Re: [tor-relays] Current state of HSDir attacks on hidden services

2018-12-12 Thread Roger Dingledine
On Wed, Dec 12, 2018 at 02:59:34PM -0500, Jonathan D. Proulx wrote:
> Is it really still the case that spending a little time crafting
> the "right" finger prints i sall it takes for an adversary to
> reliably host the HSDir for a given hidden service? Well and
> 4-5 days uptime...

For the "legacy" v2 onion service design, yes. But for the v3 onion
service design, this class of attack does not work: the HSDirs for v3
onion services are unpredictable until the day of, because one of the
inputs to the hash function that determines the HSDirs is the daily
global shared-random-value:
https://gitweb.torproject.org/torspec.git/tree/srv-spec.txt

I guess in theory we could do a flag day and make everybody who upgrades
use this shared-random-value as part of the hash for determining HSDirs
for v2 onion services too. But it would probably result in a lot of
unhappy people, and anyway v2 has other problems too, like its keys are
way too short, so we'll be happiest if we just let it die out over time.

Another option would be to not worry about relays that appear to be trying
to attack v2 onion services, on the theory that if you want your onion
service to not be attacked, you should move to v3. The problem there is
that if people are running relays for reasons other than "I want to help
grow the network and keep people safe", then they're not going to have
the right motivations when it comes to other situations where we want
relay operators to act with the safety of users in mind. They've already
signaled to us that they aren't part of our community, so let's use that
information and not wait to find out what else they will do that we don't
like. ("When someone shows you who they are, believe them the first time"
and all that.)

> Assuming the new ColoCrossing nodes are maliciously target ina
> particular hidden service is it just their sloppiness of putting
> them all up in the same place over a short period rather than in
> a slower and more widely distributed manner the only thing that
> prevented them from acheving their unmasking goals?

Two answers:

(A) No, there are scripts we can run to look for fingerprint similarity,
and those scripts don't depend on when the relays joined the network.
See also this paper:
https://nymity.ch/anomalous-tor-keys/

and

(B) You said unmasking, but in its simple form, this attack is about
either measuring popularity of a service or about censoring it. If you get
to be some of the HSDirs for your target onion address, you can measure
its popularity (by counting anonymous lookups). If you get to be all six
of its HSDirs for a day, you can censor that onion address for the day
(by just sending "nope, never heard of it" in response to all lookups).

That said, you could combine "become some of the HSDirs for a particular
onion service" with "run a bunch of guards" and then do correlation
attacks to see if your guards have any clients that are fetching the onion
descriptor from the HSDir (or if you're super lucky, have any clients that
are *posting* the onion descriptor to the HSDir). But if you're patient
(and you already are because in this scenario you're running a bunch of
guards for long enough that they accumulate users), you could also wait
until the day where one of your relays randomly becomes the HSDir for
the onion service in question, which would take longer but not require
any relay key placement attack.

Hope that helps,
--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] AS: "OVH SAS" - 17 relays (2018-10-24)

2018-12-12 Thread nusenu
a relay gang joined in Oct 2018 at OVH


2018-10-24

|   Up |   Ext | JoinTime   | IP| CC   |   ORp |   Dirp | Version   
| Contact   | Nickname   |   eFamMembers | FP   
|
|--+---++---+--+---++---+---++---+--|
|1 | 0 | 13:43:16   | 145.239.0.204 | de   |   443 |  0 | 0.3.4.8   
| None  | Chief  | 1 | 
5EF464D06322614A3B8B6C2652C3C616F098EE8A |
|1 | 0 | 13:43:17   | 54.37.200.155 | fr   |   443 |  0 | 0.3.4.8   
| None  | Dash   | 1 | 
B55F8445569407FBE6BAF205799A9EF8AC8CC256 |
|1 | 0 | 13:43:18   | 51.68.170.247 | fr   |   443 |  0 | 0.3.4.8   
| None  | Rebel  | 1 | 
E7B036D933D6E0A68983E8E3F664EAA54ACDEA37 |
|1 | 0 | 13:43:20   | 51.75.82.166  | fr   |   443 |  0 | 0.3.4.8   
| None  | Butch  | 1 | 
4809E3F9A73F5373734A4D23E7E7807A4743DD8A |
|1 | 0 | 13:43:21   | 51.75.153.17  | fr   |   443 |  0 | 0.3.4.8   
| None  | Beauty | 1 | 
B66FBE3B2D9CE257AF75DEA760C69E379F7CDB80 |
|1 | 0 | 13:43:22   | 51.68.170.74  | fr   |   443 |  0 | 0.3.4.8   
| None  | Killer | 1 | 
E4CB0C293588C3E5FA7DB94485FF2686E128267F |
|1 | 0 | 13:43:23   | 51.68.185.141 | fr   |   443 |  0 | 0.3.4.8   
| None  | Arrow  | 1 | 
707F51E232E0CDAF64EC446609E7112CD3AD11F8 |
|1 | 0 | 13:43:24   | 54.37.207.82  | fr   |   443 |  0 | 0.3.4.8   
| None  | Dazzle | 1 | 
B80142DDCF8D6B72929541EFCC643ECCD99BEE36 |
|1 | 0 | 13:50:41   | 145.239.1.97  | de   |   443 |  0 | 0.3.4.8   
| None  | Memo   | 1 | 
1C514FA1A4F8A464E1853B70AA5D2F16FF087AD2 |
|1 | 0 | 13:50:42   | 51.38.107.122 | fr   |   443 |  0 | 0.3.4.8   
| None  | Pitch  | 1 | 
91B026FA459AE0DA15673AB07A9C6DFF8B41782B |
|1 | 0 | 13:50:43   | 51.68.186.59  | fr   |   443 |  0 | 0.3.4.8   
| None  | Smasher| 1 | 
3B0EFDE689693CFDEC2305F7B99D5B2FA4A77D91 |
|1 | 0 | 13:50:44   | 51.75.85.114  | fr   |   443 |  0 | 0.3.4.8   
| None  | Landslide  | 1 | 
C953A4C8DF0E233CB0D190C2A71B71F634AB4A14 |
|1 | 0 | 13:50:45   | 51.68.182.30  | fr   |   443 |  0 | 0.3.4.8   
| None  | Shade  | 1 | 
EBE58DDCC51A9D23EE9DD39791695B608A1DFB29 |
|1 | 0 | 13:50:46   | 54.37.207.37  | fr   |   443 |  0 | 0.3.4.8   
| None  | Buster | 1 | 
D10C82E275A2B0121CF4075C92687F0786A72892 |
|1 | 0 | 13:50:47   | 54.37.200.157 | fr   |   443 |  0 | 0.3.4.8   
| None  | Digger | 1 | 
6B29A78EEB42D318290DB60C6A2EDC714F1BAD42 |
|1 | 0 | 13:50:48   | 54.37.207.84  | fr   |   443 |  0 | 0.3.4.8   
| None  | Pipi   | 1 | 
150F7C9F4814C4918F4D2DEAA0C7A2255DC8C0E0 |
|1 | 0 | 13:50:49   | 51.75.153.19  | fr   |   443 |  0 | 0.3.4.8   
| None  | Shrimp | 1 | 
51429A0F427A8DCB5B9DE64E35ECBBB76DAB0F7F |

https://nusenu.github.io/OrNetRadar/2018/10/24/a3


-- 
https://twitter.com/nusenu_
https://mastodon.social/@nusenu



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: ColoCrossing + QuadraNet = 42 relays

2018-12-12 Thread mick
On Tue, 11 Dec 2018 22:38:00 +
nusenu  allegedly wrote:

> The first column shows the first 4 characters of the fingerprint, the
> second how may relays have it and when and where (AS) they joined the
> network.
> 
> +--+---+-++
> | FP   | # |
> first_seen  |
> as_name|
> +--+---+-++
> | 0324 | 3 | 2018-12-11 07:00:00,2018-12-11 08:00:00,2018-12-11
> 10:00:00 | ColoCrossing,QuadraNet Enterprises LLC | | 2D56 | 3 |
> 2018-12-10 05:00:00 |
> ColoCrossing   | | 2EBF | 3 | 2018-12-10
> 06:00:00,2018-12-10 07:00:00,2018-12-10 08:00:00 |
> ColoCrossing,QuadraNet Enterprises LLC | | 48A3 | 3 | 2018-12-10
> 06:00:00,2018-12-10 07:00:00,2018-12-10 08:00:00 |
> ColoCrossing   | | 5F46 | 3 | 2018-12-11
> 07:00:00,2018-12-11 09:00:00,2018-12-11 11:00:00 |
> ColoCrossing   | | 8788 | 3 | 2018-12-10
> 09:00:00,2018-12-10 10:00:00,2018-12-10 11:00:00 |
> ColoCrossing   | | A099 | 3 | 2018-12-10
> 16:00:00,2018-12-10 17:00:00 |
> ColoCrossing   | | A116 | 3 | 2018-12-11
> 07:00:00,2018-12-11 08:00:00,2018-12-11 10:00:00 |
> ColoCrossing,QuadraNet Enterprises LLC | | A677 | 3 | 2018-12-09
> 13:00:00 |
> ColoCrossing   | | AA08 | 3 | 2018-12-10
> 09:00:00,2018-12-10 10:00:00,2018-12-10 11:00:00 |
> ColoCrossing   | | C00B | 3 | 2018-12-10
> 04:00:00 |
> ColoCrossing   | | C0D4 | 3 | 2018-12-11
> 07:00:00,2018-12-11 09:00:00,2018-12-11 11:00:00 |
> ColoCrossing   | | D021 | 3 | 2018-12-09
> 14:00:00,2018-12-09 15:00:00 |
> ColoCrossing,QuadraNet Enterprises LLC | | FB34 | 3 | 2018-12-10
> 16:00:00,2018-12-10 17:00:00 |
> ColoCrossing   |
> +--+---+-++
> 14 rows
> 
> 14*3=42
> 
> This should become a new OrNetRadar detector. 
> 

And given ColoCrossings advertised prices, even using single servers
that amounts to nearly $840 pcm or over $10.000 per annum. That doesn't
looks like a hobbyist. 


-
 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 https://baldric.net/about-trivia
-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread mick
On Wed, 12 Dec 2018 19:17:56 +0100 (CET)
Nathaniel Suchy  allegedly wrote:

> It's scary to think there are bad people out there actively trying to
> harm our community :(

I'd be astonished if there weren't. Tor is a thorn in the side for lots
of different entities. I am just grateful that it exists and that there
are people prepared to defend it.


-
 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 https://baldric.net/about-trivia
-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread Ralph Seichter
* Nathaniel Suchy:

> It's scary to think there are bad people out there actively trying to
> harm our community :(

I take it as a compliment. Tor authors and relay operators are having
enough of an effect that some entities out there try to undermine us.

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread Spiros Andreou
That is why many of us do what we do Nathaniel 

On December 12, 2018 6:17:56 PM UTC, Nathaniel Suchy  wrote:
>It's scary to think there are bad people out there actively trying to
>harm our community :(
>
>Cordially,
>Nathaniel Suchy
>
>
>
>Dec 12, 2018, 10:46 AM by dgou...@torproject.org:
>
>> On 12 Dec (09:33:58), Toralf Förster wrote:
>>
>>> On 12/11/18 10:54 PM, nusenu wrote:
>>> >  from their fingerprints
>>> I'm just curious that the fingerprints starts with the same
>sequence. I was
>>> under the impression that the fingerprint is somehow unique like a
>hash?
>>>
>>
>> If one would like to position their relay on the hashring at a
>specific spot,
>> you can bruteforce the key generation to match the first bytes of the
>> fingerprint. Usually 4 or 5 bytes are enough and it doesn't take that
>long to
>> compute.
>>
>> And because the position on the hashring is predictable over time for
>hidden
>> service *version 2*, then anyone can setup relays that in 5 days will
>be at
>> the right position.
>>
>> Thus the importance to catch these relays before they get the HSDir
>flag that
>> is 96 hours of uptime.
>>
>> Cheers!
>> David
>>
>> -- 
>> WzhUyhDvWQI2JZglnMWl4fhIHYln5DpMG50IrXaHPLU=
>>
>
>___
>tor-relays mailing list
>tor-relays@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Spiros Andreou___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread Nathaniel Suchy
It's scary to think there are bad people out there actively trying to harm our 
community :(

Cordially,
Nathaniel Suchy



Dec 12, 2018, 10:46 AM by dgou...@torproject.org:

> On 12 Dec (09:33:58), Toralf Förster wrote:
>
>> On 12/11/18 10:54 PM, nusenu wrote:
>> >  from their fingerprints
>> I'm just curious that the fingerprints starts with the same sequence. I was
>> under the impression that the fingerprint is somehow unique like a hash?
>>
>
> If one would like to position their relay on the hashring at a specific spot,
> you can bruteforce the key generation to match the first bytes of the
> fingerprint. Usually 4 or 5 bytes are enough and it doesn't take that long to
> compute.
>
> And because the position on the hashring is predictable over time for hidden
> service *version 2*, then anyone can setup relays that in 5 days will be at
> the right position.
>
> Thus the importance to catch these relays before they get the HSDir flag that
> is 96 hours of uptime.
>
> Cheers!
> David
>
> -- 
> WzhUyhDvWQI2JZglnMWl4fhIHYln5DpMG50IrXaHPLU=
>

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread David Goulet
On 12 Dec (09:33:58), Toralf Förster wrote:
> On 12/11/18 10:54 PM, nusenu wrote:
> >  from their fingerprints
> I'm just curious that the fingerprints starts with the same sequence. I was
> under the impression that the fingerprint is somehow unique like a hash?

If one would like to position their relay on the hashring at a specific spot,
you can bruteforce the key generation to match the first bytes of the
fingerprint. Usually 4 or 5 bytes are enough and it doesn't take that long to
compute.

And because the position on the hashring is predictable over time for hidden
service *version 2*, then anyone can setup relays that in 5 days will be at
the right position.

Thus the importance to catch these relays before they get the HSDir flag that
is 96 hours of uptime.

Cheers!
David

-- 
WzhUyhDvWQI2JZglnMWl4fhIHYln5DpMG50IrXaHPLU=


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] AS: "ColoCrossing" - 28 new relays

2018-12-12 Thread Toralf Förster
On 12/11/18 10:54 PM, nusenu wrote:
>  from their fingerprints
I'm just curious that the fingerprints starts with the same sequence. I was 
under the impression that the fingerprint is somehow unique like a hash?

-- 
Toralf
PGP C4EACDDE 0076E94E




signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays