Re: another unusual connection

2008-02-10 Thread Scott Bennett
 On Sun, 10 Feb 2008 07:54:06 GMT Paul Ferguson [EMAIL PROTECTED]
wrote:
- -- Scott Bennett [EMAIL PROTECTED] wrote:

 Huh.  Nice of you to delete the attribution to Roger Dingledine.
 =


  $ telnet 212.112.242.159 80
  Trying 212.112.242.159...
  Connected to 212.112.242.159.
  Escape character is '^]'.
  GET /tor/ HTTP/1.0


For what it's worth, we (Trend Micro) have identified several Tor

 Is there some reason we should believe that you represent Trend
Micro?
 However, given the obviously false information being provided by
anon-tor-proxy.maximator.org (212.112.242.159), could it please be
flagged as Invalid and Bad Exit by the directory authorities?

nodes which have malicious intent -- this one among them.

Be very careful.

Tor is being actively exploited.

 We know that.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: another unusual connection

2008-02-10 Thread Andrew

Paul Ferguson schrieb:

For what it's worth, we (Trend Micro) have identified several Tor
nodes which have malicious intent -- this one among them.

Be very careful.
Tor is being actively exploited.

- ferg
Thanks for the heads up. While the tor community does know, that 
malicious exit nodes exist, to my knowledge there is nothing we could do 
about it except manually flag each one in the directory. I suppose you 
are not at liberty to share that list of bad exits; however, any clues 
as to how one could effectively identify them would be very appreciated.


Andrew


Re: iptables and tor

2008-02-10 Thread phobos
On Sat, Feb 09, 2008 at 07:07:26PM -0500, [EMAIL PROTECTED] wrote 0.8K bytes in 
21 lines about:
: Has anyone given any thought as to what firewall rules to use on a linux
: system running a tor server?  Besides the usual attacks against the

In general, how would you protect a server with a public IP without tor?  

-- 
Andrew


Re: another unusual connection

2008-02-10 Thread phobos
On Sun, Feb 10, 2008 at 07:54:06AM +, [EMAIL PROTECTED] wrote 0.8K bytes in 
37 lines about:
: For what it's worth, we (Trend Micro) have identified several Tor
: nodes which have malicious intent -- this one among them.

I hear the sky is falling and my milk is going sour because of neutrinos, too.

Full disclosure would be better than fearmongering.

-- 
Andrew


Re: another unusual connection

2008-02-10 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Scott Bennett [EMAIL PROTECTED] wrote:

Is there some reason we should believe that you represent Trend
Micro?

Believe what you like.

Just trying to be helpful.

Cheers,

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHr0jzq1pz9mNUZTMRAiqcAKDmRMa3TNLjx04cuni0dKIgVqJHIgCfVEbZ
gOzf1jOqhYhzaYBlHaF8FmQ=
=QvDD
-END PGP SIGNATURE-

--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: another unusual connection

2008-02-10 Thread Paul Ferguson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- -- Dominik Schaefer [EMAIL PROTECTED] wrote:

 For what it's worth, we (Trend Micro) have identified several Tor
 nodes which have malicious intent -- this one among them.

Could you give us some more information about this? ;-) I would assume,
the reported behaviour could be very well caused by some unusually
configured or misconfigured node and not malicious intent itself.

Actually, it appears that the hosts that are triggering alarms for
us have already been identified previously as hosting malicious
content -- not flagged explicitly for being a Tor node.

For example, a host that may have been previously identified as
hosting an MPack exploit engine may also now be used as a Tor
node.

- - ferg

-BEGIN PGP SIGNATURE-
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFHr0o3q1pz9mNUZTMRAlmAAJ9kIG1X7UYBw0wJHXrmGmN52bL+EwCdGGv0
pOfGiCAuQW9StPguQD1JBoI=
=Asxa
-END PGP SIGNATURE-


--
Fergie, a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



Re: iptables and tor

2008-02-10 Thread dante

 The packets coming in on Tor TLS tunnels are destined for your node.
 They go up the stack through TCP and TLS to the Tor application
 itself. Tor does its AES CTR encryption on the cells coming out of
 these streams, and puts them in other streams based on the circuit
 labels. Here they get TLS'd, packed into TCP segments and go out.
 This means that packets going out after relaying have nothing to do
 with packets coming in, so I don't think marking makes any difference.
 This is clearly a positive point of Tor.
Thanks Csaba, that's exactly what I was worried about and your
information is reassuring.   The usual allow/deny rules should be good
enough.

---

Anthony G. Basile, Ph.D.
Director of Information Technology,
D'Youville College,
320 Porter Ave.
Buffalo NY, 14201




Re: iptables and tor

2008-02-10 Thread Dominik Schaefer

dante schrieb:

Hi everyone,

Has anyone given any thought as to what firewall rules to use on a linux
system running a tor server?

If you operate a tor node within your private network und your network offers
services which are not public or should not be public, then you should
remember that you create a tunnel in your local network by running tor. In
this case you have to ensure that the exit policies of the tor node are set in
a way that nobody can exit from your tor node into you local net.
Additionally you can filter the relevant traffic originating from your tor node.


Dominik





Re: iptables and tor

2008-02-10 Thread Tom Hek
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

By default are all the private ranges already blocked in the exitpolicy.

Dominik Schaefer wrote:
 dante schrieb:
 Hi everyone,

 Has anyone given any thought as to what firewall rules to use on a linux
 system running a tor server?
 If you operate a tor node within your private network und your network
 offers
 services which are not public or should not be public, then you should
 remember that you create a tunnel in your local network by running tor. In
 this case you have to ensure that the exit policies of the tor node are
 set in
 a way that nobody can exit from your tor node into you local net.
 Additionally you can filter the relevant traffic originating from your
 tor node.
 
 
 Dominik
 
 
 
 

Tom
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkevdlUACgkQStmJ9+mkUHNdxwCeOjcYGMgP8vrmaKGTZIRx/7nh
EqQAn1pfvH7X8+1f1QhcOPE0CfGKCKAG
=7f0e
-END PGP SIGNATURE-


Re: another unusual connection

2008-02-10 Thread Andrew S. Lists
On Sun, 10 Feb 2008 01:47:01 -0600, Scott Bennett wrote:
  But, Roger, will the 0.2.0.19-alpha release at least confirm during
 the reachability tests that it is talking to itself and not to some other
 server?

I am not sure that is what is happening. For example, it may be that the
reachability checks are being performed on the current (and correct) IP
before the update to the suggested new IP is put into effect.

Anyway, I suggested making an explicit verification of the reachability
of the current IP before updating to a suggest new IP as a means to help
counter incorrectly suggested new IPs. E.g., if the old IP still works,
ignore the suggested new IP; if the old IP does not work, update to the
suggested IP. (This sort of thing doesn't solve the root issue of how
best to establish trust in the IP address observations of directory
servers, but maybe it helps a bit. Once you get an accurate IP
suggestion, you are protected against incorrect suggestions until such
time as you become unreachable again, when the game starts all over and
you were back down anyway.)

There are probably many ways to perform that check - one way I threw out
there was to explicitly call the check reachability routines before
updating; another (and perhaps better) way might be to only process
suggested new IPs when Tor notices that it is no longer reachable.

Unfortunately, neither did I supply a working patch to implement
explicit verification of the old IP as an additional workaround for the
root issue nor did I even confirm the cause of the successful
reachability tests.

Scott, you have been quite vocal in this area, so perhaps you might want
to put in some legwork here. I am sure the Tor team (and the rest of us)
would appreciate such efforts.

-Andrew


Re: another unusual connection

2008-02-10 Thread Kyle Williams

john smith wrote:

Yet another reoccurrence, yesterday, of the same sequence of events 
once again with the same IP address. My server had been running for
just under five days since the last time this happened.

Feb 07 10:56:59.108 [Notice] Our IP Address has changed from
87.194.38.72 to 212.112.242.159; rebuilding descriptor.

Feb 07 10:57:11.780 [Notice] Self-testing indicates your ORPort is
reachable from the outside. Excellent. Publishing server descriptor.

Feb 07 11:09:51.530 [Notice] Our IP Address has changed from
212.112.242.159 to 87.194.38.72; rebuilding descriptor.

Feb 07 11:09:55.905 [Notice] Self-testing indicates your ORPort is
reachable from the outside. Excellent. Publishing server descriptor.

Feb 07 11:10:03.139 [Notice] Performing bandwidth self-test...done.



I do have a question for John Smith; are you using a VPN from your 
home to your server or from your server to somewhere else?


In the past I've seen this happen with my exit node when I would VPN 
into my server or a clients server. The VPN connection would set the 
default gateway and all my traffic would exit the other end of the VPN. 
 So when Tor would do it's IP check and reachability test, it went bad.
Also, it wasn't obvious right away when this would happen.  Sometimes it 
would take up to an hour after I had connected the VPN before Tor would 
freak out.


Since I've seen error messages like yours when I had that problem, I 
thought I might offer a couple of pointers.


You may want to use the following two options in your torrc config.

Address - This should be the IP of your server which is reachable from 
the internet.
OutboundBindAddress - If your Tor server is behind a NATd router, then 
set this to the internal (192.168.x.x or whatever) address of your 
machine.  This should prevent traffic from leaving a 10.x.x.x address if 
your real internal address is a 192.168.x.x.
[OPTIONAL THIRD OPTION] AssumeReachable 1 - Prevents your server from 
doing reachability test.  It will just upload your descriptor to the DAs.


By using the OutboundBindAddress, I was able to have my Tor server 
listen on my regular local address (192.168.X.X) and not think it was on 
a the VPN local address (10.x.x.x).  Also, double check to make sure 
your VPN connection is *not* setting itself as the default gateway 
(Windows) or pushing the default route (Linux).


(It should be obvious, but just in case it's not, the 192.168.x.x and 
10.x.x.x addresses are just examples.  Your setting may be different so 
adjust your settings accordingly).


Re: iptables and tor

2008-02-10 Thread Dominik Schaefer


Tom Hek schrieb:

By default are all the private ranges already blocked in the exitpolicy.

Yes, the private or non-routable nets. I should have been more precise what I
meant. ;-) (or should have avoided the term private)
Suppose you have 87.78.1.170 as exit node and its subnet is 87.78.1.128/26.
Suppose your organization has the net 87.78.1.1/24 and you have some services
for internal use running on various hosts in that Class-C net.
Then AFAIK you have to take care yourself of the appropriate exit policies,
because tor can't possibly know this, e.g. explicitly disallow 87.78.1.1/24.

Dominik




Re: tor and google-error

2008-02-10 Thread scar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

like others have said, scroogle ssl is probably the way to go.  however,
it doesn't seem to handle special google queries yet (like define:foo
or convert 1 gram to lbs, etc.). so, if you must use google (see
below)

Roger Dingledine @ 2008/02/08 21:00:
 
 https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#GoogleSpyware
 

 [...] if you find a useful workaround and write up a description of it, 
 please let us know.

tell vidalia 'new identity', then open 'network map' and close the
connection to google, if still open.  re-search on google and it will
use a new circuit with hopefully a new exit node.  repeat until google
complies.  note: don't just hit 'reload' in your browser as that will
reload the google 403 error! ;)
-BEGIN PGP SIGNATURE-

iD8DBQFHr4pAXhfCJNu98qARCB25AJ9qt3rFKeIwrktKLNe19oDCMvbx2ACgxTHv
YgMysl6c5XUmHAf19+GKO3E=
=xWsG
-END PGP SIGNATURE-


Re: another unusual connection

2008-02-10 Thread Roger Dingledine
On Fri, Feb 08, 2008 at 02:45:04AM -0600, Scott Bennett wrote:
  I've been reading these reports on this list carefully and with growing
 alarm.  How is it that the reachability testing routine(s) fail to discover
 that, upon connecting to the supposed new IP address on whichever TCP port the
 tor server is using, it is *not connected to itself*?  I had been assuming all
 along that the reachability testing would check for something so obviously
 important.  Does DirPort reachability testing also fail to check the identity
 of the server that answers its connection attempt?

I think you're confusing the IP address guessing with the reachability
detection.

The IP address guessing is known to be not perfect. I mean, heck, it's
based on plaintext unauthenticated claims from some dude running a Tor
relay somewhere in the world. But in general it's quite a bit better
than nothing, which was the previous option.

(Once we have our netinfo cells up and running, we may be able to make
it encrypted and authenticated. Which will help a little bit.)

The reachability detection is also known to not be perfect. It just has
to weed out most of the problems and the directory authorities can then
test the rest.

  It makes me wonder what other glaring holes may exist in tor's various
 checking/testing routines.

Submit a patch.

--Roger



Re: another unusual connection

2008-02-10 Thread Roger Dingledine
On Sun, Feb 10, 2008 at 02:10:55AM -0600, Scott Bennett wrote:
  However, given the obviously false information being provided by
 anon-tor-proxy.maximator.org (212.112.242.159), could it please be
 flagged as Invalid and Bad Exit by the directory authorities?

Is it actually being a bad exit with respect to any content?

My guess is that it's doing a proxypass from its apache on port 80 to
whatever port Tor is running on locally, and Tor is getting confused
about what IP address to report, because all the addresses *it* sees
are coming from the apache server.

I just checked in another patch that will reduce instances of this in
the future, even for relays that haven't upgraded yet:
http://archives.seul.org/or/cvs/Feb-2008/msg00117.html

(There probably *are* a few malicious Tor operators out there somewhere,
but in general many of the issues people tend to raise on this list can be
more easily explained by bugs, misconfigurations, or other confusion. I've
met the fellow who runs maximator, and he's been running Tor servers
since 2005. He seems like a nice enough guy.)

--Roger