Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread Lunar
grarpamp:
 On Wed, Jul 2, 2014 at 7:46 AM, Kali Tor kalito...@yahoo.com wrote:
  I have done all that, so covered on that aspect. Was wondering if disk 
  encryption and use of something like TRESOR would be useful?
 
 The private keys for the node are sensitive, and even the
 .tor/state file for the guard nodes could be if the attacker
 does not already have that info, same for any non default
 node selection stuff in torrc. Tor presumably validates
 the disk consensus files against its static keys on startup
 so that's probably ok yet all easily under .tor anyway.

Some says that it's better to leave the disk unencrypted because in case
of seizure by the police, they can easily attest that the system was
only running Tor and nothing else.

Some disagrees and says that we should always encrypt to make tampering
and (extra-)legal backdoor installation more difficult.

I believe the best strategy has never been really determined so far.

-- 
Lunar lu...@torproject.org


signature.asc
Description: Digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread Mike Cardwell
* on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:

 I have done all that, so covered on that aspect. Was wondering if disk 
 encryption and use of something like TRESOR would be useful?
 
 The private keys for the node are sensitive, and even the
 .tor/state file for the guard nodes could be if the attacker
 does not already have that info, same for any non default
 node selection stuff in torrc. Tor presumably validates
 the disk consensus files against its static keys on startup
 so that's probably ok yet all easily under .tor anyway.
 
 Some says that it's better to leave the disk unencrypted because in case
 of seizure by the police, they can easily attest that the system was
 only running Tor and nothing else.

Even if it's encrypted, you can easily attest the exact same thing by
handing over your password... If you choose to do so.
 
 Some disagrees and says that we should always encrypt to make tampering
 and (extra-)legal backdoor installation more difficult.
 
 I believe the best strategy has never been really determined so far.

I know of only two benefits to not encrypting.

1.) On some systems, for some workloads, you might have some level of
improved performance. For a Tor node, I doubt there is any
noticable difference.

2.) You can reboot without having to enter a password.

Encryption gives you choice. The choice to hand over your password/key
or not. As far as I'm concerned, the best strategy *has* been
determined and it's to encrypt...

-- 
Mike Cardwell  https://grepular.com https://emailprivacytester.com
OpenPGP Key35BC AF1D 3AA2 1F84 3DC3   B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1   BF1B 295C 3C78 3EF1 46B4


signature.asc
Description: Digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread Kali Tor





 On Thursday, July 3, 2014 9:11 AM, Mike Cardwell t...@lists.grepular.com 
 wrote:
  * on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:
 
  I have done all that, so covered on that aspect. Was wondering if 
 disk encryption and use of something like TRESOR would be useful?
 
  The private keys for the node are sensitive, and even the
  .tor/state file for the guard nodes could be if the attacker
  does not already have that info, same for any non default
  node selection stuff in torrc. Tor presumably validates
  the disk consensus files against its static keys on startup
  so that's probably ok yet all easily under .tor anyway.
 
  Some says that it's better to leave the disk unencrypted because in 
 case
  of seizure by the police, they can easily attest that the system was
  only running Tor and nothing else.
 
 Even if it's encrypted, you can easily attest the exact same thing by
 handing over your password... If you choose to do so.
 
 
  Some disagrees and says that we should always encrypt to make tampering
  and (extra-)legal backdoor installation more difficult.
 
  I believe the best strategy has never been really determined so far.
 
 I know of only two benefits to not encrypting.
 
 1.) On some systems, for some workloads, you might have some level of
     improved performance. For a Tor node, I doubt there is any
     noticable difference.
 
 2.) You can reboot without having to enter a password.
 
 Encryption gives you choice. The choice to hand over your password/key
 or not. As far as I'm concerned, the best strategy *has* been
 determined and it's to encrypt...

Thanks for the discussion on this.

If disk encryption is indeed the way to go, how many of the node operators do 
actually encrypt the disk? Has there been any performance issues? I ask 
specifically because I run in a VPS where resources are limited (compared to a 
proper machine).

- kali-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/3/2014 1:40 PM, Kali Tor wrote:
 
 
 
 
 
 On Thursday, July 3, 2014 9:11 AM, Mike Cardwell
 t...@lists.grepular.com wrote:
 * on the Thu, Jul 03, 2014 at 10:02:06AM +0200, Lunar wrote:
 
 I have done all that, so covered on that aspect. Was
 wondering if
 disk encryption and use of something like TRESOR would be
 useful?
 
 The private keys for the node are sensitive, and even the 
 .tor/state file for the guard nodes could be if the attacker 
 does not already have that info, same for any non default 
 node selection stuff in torrc. Tor presumably validates the
 disk consensus files against its static keys on startup so
 that's probably ok yet all easily under .tor anyway.
 
 Some says that it's better to leave the disk unencrypted
 because in
 case
 of seizure by the police, they can easily attest that the
 system was only running Tor and nothing else.
 
 Even if it's encrypted, you can easily attest the exact same
 thing by handing over your password... If you choose to do so.
 
 
 Some disagrees and says that we should always encrypt to make
 tampering and (extra-)legal backdoor installation more
 difficult.
 
 I believe the best strategy has never been really determined so
 far.
 
 I know of only two benefits to not encrypting.
 
 1.) On some systems, for some workloads, you might have some
 level of improved performance. For a Tor node, I doubt there is
 any noticable difference.
 
 2.) You can reboot without having to enter a password.
 
 Encryption gives you choice. The choice to hand over your
 password/key or not. As far as I'm concerned, the best strategy
 *has* been determined and it's to encrypt...
 
 Thanks for the discussion on this.
 
 If disk encryption is indeed the way to go, how many of the node
 operators do actually encrypt the disk? Has there been any
 performance issues? I ask specifically because I run in a VPS where
 resources are limited (compared to a proper machine).
 
 - kali-
 
 ___ tor-relays mailing
 list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

Depends, what configuration will that virtual machine have?
You shouldn't notice too big of a difference, full disk encryption is
not a resource killer on any configuration.

- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJTtTopAAoJEIN/pSyBJlsR9lkIAIYVigtTOYcYeihEJLx8yWs+
WRc/1p9u/YuSA62enSpqkuYYOtvMLsJiGtdRzr66kyrIqgifIStOAyTkd2un+QLq
nRl2OY/jmhwg0EM0EGpdzDo9qMzEPpDOfRtoJhotnB+0Aurl8Bt6PuNhSezY3a3X
VUmKaNf13SCyqyiB3cty+/gpSpTrQRoCH0lV/QtrMvHo8KqOknSbRa7LyylDz6Wv
fH6C8UnIU6ueL2RxRV8h+cIla52mRJStv2LWO3+IqFBnGPrbFlZks7OjYaY74nEI
r3YMg7dDgy9jT7QuL2LIBxGKsXAdDEeww+xLtbd1KRlYwt6W+JHtbVkhpO3Yfic=
=3pg1
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/3/2014 2:18 PM, Kali Tor wrote:
 
 
 If disk encryption is indeed the way to go, how many of the
 node operators do actually encrypt the disk? Has there been
 any performance issues? I ask specifically because I run in a
 VPS where resources are limited (compared to a proper
 machine).
 
 - kali-
 
 
 Depends, what configuration will that virtual machine have? You
 shouldn't notice too big of a difference, full disk encryption
 is not a resource killer on any configuration.
 
 - -- s7r
 
 1GB RAM, 1CPU Core, 20GB SSD. Currently being used just for Tor.
 
 -kali-
 
 ___ tor-relays mailing
 list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

Yeah, as i thought you won't notice any penalty over performance if
you enable full disk encryption, just keep in mind you have to be
around and enter the passphrase at each and every reboot otherwise the
operating system will not boot.

And on a virtual machine, full disk encryption will not protect you
against physical access to the host machine while the VM is running,
keep that in mind (the decryption key is stored in the RAM memory
otherwise the machine cannot run, they can pause, capture files,
resume or unlimited of other things to break your encryption).
- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJTtT6eAAoJEIN/pSyBJlsRT54H+wfYw2ZliTXKoL4mXyJhdzo1
wTjzjj0ONNPNOrqtdRPMLZgS7Vs0ej36rDtYdnAJSNn5XtlGkfgp5WWMzVZZuKo9
ABc7Q92YmSeWv1KCpvglA2B06Eew+8rh2j3FCRCWqb4v6BqjiohFdrB+3X5QVp6P
6LwZb4ds2PQVjqmEoEe3PHZM8jFmq8FwV978xaiAoxvvcvjLjz3rJSlGTUG60XRK
mL5O1WDtx8F4OGDvFTLCsAt8+QMEBcgmu+lIOTxGIvW4Nz4L6/W7O+JG8O+zTIcS
ae9k823JNBxIf9WgKrKzdO0B/t/4fcHiDCwrKpXJjzndirXAFsv+9LpEhLatkSE=
=L51B
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/2/2014 9:50 AM, Kali Tor wrote:
 All,
 
 Are there anything special that needs to be done to make sure that
 Tor nodes running inside VMs (VPS) is protected from snooping eyes?
 Since there is hardly any data at rest I am assuming not, but then,
 what do I know!:)
 
 -kali-
 
 ___ tor-relays mailing
 list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

Kali

I don't understand what exactly you mean, snooping eyes.Anyone can see
at anytime that the VPS in questions is a Tor relay. 1 method is by
seeing the traffic it generates and second is the consensus data in
the Tor network, where all relays IP addresses are listed. This should
not be a problem whatsoever, Tor is not designed to hide the fact that
you use it or that you run a Tor relay. It is designed to offer
anonymity and privacy in activity, not if you use it or not.

If you are asking how to secure  your box better, indeed the public IP
address list of relays is often scanned and brute forced. That is why
I recommend:

- - if you run only Tor on that box is best, if not make sure your apps
are properly secured (mysql not listening on public IP if it's not a
remote mysql server, strong passwords for mysql, ftp, etc.).
- - make sure only ports used by Tor are open. There is no need for
anything else.
- - if you use ssh for administration that is fine, just change the port
from 22 in /etc/ssh/sshd_config to some custom port, anything, like
2988 or whatever.
- - permanently disabled plain password authentication or rhost
authentication in sshd_config and only allow key-based authentication
for better security and protection against weak password probing.
- - do not allow any other users for SSH access.

Let me know if you have any other questions.


- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJTs+YiAAoJEIN/pSyBJlsRqwwH/1yYOsjM/7eVB4S6BjkEVbdZ
cNXeYB2wyFQdKWiGXTfEyXBdTWUMiXl2YJNol1K8L0bDhv3H90lRBzhGpxUGbIjr
BPZqwUYvR8FnzildmmUTRlzntq0mfbMQ9E7jXWhepS95QA5JxH2D4Bl2qCb7//uq
HXlB76YIdDS3D57wKlF8r2JGFYlIbg38gEtvnY2X4755KpJrxlFUPkqVsLAl4j5c
z9PQzR0qw5mdEnMGWFdkve4Qlq1FL9lYx0+UmO0VCGcpiHcHMLhtVTMX6Ieq/zGP
apTJ8L5EmUaIdrCUilU4thkouBbVjnPKS3R65HXy2AjujuxtR+fuTkXyNbeAp1k=
=Wk0Y
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread Kali Tor
Hi,


 
 If you are asking how to secure  your box better, indeed the public IP
 address list of relays is often scanned and brute forced. That is why
 I recommend:
 
 - - if you run only Tor on that box is best, if not make sure your apps
 are properly secured (mysql not listening on public IP if it's not a
 remote mysql server, strong passwords for mysql, ftp, etc.).
 - - make sure only ports used by Tor are open. There is no need for
 anything else.
 - - if you use ssh for administration that is fine, just change the port
 from 22 in /etc/ssh/sshd_config to some custom port, anything, like
 2988 or whatever.
 - - permanently disabled plain password authentication or rhost
 authentication in sshd_config and only allow key-based authentication
 for better security and protection against weak password probing.
 - - do not allow any other users for SSH access.
 
 Let me know if you have any other questions.

I have done all that, so covered on that aspect. Was wondering if disk 
encryption and use of something like TRESOR would be useful?

-kali-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread grarpamp
On Wed, Jul 2, 2014 at 7:46 AM, Kali Tor kalito...@yahoo.com wrote:
 I have done all that, so covered on that aspect. Was wondering if disk 
 encryption and use of something like TRESOR would be useful?

The private keys for the node are sensitive, and even the
.tor/state file for the guard nodes could be if the attacker
does not already have that info, same for any non default
node selection stuff in torrc. Tor presumably validates
the disk consensus files against its static keys on startup
so that's probably ok yet all easily under .tor anyway.

There was a thread on this some time ago you can find.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 7/2/2014 2:46 PM, Kali Tor wrote:
 Hi,
 
 
 
 If you are asking how to secure  your box better, indeed the
 public IP address list of relays is often scanned and brute
 forced. That is why I recommend:
 
 - - if you run only Tor on that box is best, if not make sure
 your apps are properly secured (mysql not listening on public IP
 if it's not a remote mysql server, strong passwords for mysql,
 ftp, etc.). - - make sure only ports used by Tor are open. There
 is no need for anything else. - - if you use ssh for
 administration that is fine, just change the port from 22 in
 /etc/ssh/sshd_config to some custom port, anything, like 2988 or
 whatever. - - permanently disabled plain password authentication
 or rhost authentication in sshd_config and only allow key-based
 authentication for better security and protection against weak
 password probing. - - do not allow any other users for SSH
 access.
 
 Let me know if you have any other questions.
 
 I have done all that, so covered on that aspect. Was wondering if
 disk encryption and use of something like TRESOR would be useful?
 
 -kali- ___ tor-relays
 mailing list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

Full disk encryption on a Tor relay, if it's just a Tor relay it's
overkill. It will just increase the HDD I/O rate and resource
consumption.

Also, most important, if you use full disk encryption and your vm gets
somehow rebooted (migrated to another cluster by your provider, update
to the host OS or hardware, etc.) and you are not around to enter the
passphrase for full disk encryption your operating system will not
boot and cause you long downtime, until you are available to manually
enter the passphrase. this can cause you to lose flags in the
consensus, because of extended downtime.

Important to say that Tor does not have any files which need to
encrypted. Tor, by design protects each relay by not knowing both the
original source and the final destination of the traffic. It just has
some cache of the consensus data, which anyone can publicly get from
the Tor network without needing to break your box or hack your full
disk encryption.

Only things which are secret are your onion keys, which give your
relay's fingerprint. Make sure you back those up, in case you need to
re-install this relay.

If you use that vm for something else too and you have some sensitive
data there, it is always a good idea to encrypt everything... but in
your scenario full disk encryption will not help since you are exposed
to physical attacks (e.g. someone caching your files while your
virtual machine is RUNNING, making full disk encryption useless).


- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJTtCldAAoJEIN/pSyBJlsRIYEIAJ6aN9MLeDhhssA6SR8fV8JS
Vmn8mJ4rbazE8JFkIqxf6sDHHPCHOyhHwc1xCe/PqIuIncNqC4G2sXNtoaFo7sMt
dTLa4RvII5JJl0hk4n+F7yoj8QJLEFsdZrPaDs2vyoeK92Hrt+fSLTHmK1bkd0Bn
/AKAcSNlwL4Ls3WrYrigwHFCsNKcpBIpsdukZ/mit4uDnDarPpT4j3Sy5Wm11pYI
Pd3I7TXIh78kUJcjgmrVEEO5a7+SaHvFaCpZwImEb73MdCH+UhyVWnqKV8wbVWGx
ZnXRJ5/d/kevnfiQLIU9/VaWut2lHpwCNgLsQzqYBa8XXPwBjmOzDx2RZrtnxZo=
=VsE4
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays