Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Eugen Leitl
On Thu, Oct 07, 2010 at 08:31:14PM -0400, Michael Gomboc wrote:
> Hi!
> 
> If there is no back-door or bug in your VM software, how you wanna break out
> of the VM?

Ever seen bugless software?
 
> Even with root privileges you will be a prisoner within the VM.

http://www.google.com/search?aq=f&q=break+out+of+VM

> pgp-id: 0x5D41FDF8
 
> Proof me wrong.

Lack of professional paranoia detected.

-- 
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Me <-> Tor <-> VPN <-> Internet?

2010-10-07 Thread Robert Ransom
On Thu, 7 Oct 2010 23:58:28 -0400
grarpamp  wrote:

> > a free VPN
> > There are VPN providers that will let you pay anonymously.
> 
> Among others, I would be interested in reading posts
> containing lists of VPN providers that offer one or more
> of these two services. Thanks.

No -- put them on the Hidden Wiki.

Finding *that* is left as an exercise for the reader.


Robert Ransom


signature.asc
Description: PGP signature


Re: Me <-> Tor <-> VPN <-> Internet?

2010-10-07 Thread grarpamp
> a free VPN
> There are VPN providers that will let you pay anonymously.

Among others, I would be interested in reading posts
containing lists of VPN providers that offer one or more
of these two services. Thanks.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread andrew
On Thu, Oct 07, 2010 at 08:31:14PM -0400, michael.gom...@gmail.com wrote 2.8K 
bytes in 78 lines about:
: If there is no back-door or bug in your VM software, how you wanna break out
: of the VM?

That's a perfect world that doesn't exist.  The VM software will have
bugs, someone will exploit it.  

For a start, http://duckduckgo.com/?q=virtual+machine+attacks

-- 
Andrew
pgp 0x31B0974B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Robert Ransom
On Thu, 7 Oct 2010 18:12:45 -0400
hi...@safe-mail.net wrote:

> Several people recommend running a hidden service from within a VM, 
> to prevent attackers from doing side channel attacks and reading off your 
> hardware components and serial numbers.

Using a VM doesn't prevent most side-channel attacks.  It only blocks
access to a description of your hardware.

> Then I heard that attackers can actually break out of VM's if they get root 
> access on it due to a successful attack.

It depends on the VM software you are using.


Robert Ransom


signature.asc
Description: PGP signature


Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Michael Gomboc
Hi!

If there is no back-door or bug in your VM software, how you wanna break out
of the VM?

Even with root privileges you will be a prisoner within the VM.

Proof me wrong.

Michael

2010/10/7 

> The title says it all:
>
> Several people recommend running a hidden service from within a VM,
> to prevent attackers from doing side channel attacks and reading off your
> hardware components and serial numbers.
>
> Then I heard that attackers can actually break out of VM's if they get root
> access on it due to a successful attack.
>
> I just want your opinions on that one, thanks!
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>



-- 
Michael Gomboc
www.viajando.at
pgp-id: 0x5D41FDF8


Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Thomas S. Benjamin
Hikki,

>From a defense in depth point of view it can help to use a VM.  It is
not impossible for an adversary to  break out of a VM, but if you are
using a good VM it will at least require a pretty sophisticated
attacker.  I would say that using a VM would increase the security of
your hidden service.

On Thu, Oct 7, 2010 at 5:12 PM,   wrote:
> The title says it all:
>
> Several people recommend running a hidden service from within a VM,
> to prevent attackers from doing side channel attacks and reading off your
> hardware components and serial numbers.
>
> Then I heard that attackers can actually break out of VM's if they get root
> access on it due to a successful attack.
>
> I just want your opinions on that one, thanks!
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/
>



-- 
Sincerely Yours,
              ---Thomas S. Benjamin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread hikki
The title says it all:

Several people recommend running a hidden service from within a VM, 
to prevent attackers from doing side channel attacks and reading off your 
hardware components and serial numbers.

Then I heard that attackers can actually break out of VM's if they get root 
access on it due to a successful attack.

I just want your opinions on that one, thanks!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: AdvTor

2010-10-07 Thread Mike Perry
Thus spake Anon Mus (my.green.lant...@googlemail.com):

> Well, well, well suddenly the problem fixes "itself"... after 20+ 
> disconnects and 10+ "You are using a proxy which is changing your 
> data... refusing connection.." over the past 3 days.
> 
> Must be just another co-incidence ..funny though how it was still 
> failing a minute prior to my post being written today. This must be 
> similar to the DNS resolution problem (unable to resolve DNS and so 
> failed page access) to webcrawler.com when using these servers as exits 
> the last 4 weeks... (might be fixed now, but these are all in my exclude 
> as exits list, so I wouldn't know).
> 
> spfTOR1,spfTOR2,gpfTOR1,gpfTOR2,Amunet1,Amunet2,Amunet3,Amunet4,Amunet5,Amunet6,Amunet7,Amunet8,Amunet9,Amunet10,Amunet11,Amunet12,blutmagie,blutmagie2,blutmagie3,blutmagie4
>  

That's an interesting list. It looks like you just took the top 20 fastest
exits and listed them.

Are you excluding these because of proven malicious activity; because
of poor connectivity; because they are banned from most sites; or just
because you needed a button to make your Internet as slow as possible,
and Tor seemed like the best choice?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpr5u6KTLkmI.pgp
Description: PGP signature


Re: AdvTor

2010-10-07 Thread andrew
On Thu, Oct 07, 2010 at 05:20:08PM +0100, my.green.lant...@googlemail.com wrote 
2.3K bytes in 55 lines about:
: Well, well, well suddenly the problem fixes "itself"... after
: 20+ disconnects and 10+ "You are using a proxy which is changing
: your data... refusing connection.." over the past 3 days.

This would be a lot better if it came with logs, bug reports, and data.
It could also be the destination site having problems, or the exit relay
is overloaded, or sun flares.  The Internet is complex, narrowing down
the problem to Tor or not Tor is a first step.

-- 
Andrew
pgp 0x31B0974B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: AdvTor

2010-10-07 Thread Anon Mus

Nick Mathewson wrote:

On Thu, Oct 7, 2010 at 4:32 AM, Anon Mus
 wrote:
  

On Sun, Oct 3, 2010 at 2:05 PM,  wrote:


Hello everyone.

I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it in web,
though it has opened source placed in sf.net.

Have you people discussed it? Please give a link to discussion if yes.
Otherwise you are welcome (if it won`t break any or-talk rules),
especially I`d like to know if someone can get through the code to
check it for backdoors or something like that.

Description and source:
http://nemesis.te-home.net/Projects/AdvTor.html
http://sourceforge.net/projects/advtor/




http://nemesis.te-home.net/Projects/AdvTor.html

When connecting to this site through Tor either I get a "disconnect" or a
weird message saying  I am connecting via a proxy which is changing my data.
 I have only once had an acutual web page to browse (right after it the
first post to OR-TAlk).

Is this a TOr problem (e.g. a ban by Tor exits) or a site problem?



Not sure what your trouble is here, but Tor doesn't ban sites.  I just
tried connecting there, and it worked fine for me.

yrs,
  
Well, well, well suddenly the problem fixes "itself"... after 20+ 
disconnects and 10+ "You are using a proxy which is changing your 
data... refusing connection.." over the past 3 days.


Must be just another co-incidence ..funny though how it was still 
failing a minute prior to my post being written today. This must be 
similar to the DNS resolution problem (unable to resolve DNS and so 
failed page access) to webcrawler.com when using these servers as exits 
the last 4 weeks... (might be fixed now, but these are all in my exclude 
as exits list, so I wouldn't know).


spfTOR1,spfTOR2,gpfTOR1,gpfTOR2,Amunet1,Amunet2,Amunet3,Amunet4,Amunet5,Amunet6,Amunet7,Amunet8,Amunet9,Amunet10,Amunet11,Amunet12,blutmagie,blutmagie2,blutmagie3,blutmagie4 



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: AdvTor

2010-10-07 Thread Nick Mathewson
On Thu, Oct 7, 2010 at 4:32 AM, Anon Mus
 wrote:
> On Sun, Oct 3, 2010 at 2:05 PM,  wrote:
>>>
>>> Hello everyone.
>>>
>>> I found a fork (?) of tor software with GUI named Advanced Tor. I was
>>> surprised of its features, but found just nothing about it in web,
>>> though it has opened source placed in sf.net.
>>>
>>> Have you people discussed it? Please give a link to discussion if yes.
>>> Otherwise you are welcome (if it won`t break any or-talk rules),
>>> especially I`d like to know if someone can get through the code to
>>> check it for backdoors or something like that.
>>>
>>> Description and source:
>>> http://nemesis.te-home.net/Projects/AdvTor.html
>>> http://sourceforge.net/projects/advtor/
>>>
>>>
>
> http://nemesis.te-home.net/Projects/AdvTor.html
>
> When connecting to this site through Tor either I get a "disconnect" or a
> weird message saying  I am connecting via a proxy which is changing my data.
>  I have only once had an acutual web page to browse (right after it the
> first post to OR-TAlk).
>
> Is this a TOr problem (e.g. a ban by Tor exits) or a site problem?

Not sure what your trouble is here, but Tor doesn't ban sites.  I just
tried connecting there, and it worked fine for me.

yrs,
-- 
Nick
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: AdvTor

2010-10-07 Thread Anon Mus

On Sun, Oct 3, 2010 at 2:05 PM,  wrote:

Hello everyone.

I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it in web,
though it has opened source placed in sf.net.

Have you people discussed it? Please give a link to discussion if yes.
Otherwise you are welcome (if it won`t break any or-talk rules),
especially I`d like to know if someone can get through the code to
check it for backdoors or something like that.

Description and source:
http://nemesis.te-home.net/Projects/AdvTor.html
http://sourceforge.net/projects/advtor/




http://nemesis.te-home.net/Projects/AdvTor.html

When connecting to this site through Tor either I get a "disconnect" or a weird 
message saying  I am connecting via a proxy which is changing my data.  I have only once 
had an acutual web page to browse (right after it the first post to OR-TAlk).

Is this a TOr problem (e.g. a ban by Tor exits) or a site problem?

Jo



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Me <-> Tor <-> VPN <-> Internet?

2010-10-07 Thread Christian Fromme
On Thu, Oct 7, 2010 at 5:19 AM, John Brooks  wrote:
> On Wed, Oct 6, 2010 at 9:11 PM, Load Bear  wrote:
>> I am aware of that limitation. However, I am currently less concerned
>> about eavesdroppers between a given VPN and the destination than I am
>> about Tor exit-node eavesdroppers. Knowing the limitations involved, do
>> you know of some method to accomplish my expressed goal?
>
> Assuming it's not a free VPN, you also run the risk of being
> identified by your billing information. If it is free, I would say
> that there is just as much if not more risk of your traffic being used
> maliciously.

There are VPN providers that will let you pay anonymously.

However, if you're taking anonymity on the Internet seriously, using a
VPN as the last and only line of defense carries all kinds of risks:
Traffic analysis ("Let's look at all traffic going in and out of this
VPN server and match the traffic"), single point of failure in form of
the VPN provider (Do you trust him not to keep logs and sell them to
the next highest bidder?) and some more. From an academic point of
view, there isn't much anonymity to gain from a VPN.

You could run Tor on top of the VPN to gain anonymity. That sounds
technically possible even though I haven't tried it -- but I don't see
much benefit here unless you're living in a country that blocks the
public Tor nodes and most bridges.

Best,
/C
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/