On Mon, Aug 05, 2013 at 09:19:01AM -0400, liberationt...@lewman.us wrote:
> Please cite first person sources on this. It's not clear the FBI did
> anything or is involved at all. There is a reddit thread implying this,
> but no statement (as of yet) from the FBI or anyone claiming
> responsibility for the javascript injection.

The press is treating it as a likelihood.  That's no proof, of course,
but the narrative is internally consistent and most alternatives seem
quite unlikely.

http://www.wired.com/threatlevel/2013/08/freedom-hosting/

> Second, it's not clear this exploit or malware has actually compromised
> current versions of Tor Browser (as released on June 26, 2013). Please
> show a working exploit against the current TBBs.

In fact it seems quite clear that the 65.222.202.54 malware does *not*
affect 17.0.7esr per

http://tsyrklevich.net/tbb_payload.txt

Every claim I've seen is that this single payload was the only deployed
malware in this incident.

As I understand it, TBB users who installed or upgraded after June 26
are not vulnerable, and users of old versions got a notice at startup
that an upgrade is required.  Is that correct?

If the above is correct, then only TBB users on Windows who installed
TBB before June 26 and ignored the warnings would be affected.

Does TBB have usage statistics breaking out the upgrade rate per
platform?  Are we talking about 90% upgrade rates after 30 days, or 15%
upgrade rates?

> Third, please show data that "half of all Tor hidden services" have
> been compromised. We don't have this data because we don't track hidden
> services. If you do, please share your metrics.

Indeed, it's difficult to measure.  Half by count?  Half by users?  Half
by circuits?  Half by bandwidth?  But the forum analysis indicates that
there's been significant impact, so saying "half" seems reasonable.
Better stats would be great, but in the absence, a rough estimate isn't
unreasonable.


Seems to me the Tor project's response was about right; the only
potential improvement I can think of would be automatically downloading
the upgrade in the background, to improve update rates.  (But I hate
software that does that ... but I am currently running a vulnerable
Firefox myself due to not getting reminded about upgrades, so I'm
evidence that "hate automatic upgrades" equals "is more vulnerable".)

One larger improvement would be to have the TBB browser sandboxed and
set to trigger an alarm on non-Tor outbound traffic.  Running Tails in a
suitably configured VM system can provide this capability, but
platform-specific application sandboxes can do it as well; Chrome
provides some prior art.  Developing this capability is a nontrivial
task...

Nadim's criticism of the Tor project seems a bit too strong given the
facts, and even given the unknowns when the news first broke.

Andrew's response to the criticism seems a bit overly harsh, but I'm
inclined to cut some slack for folks who've probably been working long
hard hours over the past days to understand the impact of these events.

Thanks,
-andy
--
Liberationtech list is public and archives are searchable on Google. Too many 
emails? Unsubscribe, change to digest, or change password by emailing moderator 
at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to