Re: Security concerns/help me understand tor

2007-11-08 Thread Ruben Garcia
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Kyle Williams escribió:
 On Nov 7, 2007 8:52 AM, Roger Dingledine [EMAIL PROTECTED] wrote:
 
 On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin Fick wrote:
 My home router offers an http administration console
 on port 80 which for obvious security reasons is
 normally only accessible from the internal facing side
 of the router.  While many of these home routers
 typically have an internal private IP such as
 192.168.1.1 and an external public IP, they sometimes
 respond to both IPs from the inside and sometimes they
 even allow access to the administration console on the
 external IP if it is accessed from the internal side
 of the router (mine does).  This would not normally be
 a problem, but add a tor exit server to the inside of
 a home network serviced by such a router and ...you
 can probably guess where I am going with this.
 Yep. That's why Tor has a notion of exit policies:
 http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RunARelayBut
 If you really want to restrict connections to sensitive local resources,
 you should reject connections to them in your exit policy.

 The default exit policy rejects internal addresses like 10.*, 192.168.*,
 etc, but as you say there may be other sensitive resources depending on
 your situation.

 The other half of the answer is that you shouldn't be relying on network
 location for authorization. You should, for example, use a password.

 The third half of the answer is that running a web browser and interacting
 with strange websites creates an excellent opportunity already for dns
 rebinding attacks, cross-site foo attacks, etc. See for example the
 drive-by pharming report from some folks I've been working with at IU,
 summarized by Bruce Schneier here:
 http://www.schneier.com/blog/archives/2007/02/driveby_pharmin.html
 It's pretty darn scary what bad guys can do to access local resources
 by tricking your browser.

 In short, you'd better think harder if you want to both a) run complex
 programs that can act as proxies, such as a web browser and such as Tor,
 and b) do any sort of trust-by-network-location.

 This, of course, should only happen if Alice's tor
 client chooses Bob's tor server as the exit node.
 But, if I understand the tor documentation correctly,
 this would in fact be the preferred way for tor
 client's to access Bob's website since they should be
 able to detect that Bob's website and his tor exit
 server are in fact both (NATed to) the same public
 IP
 Yes. If you're visiting Bob's website, Tor can provide end-to-end
 authentication and end-to-end encryption without the need for SSL.
 This is a great potential feature. But you're right, Bob had better not
 allow additional access to sensitive resources for people connecting
 from his Tor relay.

 If I am correct about this possibility, and without
 arguing the virtues of whether these routers are doing
 the right thing by providing access to the admin
 console from the external IP from their inward facing
 interface, I think that tor relay providers should be
 strongly warned about this possibility in the tor
 documentation!  I am not sure that there is a good
 default (out of the box) way to prevent this from
 happening with tor, but I suspect that if Bob sets an
 exit policy explicitly rejecting his own IP that he
 would be safe from this sort of compromise?
 Yes, except in cases where a) he doesn't know the extent to which local
 services trust his IP address, and b) he is on a dynamic IP address.
 Unfortunately, I suspect these are exactly the contexts where it's most
 important for users to understand what's going on, *and* exactly the
 contexts where the users will be most ignorant about the issues.

 Where do you suggest we put the warnings, and can you suggest some
 sample phrasings?

 We could e.g. add a note to step 9 on
 https://www.torproject.org/docs/tor-doc-relay#after
 but I fear that most users can't (won't) count to 9.

 Another option is to assume that most home users will be configuring
 relaying via Vidalia, so we should concentrate on explaining all the
 various issues there. (In fact, Vidalia doesn't currently have a good
 interface for letting people tweak their exit policy by *addresses*
 as well as ports.)

 Another thought is that Tor relays already know their public IP address,
 since after all they have to advertise it. Perhaps the default exit
 policy should reject connections to that IP address, unless the operator
 explicitly allows them? See also the ExitPolicyRejectPrivate entry
 in the man page. This would be a shame to set up by default, but maybe
 secure-by-default-for-end-users is a trend we should embrace.

 And lastly, just to cover all bases: is there any point to this additional
 complexity given that the attacks can already be done just fine via a
 web browser? I guess it depends what assumptions we want to make about
 the users. My instinct would be 'yes'.

 All this leads to another 

Re: Security concerns/help me understand tor

2007-11-08 Thread Jacob Appelbaum
Kyle Williams wrote:
 I don't want to post all the results of my research, for fear that truly
 evil Torrorist would go crazy with this.  Let's just say that this could be
 very, very bad.  Trust me, Roger, this isn't something that should be taken
 lightly.  The moment Tor knows it's own external IP, and is operating as an
 exit node, it should (in code) automatically disallow connections to it's
 own external IP.  Unless someone has a really good reason why you would need
 access to your external IP address from inside your LAN.
 

I run a few services on the net. I like the idea that if I run a Tor
server on the same machine (on the same interface, with the same IP) as
my service, people using Tor will prefer my node as their exit node.
This allows me to provide services indirectly to the Tor network without
very much effort. Smart routing is neato. This is a feature and a pretty
neat one at that.

 BTW, I tried the 'responsible discloser' once already in IRC, remember
 Roger?
 So I don't feel bad one bit for talking about this with others.
 At least I included a temporary solution to the problem.
 

I didn't know about your IRC discussion however, I think you should
disclose the results of your research to [EMAIL PROTECTED]

I'm sure it would be appreciated and everyone would be keen to hear more
about it.

Regards,
jacob



suspicious log warning messages

2007-11-08 Thread Scott Bennett
 Last night my tor server logged some unexpected messages.  I've waited
about twelve hours to see whether any relevant discussion appeared on this
list.  Thus far, it hasn't, so I'm posting them here in hopes that someone
will explain what he/she was doing.

Nov 07 17:31:22.181 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 17:33:23.059 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 17:43:32.514 [warn] Consensus includes unrecognized authority 'ides' at 
216.224.124.114:9030 (contact Mike Perry mikeperryTAfsckedTODorg; identity 
27B6B5996C426270A5C95488AA5BCEB6BCC86956)
Nov 07 17:43:32.515 [warn] 1 unknown, 0 missing key, 1 good, 0 bad, 1 no 
signature, 2 required
Nov 07 17:43:32.516 [warn] Not enough good signatures on networkstatus consensus
Nov 07 17:43:32.532 [warn] Unable to load consensus directory dowloaded from 
server '128.31.0.34:9001'
Nov 07 18:14:04.693 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 18:25:14.831 [warn] Consensus includes unrecognized authority 'ides' at 
216.224.124.114:9030 (contact Mike Perry mikeperryTAfsckedTODorg; identity 
27B6B5996C426270A5C95488AA5BCEB6BCC86956)
Nov 07 18:25:14.831 [warn] 1 unknown, 0 missing key, 1 good, 0 bad, 1 no 
signature, 2 required
Nov 07 18:25:14.832 [warn] Not enough good signatures on networkstatus consensus
Nov 07 18:25:14.845 [warn] Unable to load consensus directory dowloaded from 
server '128.31.0.34:9001'
Nov 07 18:27:15.752 [warn] Consensus includes unrecognized authority 'ides' at 
216.224.124.114:9030 (contact Mike Perry mikeperryTAfsckedTODorg; identity 
27B6B5996C426270A5C95488AA5BCEB6BCC86956)
Nov 07 18:27:15.752 [warn] 1 unknown, 0 missing key, 1 good, 0 bad, 1 no 
signature, 2 required
Nov 07 18:27:15.753 [warn] Not enough good signatures on networkstatus consensus
Nov 07 18:27:15.764 [warn] Unable to load consensus directory dowloaded from 
server '128.31.0.34:9001'
Nov 07 18:37:27.649 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 19:07:56.753 [warn] Consensus includes unrecognized authority 'ides' at 
216.224.124.114:9030 (contact Mike Perry mikeperryTAfsckedTODorg; identity 
27B6B5996C426270A5C95488AA5BCEB6BCC86956)
Nov 07 19:07:56.754 [warn] 1 unknown, 0 missing key, 1 good, 0 bad, 1 no 
signature, 2 required
Nov 07 19:07:56.754 [warn] Not enough good signatures on networkstatus consensus
Nov 07 19:07:56.766 [warn] Unable to load consensus directory dowloaded from 
server '128.31.0.34:9001'
Nov 07 19:25:13.710 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 19:27:16.812 [warn] Unable to load consensus directory dowloaded from 
server '86.59.21.38:443'
Nov 07 19:37:24.203 [warn] Consensus includes unrecognized authority 'ides' at 
216.224.124.114:9030 (contact Mike Perry mikeperryTAfsckedTODorg; identity 
27B6B5996C426270A5C95488AA5BCEB6BCC86956)
Nov 07 19:37:24.204 [warn] 1 unknown, 0 missing key, 1 good, 0 bad, 1 no 
signature, 2 required
Nov 07 19:37:24.205 [warn] Not enough good signatures on networkstatus consensus
Nov 07 19:37:24.221 [warn] Unable to load consensus directory dowloaded from 
server '128.31.0.34:9001'

No more messages of this sort have appeared since the last one shown above.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: GETINFO desc/all-recent output from 0.2.0.9 differ from 0.2.0.7

2007-11-08 Thread Kasimir Gabert
On Nov 3, 2007 2:48 PM, Kasimir Gabert [EMAIL PROTECTED] wrote:

 On 11/1/07, Olaf Selke [EMAIL PROTECTED] wrote:
  hi folks,
 
  the control port command GETINFO desc/all-recent provides only 355
  routers on v0.2.0.9-alpha. 2199 items are returned as expected after
  downgrading to v0.2.0.7-alpha. Since my 0.2.0.9 bandwidth graph looked
  sane, I don't suppose a general problem with v0.2.0.9.
 
  Output of both versions can be found here:
  http://torstatus.blutmagie.de/GETINFO-desc-all-recent-ouput-0.2.0.7.txt
  http://torstatus.blutmagie.de/GETINFO-desc-all-recent-ouput-0.2.0.9.txt
 
  I didn't check v0.2.0.8-alpha. Is there a known bug regarding this
  issue? A couple of tor network status sites rely on GETINFO
  desc/all-recent control port output.
 
  regards, Olaf
 

 Hello,

 This has occurred with my installation of Tor as well
 (v0.2.0.9-alpha), however for the network status as opposed to the
 descriptors.  I restarted Tor (stopping and starting, not a HUP), and
 it seemed to correct the problems.

 Kasimir

 --
 Kasimir Gabert


This problem has continued to occur, and looking through the logs it
seems to be directly connected with the error in 0.2.0.9 which writes
to the log file:
Nov 08 05:58:16.430 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:04:37.384 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:04:37.649 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:13:10.643 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:13:14.761 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:13:14.819 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:13:16.770 [notice] I learned some more directory
information, but not enough to build a circuit.
Nov 08 06:13:21.855 [notice] I learned some more directory
information, but not enough to build a circuit.


-- 
Kasimir Gabert


it is cant get tor server list

2007-11-08 Thread list
I am using TOR 0.2.0.9 windows in network LAN.  it is always can't get any 
server list. How I do it for normal work ?

log is here:

十一月 08 07:21:06.059 [Notice] Tor v0.2.0.9-alpha (r12180). This is 
experimental software. Do not rely on it for strong anonymity. (Running on 
Windows XP Service Pack 2 [workstation])
十一月 08 07:21:06.059 [Notice] Initialized libevent version 1.3e using 
method win32. Good.
十一月 08 07:21:06.059 [Notice] Opening Socks listener on 127.0.0.1:9050
十一月 08 07:21:06.089 [Notice] Opening Control listener on 
127.0.0.1:9051
十一月 08 07:21:13.831 [Warning] Unable to load consensus directory 
dowloaded from server '219.152.186.188:9030'

-- yon.



 Liuxyon International Organization

   http://www.ongod.org  

   Best Service From Us 



Re: suspicious log warning messages

2007-11-08 Thread Nick Mathewson
On Thu, Nov 08, 2007 at 07:02:53AM -0600, Scott Bennett wrote:
  Last night my tor server logged some unexpected messages.  I've waited
 about twelve hours to see whether any relevant discussion appeared on this
 list.  Thus far, it hasn't, so I'm posting them here in hopes that someone
 will explain what he/she was doing.
 [...]
 Nov 07 19:37:24.205 [warn] Not enough good signatures on networkstatus 
 consensus
 Nov 07 19:37:24.221 [warn] Unable to load consensus directory dowloaded from 
 server '128.31.0.34:9001'
 
 No more messages of this sort have appeared since the last one shown above.

There's a new v3 directory authority, ides, run by Mike Perry.
Apparently, adding it caused some weird bug to show up in the new
certificate download code.  See Flyspray bug 546.

yrs,
-- 
Nick Mathewson


pgpjWKaK2FnEe.pgp
Description: PGP signature


Re: Security concerns/help me understand tor

2007-11-08 Thread Martin Fick
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
Fick wrote:
 My home router offers an http administration
 console on port 80 which for obvious security
 reasons is normally only accessible from the
 internal facing side of the router.  While
 many of these home routers typically have an
 internal private IP such as 192.168.1.1 and
 an external public IP, they sometimes respond
 to both IPs from the inside and sometimes they
 even allow access to the administration console
 on the external IP if it is accessed from the
 internal side of the router (mine does).  This
 would not normally be a problem, but add a tor
 exit server to the inside of a home network
 serviced by such a router and ...you can
 probably guess where I am going with this.

...
--- Kyle Williams [EMAIL PROTECTED] wrote:

 If anyone is concerned about this, and you should
 be add the following to your torrc.

 ExitPolicy reject YOUR_EXTERNAL_IP:*

 Obviously replacing YOUR_EXTERNAL_IP with your
 real IP address...not your internal (LAN) IP
address.

...
--- Jacob Appelbaum [EMAIL PROTECTED] wrote:

 I run a few services on the net. I like the idea
 that if I run a Tor server on the same machine
 (on the same interface, with the same IP) as
 my service, people using Tor will prefer my node as
 their exit node. This allows me to provide services
 indirectly to the Tor network without very much
 effort. Smart routing is neato. This is a
 feature and a pretty neat one at that.

...
--- Ruben Garcia [EMAIL PROTECTED] wrote:
 Perhaps it might be possible to tell tor about the
 router's nat policy so that if the router is
 supposed to port forward the external request
 to ipA:portA, tor does it itself.
 That way, the problematic

 host-tor-tor-your host tor-router-your host web

 can become

 host-tor-tor-your host tor-your host web

 (This requires some changes to the torrc and tor
 source, so I'd like to add it to the feature
 request list in case somebody has free time)


This seems like a nice valid option, spoofing
the external IP from within the tor exit node?
In other words if the web internal IP is say:
192.168.1.2, any request for the external
IP through the tor exit would actually yield
a request directly to the web server's internal
IP, 192.168.1.2, instead?

That sounds like a nice feature to be able to
get the best of both worlds: 1) security for
the relay operator and 2) for users accessing
the NATed web site!

Naturally this should be configurable for
specific ports only.  Of course, adding an
IP spoofing mechanism directly to tor exit
nodes makes it that much easier for IPs in
general to be spoofed by exit nodes! :(


-Martin


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: Security concerns/help me understand tor

2007-11-08 Thread Kyle Williams
On Nov 8, 2007 4:00 PM, Jefferson Iblis [EMAIL PROTECTED] wrote:

 On Nov 8, 2007 11:29 PM, Kyle Williams [EMAIL PROTECTED] wrote:
 
 
  If you want to run a hidden server, such as a web site over a .onion
  address, then that's fine.
  If your router is disallowing people to access the admin webpage
 interface
  from the Internet, that's probably a good thing.
  But if running a Tor exit node opens up that admin webpage to the rest
 of
  the Tor network, that's not good.  At that point, anyone could
 anonymously
  try and hack your router.  God help you if they do get in, then your
 really
  in trouble.
 
  There is no point in redirecting that type of request, it needs to be
  rejected.
  Maybe replying with a bad hacker, not root for you! webpage would
 be
  funny though.
 

 Seems the simplest solution would be to, by default, disallow Tor from
 accessing the local network, including what it discovers to be its
 externally accessible IP. Then anyone who wants to allow local access
 can explicitly turn on whatever they think is appropriate.


Exactly.


Re: Security concerns/help me understand tor

2007-11-08 Thread Kyle Williams
On Nov 8, 2007 8:53 AM, Martin Fick [EMAIL PROTECTED] wrote:

 On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
 Fick wrote:
  My home router offers an http administration
  console on port 80 which for obvious security
  reasons is normally only accessible from the
  internal facing side of the router.  While
  many of these home routers typically have an
  internal private IP such as 192.168.1.1 and
  an external public IP, they sometimes respond
  to both IPs from the inside and sometimes they
  even allow access to the administration console
  on the external IP if it is accessed from the
  internal side of the router (mine does).  This
  would not normally be a problem, but add a tor
  exit server to the inside of a home network
  serviced by such a router and ...you can
  probably guess where I am going with this.

 ...
 --- Kyle Williams [EMAIL PROTECTED] wrote:
 
  If anyone is concerned about this, and you should
  be add the following to your torrc.
 
  ExitPolicy reject YOUR_EXTERNAL_IP:*
 
  Obviously replacing YOUR_EXTERNAL_IP with your
  real IP address...not your internal (LAN) IP
 address.

 ...
 --- Jacob Appelbaum [EMAIL PROTECTED] wrote:
 
  I run a few services on the net. I like the idea
  that if I run a Tor server on the same machine
  (on the same interface, with the same IP) as
  my service, people using Tor will prefer my node as
  their exit node. This allows me to provide services
  indirectly to the Tor network without very much
  effort. Smart routing is neato. This is a
  feature and a pretty neat one at that.

 ...
 --- Ruben Garcia [EMAIL PROTECTED] wrote:
  Perhaps it might be possible to tell tor about the
  router's nat policy so that if the router is
  supposed to port forward the external request
  to ipA:portA, tor does it itself.
  That way, the problematic
 
  host-tor-tor-your host tor-router-your host web
 


  can become
 
  host-tor-tor-your host tor-your host web
 
  (This requires some changes to the torrc and tor
  source, so I'd like to add it to the feature
  request list in case somebody has free time)


That would be a hidden service.  Tor already does that.
What we are talking about is secure defaults for exit nodes.



 This seems like a nice valid option, spoofing
 the external IP from within the tor exit node?
 In other words if the web internal IP is say:
 192.168.1.2, any request for the external
 IP through the tor exit would actually yield
 a request directly to the web server's internal
 IP, 192.168.1.2, instead?


That's a horrible idea.  You do NOT want everyone to be able to anonymously
fuck with your router's admin page.
You don't need to redirect that specific request either.  It needs to be
dropped.  If you want to offer up a website, then use the hidden service
feature of Tor.


 That sounds like a nice feature to be able to
 get the best of both worlds: 1) security for
 the relay operator and 2) for users accessing
 the NATed web site!


Yes, a hidden service will work behind a router (or NAT'd setup).



 Naturally this should be configurable for
 specific ports only.  Of course, adding an
 IP spoofing mechanism directly to tor exit
 nodes makes it that much easier for IPs in
 general to be spoofed by exit nodes! :(


 -Martin


 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com



If you want to run a hidden server, such as a web site over a .onion
address, then that's fine.
If your router is disallowing people to access the admin webpage interface
from the Internet, that's probably a good thing.
But if running a Tor exit node opens up that admin webpage to the rest of
the Tor network, that's not good.  At that point, anyone could anonymously
try and hack your router.  God help you if they do get in, then your really
in trouble.

There is no point in redirecting that type of request, it needs to be
rejected.
Maybe replying with a bad hacker, not root for you! webpage would be
funny though.


- Kyle


Re: Security concerns/help me understand tor

2007-11-08 Thread Kyle Williams
On Nov 8, 2007 3:54 PM, Jacob Appelbaum [EMAIL PROTECTED] wrote:

 Kyle Williams wrote:
 
  (This requires some changes to the torrc and tor
  source, so I'd like to add it to the feature
  request list in case somebody has free time)
 
  That would be a hidden service.  Tor already does that.
  What we are talking about is secure defaults for exit nodes.
 
  That's a horrible idea.  You do NOT want everyone to be able to
 anonymously
  fuck with your router's admin page.
  You don't need to redirect that specific request either.  It needs to be
  dropped.  If you want to offer up a website, then use the hidden service
  feature of Tor.
 

 I agree that you don't want someone to mess with my admin page. I don't
 have an admin page, I have a service.

 I think that it's a feature that in your presented case has an
 unintended consequence. It's not as useless as you think. Furthermore,
 it's *not* a hidden service. Hidden services are often slower than any
 other Tor network function. You could *also* use a hidden service if you
 wanted but that's not the same thing.

 Something useful you could do with the exit enclave:
 Run a mixmaster server
 Run Tor with the ability to exit to your mixmaster server
 Now all people who can use Tor could use mixmaster, even if mixmaster
 was blocked and without exiting through a node you don't trust.


 ( Yes, I realize you could possibly exit and use the mixmaster network
 without this setup. And yes I realize that mixmaster is able to be
 observed without worry, I think this setup is useful anyway. )

 
  If you want to run a hidden server, such as a web site over a .onion
  address, then that's fine.
  If your router is disallowing people to access the admin webpage
 interface
  from the Internet, that's probably a good thing.
  But if running a Tor exit node opens up that admin webpage to the rest
 of
  the Tor network, that's not good.  At that point, anyone could
 anonymously
  try and hack your router.  God help you if they do get in, then your
 really
  in trouble.

 Exit enclaves aren't .onions. They're two different things. They're also
 used differently and with different threat models. Furthermore, one is
 very reliable and the other isn't always so reliable at times. It's also
 a known and documented issue.

 Do you also think Tor should automatically block access to all RFC 1918
 address space unless otherwise enabled? Why should Tor be so automatic
 about your specific preferences?


How about you not restrict all  the RFC 1918 address spaces in your network,
tell which exit node you run, and let me have some fun playing inside your
network anonymously.


 (To be clear, I'm not trying to downplay the usefulness of hidden
 services or say that they're implemented poorly. I like them. I use one
 on a daily basis for the TorDNSEL.)

 -jake



Re: Security concerns/help me understand tor

2007-11-08 Thread Jacob Appelbaum
Kyle Williams wrote:
 On Nov 8, 2007 3:54 PM, Jacob Appelbaum [EMAIL PROTECTED] wrote:
 
 Kyle Williams wrote:
 (This requires some changes to the torrc and tor
 source, so I'd like to add it to the feature
 request list in case somebody has free time)
 That would be a hidden service.  Tor already does that.
 What we are talking about is secure defaults for exit nodes.

 That's a horrible idea.  You do NOT want everyone to be able to
 anonymously
 fuck with your router's admin page.
 You don't need to redirect that specific request either.  It needs to be
 dropped.  If you want to offer up a website, then use the hidden service
 feature of Tor.

 I agree that you don't want someone to mess with my admin page. I don't
 have an admin page, I have a service.

 I think that it's a feature that in your presented case has an
 unintended consequence. It's not as useless as you think. Furthermore,
 it's *not* a hidden service. Hidden services are often slower than any
 other Tor network function. You could *also* use a hidden service if you
 wanted but that's not the same thing.

 Something useful you could do with the exit enclave:
 Run a mixmaster server
 Run Tor with the ability to exit to your mixmaster server
 Now all people who can use Tor could use mixmaster, even if mixmaster
 was blocked and without exiting through a node you don't trust.


 ( Yes, I realize you could possibly exit and use the mixmaster network
 without this setup. And yes I realize that mixmaster is able to be
 observed without worry, I think this setup is useful anyway. )

 If you want to run a hidden server, such as a web site over a .onion
 address, then that's fine.
 If your router is disallowing people to access the admin webpage
 interface
 from the Internet, that's probably a good thing.
 But if running a Tor exit node opens up that admin webpage to the rest
 of
 the Tor network, that's not good.  At that point, anyone could
 anonymously
 try and hack your router.  God help you if they do get in, then your
 really
 in trouble.
 Exit enclaves aren't .onions. They're two different things. They're also
 used differently and with different threat models. Furthermore, one is
 very reliable and the other isn't always so reliable at times. It's also
 a known and documented issue.


You forgot to address the above comments that you quoted. It has
relevance to the next question you did address.

 Do you also think Tor should automatically block access to all RFC 1918
 address space unless otherwise enabled? Why should Tor be so automatic
 about your specific preferences?

 
 How about you not restrict all  the RFC 1918 address spaces in your network,
 tell which exit node you run, and let me have some fun playing inside your
 network anonymously.
 

I think that's the case right now. Perhaps you could share some of your
finding to help people understand your concerns?

Regards,
Jacob


Using Torbutton to toggle between Privoxy+Tor and vanilla Privoxy (was: [privoxy-users] Toggling Privoxy?)

2007-11-08 Thread Fabian Keil
Jim Ford [EMAIL PROTECTED] wrote:

 I've got Privoxy and Tor installed on a Win XP machine, via the Vidalia 
 package. I've also got the Firefox Torbutton installed.
 
 How do I toggle Tor on/off without affecting the status of Privoxy? If I 
 turn Tor off, via the Torbutton of Vidalia, Privoxy also gets turned off.

I don't use Torbutton, but I think it simply changes the browser's
proxy settings. While Privoxy can be used independently of Tor,
Torbutton only lets you either use a HTTP proxy (+ Tor) or no
HTTP proxy at all.

With Privoxy 3.0.6 and earlier you have to edit Privoxy's
main configuration file to change the forwarding settings
and I don't know if Firefox gives its extensions the power
to do that.

Actually I'm not even sure if the Torbutton
developer(s) would want to do that anyway.

Privoxy 3.0.7 beta (which is supposed to be released
this weekend) can be configured to control forwarding
settings with HTTP headers and this makes thinks a lot
easier for Torbutton and friends, but (again) using that
feature may not be desired by the Tor developers.

Of course I can speculate a lot about their motives
to do or not do anything, but I rather CC or-talk@ so they
can give you a definitive answer (Reply-To set as well).

Fabian


signature.asc
Description: PGP signature


Re: Security concerns/help me understand tor

2007-11-08 Thread Martin Fick
--- Kyle Williams [EMAIL PROTECTED] wrote:
 On Nov 8, 2007 8:53 AM, Martin Fick
  On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
  Fick wrote:
   My home router offers an http administration
   console on port 80 which for obvious security
   reasons is normally only accessible from the
   internal facing side of the router.  While
   many of these home routers typically have an
   internal private IP such as 192.168.1.1 and
   an external public IP, they sometimes respond
   to both IPs from the inside and sometimes they
   even allow access to the administration console
   on the external IP if it is accessed from the
   internal side of the router (mine does).  This
   would not normally be a problem, but add a tor
   exit server to the inside of a home network
   serviced by such a router and ...you can
   probably guess where I am going with this.

...
  --- Ruben Garcia [EMAIL PROTECTED] wrote:
   Perhaps it might be possible to tell tor about
   the router's nat policy so that if the router is
   supposed to port forward the external request
   to ipA:portA, tor does it itself.
   That way, the problematic
  
   host-tor-tor-your host tor-router-your host
 web
  
   can become
  
   host-tor-tor-your host tor-your host web
  
   (This requires some changes to the torrc and tor
   source, so I'd like to add it to the feature
   request list in case somebody has free time)
 
 
 That would be a hidden service.  Tor already does
 that.
 What we are talking about is secure defaults for
 exit nodes.

No, I think a you may have misunderstood the 
suggestion, I had to read it twice too.  :)

Perhaps I can try illustrating this better.

To start with we have website W hosted on internal
private IP P (192.168.1.2) forwarded to the world 
by a NATting router with internal IP GW (192.168.1.1)
at external IP E.  Anyone on the outside can (and are
supposed to be able to!) get to web site W by 
accessing E, not P, with or without tor.  

1) Site (W)  [P]--- NAT [E] Internet (anyone)

But with or without tor no-one can actually get to
W from the intranet, I, on external IP E since the
router intercepts that IP, E, and presents its 
admin console A on E.

So, instead of seeing this:

2) Client [I]---[E]  Router   
Site  (W) [P]--- Router

intranet clients get:

3) Client [I]---[E]  Router Admin Console (A)


Now, add an internal tor exit relay on the inside 
of the firewall trying to legitimately get to W on 
E (similar to 1):

4)   Tor  ---Router  Internet(anyone)
 Tor  ---[E] Router   
 Site (W) [P] ---Router

Note: they are not trying to illegitimately access 
W at P, but at legitimate E!  Instead they end 
up more like (3):

5)   Tor --- Router  Internet (anyone)
 Tor  ---[E] Router Admin console (A)

The suggested fix instead of simply barring
E in the exit policy (since it is a legitimate 
endpoint,) to spoof E with P internally to tor!

6) Tor - Router  Internet (anyone)
   Tor ---[P] Site (W)

Yes, this is somewhat similar to a hidden service
because we are accessing a web site, W, on the
inside of the intranet, but that site is supposed
to be accessed from the outside we are simply
bypassing the obstructed trip to the internal 
router hoping to just be NATted and bounced 
back to P (4).  The original scenario (4) which is 
impossible because of (5) would have done the 
same thing as (6) just by a different route!

Does that make more sense and sound 
reasonable?

-Martin


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 


Re: suspicious log warning messages

2007-11-08 Thread Scott Bennett
 On Thu, 8 Nov 2007 10:28:30 -0500 Nick Mathewson [EMAIL PROTECTED]
wrote:
On Thu, Nov 08, 2007 at 07:02:53AM -0600, Scott Bennett wrote:
  Last night my tor server logged some unexpected messages.  I've wait=
ed
 about twelve hours to see whether any relevant discussion appeared on this
 list.  Thus far, it hasn't, so I'm posting them here in hopes that someone
 will explain what he/she was doing.
 [...]
 Nov 07 19:37:24.205 [warn] Not enough good signatures on networkstatus co=
nsensus
 Nov 07 19:37:24.221 [warn] Unable to load consensus directory dowloaded f=
rom server '128.31.0.34:9001'
=20
 No more messages of this sort have appeared since the last one shown abov=
e.

There's a new v3 directory authority, ides, run by Mike Perry.
Apparently, adding it caused some weird bug to show up in the new
certificate download code.  See Flyspray bug 546.

 Fair enough.  I'm glad it was all in a good cause. :-)  Thanks, Nick,
for clearing that up.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**