Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-25 Thread With Weather Eye Open
Original Message From: Maxim Kammerer m...@dee.su 1. Stop spreading FUD and false claims, You are projecting. (c) proposing to invoke an attorney on some kid who tries to work on an open-source project he likes. There is nothing wrong with using the legal process to

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-25 Thread Mike Perry
Thus spake Maxim Kammerer (m...@dee.su): On Sat, Aug 25, 2012 at 1:12 AM, Mike Perry mikepe...@torproject.org wrote: The Raccoon has made a believer out of me, but there are some limits to both of his/her proofs.. The full proofs can still be found here:

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-24 Thread Mike Perry
Thus spake Ted Smith (te...@riseup.net): On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote: Hello gentlemen, snip [1] http://pastebin.com/hgtXMSyx I ran this script on the current consensus. The full results (the nodes-sniff-summary file) are below my signature. How did you

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-24 Thread Maxim Kammerer
On Sat, Aug 25, 2012 at 1:12 AM, Mike Perry mikepe...@torproject.org wrote: The Raccoon has made a believer out of me, but there are some limits to both of his/her proofs.. The full proofs can still be found here:

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-22 Thread Maxim Kammerer
On Wed, Aug 22, 2012 at 8:51 AM, Andreas Krey a.k...@gmx.de wrote: Buying software for a) will probably show up in public records, and b) may be hindered by the paranoia of the participating LEAs. Even the software needed to get all the intercepted data in one place could be nightmarish. I

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-22 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Manually, using WHOIS and traceroute. This can be done automatically using GeoIP, but I wanted to be sure in the results (also visited some hosting sites), and writing a proper program would deviate too much from the initially intended “quick

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-22 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 tor-relay-stats.py, renamed to compass.py might be useful too: https://compass.torproject.org/result?by_as=Truetop=10 -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlA0l50ACgkQyM26BSNOM7Yy3wD+Lz/ciNl/2H+peEgxzsWM85Kb

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Eugen Leitl
- Forwarded message from Bryce Lynch virtualad...@gmail.com - From: Bryce Lynch virtualad...@gmail.com Date: Tue, 21 Aug 2012 12:49:02 -0400 To: zs-...@googlegroups.com Cc: doctrinez...@googlegroups.com Subject: Re: [tor-talk] End-to-end correlation for fun and profit Reply-To:

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Runa A. Sandvik
On Tue, Aug 21, 2012 at 6:21 PM, The Doctor dr...@virtadpt.net wrote: As I understand it, Tor nodes know IP addresses one up and one down in a circuit. I haven't read through the Tor codebase in a while (two or three years), so my question is this: Does Tor apply the same family avoidance

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread fakefake
Or they could get a blanket wiretapping order and catch them all at once. I've often wondered if it's worth running Tor routers on the EC2 for this reason. Bridges make sense if EC2 has enough IP addresses and the censurer doesn't ban the whole range. Too many relays give too much power to

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 8:27 PM, Eugen Leitl eu...@leitl.org wrote: 10 11.50% So, in other words, you'd hav to have 10 Tor routers on the same network. That's like me having 10 Tor nodes on my home network and not setting the NodeFamily directive in torrc. Somebody playing games aside, I

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 01:30 PM, Runa A. Sandvik wrote: From https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/path-spec.txt: We do not choose more than one router in a given /16 subnet (unless EnforceDistinctSubnets is 0). So, seeing as how

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 02:57 PM, Maxim Kammerer wrote: No, it means that if you intercept traffic from 10 top-bandwidth Tor routers with some characteristics (Guard + Exit, basically) at what's probably the nearest hardware switch (seems true for the

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread With Weather Eye Open
Original Message From: Bryce Lynch virtualad...@gmail.com This claim sounds a little fishy to me, in this light. I'm not surprised. Last week, the same guy kept asserting that Tor was mainly used for nefarious purposes like buying drugs or illegal pornography, in addition

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I think karsten's graphs from #6443 fit also well to this thread: https://trac.torproject.org/projects/tor/ticket/6443 You might also be interested in this thread on tor-relays:

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 04:13 PM, With Weather Eye Open wrote: I'm not surprised. Last week, the same guy kept asserting that Tor was mainly used for nefarious purposes like buying drugs or illegal pornography, in addition to claiming such would be not

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 11:13 PM, With Weather Eye Open w...@safe-mail.net wrote: I'm not surprised. Last week, the same guy kept asserting that Tor was mainly used for nefarious purposes like buying drugs or illegal pornography, in addition to claiming such would be not difficult to prove.

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Roger Dingledine
On Mon, Aug 20, 2012 at 10:33:29AM +0300, Maxim Kammerer wrote: As you can see, sniffing just 25 Class-C networks (or 42 individual nodes) lets an adversary correlate ~25% of (non-.onion) circuits. I think your numbers may not be right (there are a lot of other subtleties to the calculation),

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread adrelanos
With Weather Eye Open: Original Message From: Bryce Lynch virtualad...@gmail.com This claim sounds a little fishy to me, in this light. I'm not surprised. Last week, the same guy kept asserting that Tor was mainly used for nefarious purposes like buying drugs or

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Ted Smith
On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote: Hello gentlemen, snip [1] http://pastebin.com/hgtXMSyx I ran this script on the current consensus. The full results (the nodes-sniff-summary file) are below my signature. How did you compile the country-codes to IPs list? That wasn't

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Jacob Appelbaum
Maxim Kammerer: It's comforting that this approach yields quickly diminishing returns. Going from 25 to 60 networks only gets you a 10% increase in networks surveillance (if I'm reading the output correctly), and returns plateau entirely at that point (I'm considering about two percent to be

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Wed, Aug 22, 2012 at 2:11 AM, Roger Dingledine a...@mit.edu wrote: I think your numbers may not be right (there are a lot of other subtleties to the calculation), but your point is still generally correct. There are some subtleties, mainly the restriction on distinct families in a circuit —

[tor-talk] End-to-end correlation for fun and profit

2012-08-20 Thread Maxim Kammerer
Hello gentlemen, Here and there I see references to “global” or “state-level” powerful adversaries when it comes to end-to-end traffic correlation — i.e., it's supposed to be very hard. Because Tor network has many nodes, there are guard nodes, there is research, blog posts, CIA funding (well,