR was incredibly slow, I would modify the config file and have TOR go through specific IPs that I had selected from the list.  Ones with more bandiwdth and I just felt in my gut were safer lol.  It helped with the speed a lot.  I connected to private drug marketplace boards like that for years with no problems.  Before I had modified it, I would time out and have to change my identity all the time.  My memory is awful but I would assume that I wasn't going through an internet connection that didn't belong to me.  I really had no idea that I was compromising my security back then

Yeah, if your entry guard operator was malicious, he could notice 'this guy only goes through very high bandwidth nodes', or 'only nodes that share these properties', 'let me spin up a few exit nodes that meet those requirements and pwn him'.

One of the more common biases that I've seen is people don't want to use nodes in their own country, but again, if your entry guard operator is looking for suspicious people, that certainly makes you look suspicious. Someone looking for "red tape" protection is probably worried about LE.

It would be ok if every Tor client behaved that way, but when only a small subset of users are doing it, they stick out of the crowd.

It's interesting how studying anonymity theory improves your thinking skills -- at least it did mine -- because it forces you to think logically about a problem whose solutions are often unintuitive. Lots of people intuitively do things that they think make them safer, but actually harm their anonymity.


  I'm sure you also remember when TOR was ridiculously slow astor.

Oh yeah. People who complain about how slow Tor is have no idea how painfully slow it used to be.

1202
Security / Re: How to get PGP
« on: May 29, 2013, 04:54 pm »
If you're on Windows (or 32 bit Linux), try the tutorial linked in my signature. It's worked for hundreds of other people.

You can download GPG4USB over Tor.

1203
Security / Re: Am I Connected to Tor? Connection Failure
« on: May 29, 2013, 04:51 pm »
They could have a restrictive firewall. You could try onion icon -> Settings -> My firewall only lets me connect to certain ports. It will already say 80,443 so go with that.

[Notice] Your system clock just jumped 4083 seconds backward; assuming established circuits no longer work.

Is your system clock wrong, or did it just update at that time? Being off by that much will prevent Tor from building circuits.

1204
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 06:47 am »
I think that's the scary part of all this. Ideally there should be some sort of mechanism that would recognize a guard node being taken over. I'm sure there's some algorithm that can figure that out.

Well, kmf is actually talking about a different attack from the one published in the paper that started this thread.

He's talking about a well known attack published in 2006 which you can read here: http://freehaven.net/anonbib/date.html#hs-attack06

That one doesn't require an entry guard to be taken over. It just requires LE to identify an entry guard by opening up many connections to the hidden service, and it's a lot scarier because it only takes 1-2 hours to find the entry guard, although probably days to weeks longer to monitor it and find the hidden service. However, that's way shorter than the 4-8 months it takes to carry out the attack in the recent paper. The best defense against the 2006 attack is layered entry guards, which are discussed in the original paper and still not implemented.

I'm still not 100% sure on how Tor works with the guard nodes and all the mechanisms in place. Whatever I've learnED has been pretty much reading your guys posts and some papers.

Correct me if I'm wrong but the guard nodes are random and no one knows where they will be exactly? Right? So LE does a timed attack to start eliminating possible nodes to hone in on the target? I think I understand why it's so diffucult to implement certain things in ToR.

Relays are given the entry guard flag by the directory authorities. Entry guards are chosen based on uptime and bandwidth. So right now there are about 3500 relays and 1200 entry guards. Here's a graph of how they change over time:

https://metrics.torproject.org/network.html?graph=relayflags&start=2012-02-29&end=2013-05-29&flag=Running&flag=Guard#relayflags

Your Tor client picks 3 entry guards and sticks with them for a month at a time. It does this "randomly" but based on bandwidth, otherwise small guards would be overloaded and the Tor network would be even slower. Your Tor client builds new circuits every 10 minutes, so before entry guards were created, your client would pick new entry nodes every 10 minutes. Going from 10 minutes to 1 month with the same entry nodes, you can see that was a big change in Tor client behavior.

In the 2006 attack, LE opens many connections to a hidden service, until one of them happens to pass through a node they control, which is one hop away from the entry guard. That way they can identify the entry guard.

In another situation I would just say let people assign their own guard nodes for their site but that just opens the doors for attack and makes ToR completely useless. It's quite the conundrum actually.

Allowing people to choose the nodes in their circuits would make their circuits distinguishable, because of individual biases in how they selected nodes, and that would reduce their anonymity.

Your anonymity is maximized when you look like everyone else, and more people that look just like you, the bigger your anonymity set. That's why you should stick to the defaults in your browser bundle, we all should, so we'll all look the same.

That being said, you *can* choose your own entry and exit nodes, it's just not recommended.


1205
I guess that really depends on how old you are. I read an interesting article today about how bitcoin mining is progressing so fast that the last block will be mined up 50+ years ahead of schedule. Its an interesting read, I'll link for anyone interested.

http://www.thegenesisblock.com/at-this-rate-the-last-new-btc-will-be-issued-55-years-ahead-of-schedule/

They need to adjust the difficulty more. Look at the hashrate over the last year, it exploded in the last few months:

https://blockchain.info/charts/hash-rate


BTW, if you ever needed incontrovertible evidence that hashrate has no influence on the price of BTC, compare that graph to this one:

https://blockchain.info/charts/market-price

There's no correlation. I wish the market price was increasing as steadily has the hashrate.

1206
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 04:45 am »
It's still worth noting that no hidden service has been deanonymized through a direct attack on the Tor network.

Maybe that's because LE is always 3 years behind the curve...


Very interesting... do you think something like that could work if I wanted to develop a website that cpu;d conduct financial transactions? I started another thread on how a site or application could be developed to anonymize transactions. Like for example how Liberty Reserve got shut down. Ideally a market place like Silk Road should have a currency exhanger or monetary transmitter that is not traceable. Now that's the flaw in the whole plan. The money has to go or come from somewhere right? It's not like I can apply the concept of Freenode and just deposit money into other peoples account and take it out later. Until that gets figured out one day it will be use playing catch up and not the Feds.

If you're talking about trades within bitcoin, there's Zerocoin.

http://dkn255hz262ypmii.onion/index.php?topic=152682.45

If you're talking about exchanging bitcoins for government-controlled currency, cash is the only (potentially) anonymous, untraceable government-backed currency, so cash for bitcoins seems like the only thing that would work.

Then you're back to face to face meetings.


My speciality is more on the programming/web side just learning about networks now but find it quite fascinating. Can you imagine how infuriating it is for a DEA agent knowing that there's a marketplace that sells drugs and uses their own post service to mail it out. That my friend is poetic justice at it's finest.

haha, I needed something to cheer me up man. :)

1207
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 04:16 am »
I know, they could trace to the entry guard in 1 hour and 20 minutes. :(

Seems like constructing your own network of layered private bridges in hostile countries like China, Cuba, and Venezuela might be the best immediate protection. Sucks when a political solution is better than a technological solution.

That's just going back to the clearnet days of thinking you were safe because you got web hosting in Panama.

1208
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 01:22 am »
That makes a couple of assumptions.

One is that they can observe the traffic from the guard node.

Well, the attack is successful when they own the guard node, but becoming the guard node through random selection by the hidden service is what takes so long and costs so much money.

It is possible to configure your own nodes for guard nodes which blocks this attack.

Yep, that's basically what I was saying. Alternatively, if the hidden service operator didn't want to deal with anonymously purchasing extra servers for the entry guards, they could change the length of time that they keep entry guards:

Code: [Select]
/* Choose expiry time smudged over the past month. The goal here
* is to a) spread out when Tor clients rotate their guards, so they
* don't all select them on the same day, and b) avoid leaving a
* precise timestamp in the state file about when we first picked
* this guard. For details, see the Jan 2010 or-dev thread. */
entry->chosen_on_date = time(NULL) - crypto_rand_int(3600*24*30);

Change 30 to 180 and you've got entry guards for up to 6 months at a time, minus churn. Then it takes 4 years and $44,000 to achieve a 90% success rate with this attack. Adjust as needed.

The second and more common configuration of a hidden service is to proxy the traffic through tor. Although it gets more complicated to explain it makes it much harder to De-anomize a hidden service. Think of it this way, the hidden service has to connect to other stuff. By proxying it through a tor client it hides the tor requests for a hidden service from the guard nodes.

Are you talking about Tor over Tor, ie you run two Tor instances and proxy one instance (which serves the hidden service) through the SocksPort of the other? Because all hidden services work over Tor. In any case, I don't think Tor over Tor (or even layered entry guards) helps here, because the probability of the attacker becoming one of the first-layer entry guards is the same.

What about the DoS attack based on taking over the hidden services directory? How difficult to implement, and protect against is that one?

That is more worrying. It looks like it's easy for an attacker to pull of, and there's not much a hidden service can do to defend against it. It's not like messing with your entry guards or intro points, because in order for your visitors to figure out your configuration in the first place (like which intro points they can talk to you), they need to find your descriptor. That requires mutual assumptions made by both parties: for example, that I as your visitor can find your hidden service descriptor at a relay whose fingerprint is closest to the hash of your public key and the date.

They can make the descriptor ID unpredictable, for example by concatenating a random string to the hash of the public key and the date, and hashing that again, but that kind of solution needs to be implemented by the whole network, and new browser bundles must be distributed to users. They are working on it thought:

https://trac.torproject.org/projects/tor/ticket/8244

1209
All those people are going to move to bitcoin.

1210
Shipping / Re: Is this what stealth is? 1st timer
« on: May 28, 2013, 04:01 pm »
Really depends on what you're paying. For free shipping, I wouldn't expect anything better than this, although the smell shouldn't permeate Mylar / MBBs. If you expect the vendor to hide the goods inside an object, then be prepared to pay $10-30 for shipping.

1211
Security / Re: Where?
« on: May 28, 2013, 02:52 pm »
I don't think it lets you withdraw coins to no address. That would be a massive UI fuck up if it did.

Not only should an address be in that field, they can check if it's valid, since the last few chars are a hash of the rest of the address.

1212
Security / Re: Hidden services security doesn't look too good.
« on: May 28, 2013, 02:26 pm »
To direct this attack at a specific hidden service, they write:

Quote
In early 2012 we operated a guard node that we rented from a large European hosting company (Server4You, product EcoServer Large X5) for EUR 45 (approx. USD 60) per month. Averaging over a month and taking the bandwidth weights into account we calculated that the probability for this node to be chosen as a guard node was approximately 0.6% on average for each try a Tor client made that month. As each hidden service chooses three guard nodes initially, we expect over 450 hidden services to have chosen this node as a guard node10 . Running these numbers for a targeted (non-opportunistic) version of the attack described in Section VI-A shows us that by renting 23 servers of this same type would give us a chance of 13.8% for any of these servers to be chosen. This means that within 8 months, the probability to deanonymize a long-running hidden service by one of
these servers becoming its guard node is more than 90%, for a cost of EUR 8280 (approximately USD 11,000).

Granted, $11,000 and 8 months isn't impossible for some LEA to spend to identify a very high value hidden service, but it's also not a trivial attack, and it still depends on the hidden service having a normal entry guard configuration and rotation period.



1213
Security / Re: Hidden services security doesn't look too good.
« on: May 28, 2013, 02:15 pm »
With that being said I'm still highly skeptical about what that article proposes. We can sit here all day and theorycraft but what counts is real world results. Like Jack N Hoff said so why haven't they done it yet?

It's important to understand what this attack is, and what it is not. It is effective at deanonymizing random hidden services among a large collection of hidden services (like the 40K that exist on the Tor network). It is not effective at deanonymiznig a specific hidden service.

The attack works because the attacker can trawl for many HS descriptors in a short amount of time, and at relatively little cost. That's what most of the paper is about. But it relies on the fact that some hidden services randomly chose the attacker's node for their entry guard. That's why in the paper they deanonymized two hidden services controlled by them, which they configured to use their entry guard on purpose, and some bots in a botnet, because there are probably tens of thousands of these bots running as hidden services, so the chances were high that some of them chose the researchers' entry guard.

They didn't deanonymize SR or other specific, high value hidden services, nor could LE trivially do that with this attack, because the chances of those few hidden services randomly choosing LE's entry guard are extremely small. In fact, they could be running their own anonymously purchased, private entry guards, thus making the attack impossible. ;)


1214
Security / Re: How to Open PDFs and RARs in Tails
« on: May 28, 2013, 05:28 am »
Have you tried some random RAR file as a test, like the one I linked above?

We can at least figure out whether it's the archive manager or the archive.

1215
Security / Re: How to Open PDFs and RARs in Tails
« on: May 28, 2013, 04:34 am »
Try this. Navigate to the folder with the RAR file. Right click on it -> Extract here. The a folder should be created with the same name as the RAR file. The PDFs should be in it.

Pages: 1 ... 79 80 [81] 82 83 ... 208