Re: Warning to NoReply.org DEB Package Users

2007-08-11 Thread Mike Cardwell
* on the Fri, Aug 10, 2007 at 04:12:21PM -0400, Ringo Kamens wrote:

 As you know, a major security vulnerability was just patched with the
 0.1.2.16 release. I have been using the noreply.org deb packages but
 they didn't update to the newest version (at least not under amd64
 feisty). If you are in my situation you can compile from source or
 disable your controlport and wait out the storm until a new version is
 released. Is the package maintainer busy or..?
 Comrade Ringo Kamens

I've been using the noreply 0.1.2.16 release since it came out 9 days
ago...

[EMAIL PROTECTED]:~# grep noreply /etc/apt/sources.list
deb http://mirror.noreply.org/pub/tor etch main
deb-src http://mirror.noreply.org/pub/tor etch main 
[EMAIL PROTECTED]:~# dpkg -l|grep ' tor '
ii  tor 0.1.2.16-1~~etch.1
anonymizing overlay network for TCP
[EMAIL PROTECTED]:~# 

The amd64 Feisty version came out at the same time:

http://mirror.noreply.org/pub/tor/pool/feisty/tor_0.1.2.16-1~feisty.1_amd64.deb

Mike


Re: Warning to NoReply.org DEB Package Users

2007-08-11 Thread Florian Reitmeir
On Fri, 10 Aug 2007, coderman wrote:

 On 8/10/07, Ringo Kamens [EMAIL PROTECTED] wrote:
  I think what he is saying (which might be true) is that tor doesn't
  have the permissions to save the torcc.
 there are some configurations that don't allow saving the config.
 they are still vulnerable.

if you use the standard debian config, you have nothing to fear
- torrc not writeable 
- controlport not open

and .. the maintainer claims, the versions online are updated since nearly 
1.5 weeks are the fixes version.

-- 
Florian Reitmeir


Re: Warning to NoReply.org DEB Package Users

2007-08-11 Thread Florian Reitmeir
On Fri, 10 Aug 2007, Kyle Williams wrote:

 This is not true.  The affects of the bug are very sever, and it DOES NOT
 require the config to be saved!  An attacker could still cause you to loose
 your anonymity.
 UPDATE, UPDATE, UPDATE.

like i wrote before, you are only vunerable if you have the following
conditions:

- open control port
- for the tor process writeable config file

And the versions online are all up to date, so in doubt just upgrade.


If you use an Tor GUI, i _really_ recommended to upgrade.

-- 
Florian Reitmeir


Re: Warning to NoReply.org DEB Package Users

2007-08-11 Thread Ringo Kamens
@Mike: Good to know. I'll just use the etch version for now since
feisty isn't out.
Comrade Ringo Kamens

On 8/11/07, Florian Reitmeir [EMAIL PROTECTED] wrote:
 On Fri, 10 Aug 2007, Kyle Williams wrote:

  This is not true.  The affects of the bug are very sever, and it DOES NOT
  require the config to be saved!  An attacker could still cause you to loose
  your anonymity.
  UPDATE, UPDATE, UPDATE.

 like i wrote before, you are only vunerable if you have the following
 conditions:

 - open control port
 - for the tor process writeable config file

 And the versions online are all up to date, so in doubt just upgrade.


 If you use an Tor GUI, i _really_ recommended to upgrade.

 --
 Florian Reitmeir



Question about the vulnerability

2007-08-11 Thread nobledark
Hi,

Forgive my ignorance, but when exactly does the Control Port come 
into play? Is a Tor user who simply uses Tor in client mode 
vulnerable? I've seen the Control Port info in the man pages but 
that doesn't really answer my question - can anyone advise?


Thanks...

--
Physical Therapy Certification Training - Save online. Click now.
http://tagline.hushmail.com/fc/Ioyw6h4fRLWSIamOZfDYALKNND76wXfBEYQ0xxTKjuRkELVSOPJh3L/



Re: Question about the vulnerability

2007-08-11 Thread Roger Dingledine
On Sat, Aug 11, 2007 at 02:21:31PM -0400, [EMAIL PROTECTED] wrote:
 Forgive my ignorance, but when exactly does the Control Port come 
 into play? Is a Tor user who simply uses Tor in client mode 
 vulnerable? I've seen the Control Port info in the man pages but 
 that doesn't really answer my question - can anyone advise?

Read http://archives.seul.org/or/talk/Aug-2007/msg00034.html for the
answer. We do promise to explain it better once more people have had a
chance to upgrade. :)

Hope that helps,
--Roger



ModSecurity v2 Apache rules for directory servers

2007-08-11 Thread Mike Cardwell
On 
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients
one of the suggested methods to get your Directory service on port 80 if Apache 
is
in the way is to use mod_proxy.

Personally I think sticking tors directory service behind Apache so it's
not exposed to the wider Internet directly is a good thing anyway. The
shear scale of development, usage and history of Apache makes me
confident that it is less likely to contain security holes than tor,
(see recent exploit)

This is not a dig! I am writing this email to share some ModSecurity
(http://www.modsecurity.org/) rules that I have been developing and using
to severely restrict the requests that get forwarded onto the tor daemon by
mod_proxy. Someone may find them useful. Here are the relevant parts of
my Apache vhost:

Location /tor/
   SecRuleEngine On
   SecRequestBodyAccess  On
   SecResponseBodyAccess Off
   SecRuleInheritanceOff
   SecAuditLogRelevantStatus ^500$
   SecDefaultAction  log,auditlog,deny,phase:2,status:500,severity:'2'

   SecRule HTTP_HOST!^\d{1,3}(?\.\d{1,3}){3}$ msg:'Host header must 
be IP address'
   SecRule REQUEST_PROTOCOL !^HTTP/1\.[01]$msg:'HTTP/1.0 or 
HTTP/1.1 only'
   SecRule REQUEST_METHOD   !^GET$ msg:'We only allow 
GETs here'
   SecRule REQUEST_HEADERS:Content-Length !^0?$msg:'No request 
message bodies allowed'

   SecRule REQUEST_URI !^/tor/server/authority$   
chain,msg:'Badly formed uri'
   SecRule REQUEST_URI !^/tor/status/all$ 
chain
   SecRule REQUEST_URI !^/tor/running-routers$
chain
   SecRule REQUEST_URI !^/tor/dir\.z$ 
chain
   SecRule REQUEST_URI 
!^/tor/server/(?d|fp)/(?[A-F0-9]{40})(?\+[A-F0-9]{40})*\.z$ chain
   SecRule REQUEST_URI !^/tor/status/fp/[A-F0-9]{40}(?\+[A-F0-9]{40})*\.z$

   ProxyPass http://127.0.0.1:9030/tor/
/Location

I put another http service behind Apache earlier this year unrelated to
tor (I wont mention the name of the product). After it had been running
for a couple of months, we found a DOS that could be performed
accidently by doing a GET request in a certain way. Whilst waiting
for a bug fix, because I had the flexibility of Apache in front of it,
it was a synch to just stick a rewrite rule in place to prevent the
request taking place and the DOS happening.

P.S. The ProxyPassReverse entry in the faq seems redundant as the tor
directory http service doesn't appear to ever return a redirect response.

Mike


Re: Question about the vulnerability

2007-08-11 Thread nobledark
Roger, thank you for your response - I did follow that thread when 
it came out and upgraded my systems. The question I have is not 
really about the vulnerability but more of a general operational 
one - in what situations is the control port actually used? If I am 
not running a Tor server but using Tor in client mode, does the 
Control Port get used? What is it used for? 

Thanks again for the great softwarelooking to do more with it 
soon.

 -Nd

On Sat, 11 Aug 2007 14:33:22 -0400 Roger Dingledine [EMAIL PROTECTED] 
wrote:
On Sat, Aug 11, 2007 at 02:21:31PM -0400, [EMAIL PROTECTED] 
wrote:
 Forgive my ignorance, but when exactly does the Control Port 
come 
 into play? Is a Tor user who simply uses Tor in client mode 
 vulnerable? I've seen the Control Port info in the man pages but 

 that doesn't really answer my question - can anyone advise?

Read http://archives.seul.org/or/talk/Aug-2007/msg00034.html for 
the
answer. We do promise to explain it better once more people have 
had a
chance to upgrade. :)

Hope that helps,
--Roger

--
Physical Therapy Certification Training - Save online. Click now.
http://tagline.hushmail.com/fc/Ioyw6h4fRLWWyWbFnuwkUswPqDGvlT8E7rn1b7OrcQLbFphpLlFGEx/



Re: Question about the vulnerability

2007-08-11 Thread Freemor
On Sat, 2007-11-08 at 15:33 -0400, [EMAIL PROTECTED] wrote:
 Roger, thank you for your response - I did follow that thread when 
 it came out and upgraded my systems. The question I have is not 
 really about the vulnerability but more of a general operational 
 one - in what situations is the control port actually used? If I am 
 not running a Tor server but using Tor in client mode, does the 
 Control Port get used? What is it used for? 

The control port is used to let you, another program, another computer,
control/communicate with TOR. If you just install tor as a client and
don't mess about with the config file the control port should be closed
by default. if you install a tor/Vidalia bundle the control port will
need to be open so Vidalia can control/communicate with TOR Same would
go for if you were using TorK, if your TOR is on a net appliance and
configured to be controlled/communicate with Vidalia/TorK/etc on another
machine.

Privoxy doesn't fall into this discussion as it just shuttles data
through tor rather then communicating with TOR

you can read more on the control port at:
http://tor.eff.org/tor-manual.html.en

and 

http://tor.eff.org/svn/trunk/doc/spec/control-spec.txt

long story short... if you are using a GUI for tor the control port is
most likely open.



Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG

See: http://gnupg.org/ for more details




signature.asc
Description: This is a digitally signed message part


Re: Question about the vulnerability

2007-08-11 Thread nobledark
Freemor, thanks a lot - that makes perfect sense...glad I upgraded 
:)

-Nd

On Sat, 11 Aug 2007 18:13:12 -0400 Freemor [EMAIL PROTECTED] wrote:
On Sat, 2007-11-08 at 15:33 -0400, [EMAIL PROTECTED] wrote:
 Roger, thank you for your response - I did follow that thread 
when 
 it came out and upgraded my systems. The question I have is not 
 really about the vulnerability but more of a general operational 

 one - in what situations is the control port actually used? If I 
am 
 not running a Tor server but using Tor in client mode, does the 
 Control Port get used? What is it used for? 

The control port is used to let you, another program, another 
computer,
control/communicate with TOR. If you just install tor as a client 
and
don't mess about with the config file the control port should be 
closed
by default. if you install a tor/Vidalia bundle the control port 
will
need to be open so Vidalia can control/communicate with TOR Same 
would
go for if you were using TorK, if your TOR is on a net appliance 
and
configured to be controlled/communicate with Vidalia/TorK/etc on 
another
machine.

Privoxy doesn't fall into this discussion as it just shuttles data
through tor rather then communicating with TOR

you can read more on the control port at:
http://tor.eff.org/tor-manual.html.en

and 

http://tor.eff.org/svn/trunk/doc/spec/control-spec.txt

long story short... if you are using a GUI for tor the control 
port is
most likely open.



Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG

See: http://gnupg.org/ for more details

--
Get a degree! Free information on Certification Physical Therapist. Click Here.
http://tagline.hushmail.com/fc/Ioyw6h4fRLWZWkIzNZJNNzVVIgTeOmAatXV7Kfk5GA0udqOE9a0iL3/



Re: New Hidden Wiki

2007-08-11 Thread Ringo Kamens
Respect and stay safe. You are a hero.
Comrade Ringo Kamens

On 8/11/07, Matthew [EMAIL PROTECTED] wrote:
 I just put up a new hidden wiki.  It's at http://624eb2rznzhtq2cz.onion/

 With a little googling, I found a page that had the main page of the
 old hidden wiki, so I put it up as the main page of the new hidden
 wiki.

 It still needs some updating to the hidden services, conversion of the
 rest of the camelcase links to mediawiki links, re-creation of the
 other pages, and anything else I haven't thought of.

 --Matt