Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-13 Thread Gozu-san
[I initially sent this just to Mike Cardwell.  Sorry about that.]

On 09/09/11 10:36, Gregory Maxwell wrote:

 On Fri, Sep 9, 2011 at 6:14 AM, Gozu-san g...@xerobank.net wrote:
 Alternatively, one could run Tor on VMs that can only access the
 internet via OpenVPN-based anonymity services.  OpenVPN clients can be
 
 OpenVPN-based anonymity services ~= snake oil.

Although some are over-hyped, that's a very broad generalization.

 If you're running a hidden service you've already got a perfectly good
 network anonymity service running.

I totally agree.  Upon reflection, I get the elegance and wisdom of Mike
Cardwell's guidance.  The approach that I suggested, except perhaps with
elaborate implementations that I didn't explain, is clearly inferior.  I
apologize to anyone whom I've misled.

FWIW, my comments were colored by considerations re discretely hosting
multiple hidden services.  I'll explain that in a new thread.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-09 Thread Orionjur Tor-admin
On 01.09.2011 13:24, Roger Dingledine wrote:
 Several people have asked us on irc about recent news articles like
 http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
 
 Apparently the Dutch police exploited vulnerabilities in the webservers
 reachable over the hidden services. Some people are confusing this issue
 with an attack on Tor. Tor just transports bytes back and forth. If you
 have an instant messaging conversation with a Tor user and convince her
 to tell you her address, did you break Tor? Having an http conversation
 with a webserver running over a Tor hidden service, and convincing it
 to tell you its address, is not much different.
 
 So what lessons can we learn here, other than the usual criminals
 are not as smart as your average bear? (If only we could count on bad
 people to run insecure software, and good people to secure their software
 correctly, the world would be a much simpler place.) One lesson is that
 there are a lot of non-Tor components that can go wrong in keeping a
 hidden service hidden -- just as we have a laundry list of security
 and privacy issues to consider when using Tor as a normal client (at
 the bottom of https://www.torproject.org/download/download.html.en )
 there's a whole other set of issues, mostly unexplored, for hidden
 service operators to keep in mind:
 https://www.torproject.org/docs/tor-hidden-service.html.en#three
 
 --Roger
 
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 


Very intresting what is the vulnerabilities they used for breaking systems?
In the lite of that facts I don't know what I need to advice my clients
- setting up hidden services on their home computers or on overseas
vdses? (My clients are not providers of child pornography but they are
fighters with tyrannical regim).
The first method is the best from the point of view of information
defense but the second method is the best for defense of persons of
operators of that services...
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-09 Thread tor
On 09/09/11 09:36, t...@lists.grepular.com wrote:

 Set up a firewall on the VM to prevent all other network traffic
 going in or out of it.

I meant to say set up a firewall on the *host* OS to prevent all other
traffic going in or out of the VM. I'd probably set up a firewall on the
VM it's self too though as an extra layer of protection. If they hack
the VM but don't get root, they wont be able to bypass the VMs firewall.

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F



signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-09 Thread tor
On 09/09/11 06:43, Orionjur Tor-admin wrote:

 Very intresting what is the vulnerabilities they used for breaking systems?
 In the lite of that facts I don't know what I need to advice my clients
 - setting up hidden services on their home computers or on overseas
 vdses? (My clients are not providers of child pornography but they are
 fighters with tyrannical regim).
 The first method is the best from the point of view of information
 defense but the second method is the best for defense of persons of
 operators of that services...

Probably the safest way to run a hidden service is to do it from inside
a VM.

Install Tor on the host OS. Configure up the Hidden Service on the host
OS, but point it at the IP of the VM. Set up a firewall on the VM to
prevent all other network traffic going in or out of it. Or
alternatively use the TransPort functionality of Tor so all traffic
leaving the VM goes through Tor.

If the webserver on the VM is compromised, they get access to the VM,
but the VM shouldn't know its real IP address (just the NAT'd one), or
anything else about where it is or who it belongs to.

You're still relying on there being no vulnerabilities in the VM
software or the Tor software which allow an attacker to access the host
system, but that sort of attack is much more difficult to pull off than
compromising a web server, or any of the software being served by the
web server.

For all we know, this was a simple PHP exploit that allowed the attacker
to make a HTTP request from the target server to a host on the wider
Internet, to discover its IP.

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F



signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-09 Thread Orionjur Tor-admin
On 09.09.2011 08:36, t...@lists.grepular.com wrote:
 On 09/09/11 06:43, Orionjur Tor-admin wrote:
 
 Very intresting what is the vulnerabilities they used for breaking systems?
 In the lite of that facts I don't know what I need to advice my clients
 - setting up hidden services on their home computers or on overseas
 vdses? (My clients are not providers of child pornography but they are
 fighters with tyrannical regim).
 The first method is the best from the point of view of information
 defense but the second method is the best for defense of persons of
 operators of that services...
 
 Probably the safest way to run a hidden service is to do it from inside
 a VM.
 
 Install Tor on the host OS. Configure up the Hidden Service on the host
 OS, but point it at the IP of the VM. Set up a firewall on the VM to
 prevent all other network traffic going in or out of it. Or
 alternatively use the TransPort functionality of Tor so all traffic
 leaving the VM goes through Tor.
 
 If the webserver on the VM is compromised, they get access to the VM,
 but the VM shouldn't know its real IP address (just the NAT'd one), or
 anything else about where it is or who it belongs to.
 
 You're still relying on there being no vulnerabilities in the VM
 software or the Tor software which allow an attacker to access the host
 system, but that sort of attack is much more difficult to pull off than
 compromising a web server, or any of the software being served by the
 web server.
 
 For all we know, this was a simple PHP exploit that allowed the attacker
 to make a HTTP request from the target server to a host on the wider
 Internet, to discover its IP.
 
 
 

How I need to set my VM for thas purposes?
I use a VirtualBox under transparently torified user on host machine for
the most secure browsing in the Internet  but I cannot to get access to
that machine through ssh from my host machine inspite setting up
suitable port forwarding in VBox settings.
I think that the settings of my host firewall prevent that access.
So, I'll probably have such problem in the connection between my host
and guest machines if I set up a web-server on VM, and my hidden service
on my host.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-09 Thread andrew
On Fri, Sep 09, 2011 at 05:43:50AM +, tor-ad...@orionjurinform.com wrote 
2.2K bytes in 45 lines about:
: Very intresting what is the vulnerabilities they used for breaking systems?

This question can likely only be answered by the authorities.  The
obvious attacks are against the webserver itself (apache, IIS, nginx,
etc) or some interpreted language, like PHP, Python, or Java.  

Hidden services provide the path and addressing to a destination.  They
don't provide the application or content at the address. You need some
sort of daemon/server software to provide the content and application.

-- 
Andrew
pgp key: 0x74ED336B
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk