Re: [tor-talk] Systematically finding bad relays (was: Anecdotical experience of SSH MITM)

2017-07-19 Thread Philipp Winter
On Wed, Jul 19, 2017 at 04:39:41PM -0500, eric gisse wrote: > Looking at the exitmap source, as I was curious what modules > existedthe problem I see is that it does not have modules that are > capable of the more difficult to pull off things like SSH honeypot > detection. The Tor Project main

Re: [tor-talk] Systematically finding bad relays (was: Anecdotical experience of SSH MITM)

2017-07-19 Thread eric gisse
Ooh, fascinating. The academic paper is interesting and covers the high points of the type of things you would want to look for. And some things you wouldn't think that you should, like connection sampling rather than binary "is sniffing" / "is not sniffing". (ha ha, n^2 fuckup) Looking at th

[tor-talk] Systematically finding bad relays (was: Anecdotical experience of SSH MITM)

2017-07-19 Thread Philipp Winter
On Wed, Jul 19, 2017 at 01:43:32PM -0500, eric gisse wrote: > Is there any notion of doing a sort of automated testing for things > like this that can be easily proven? Yes, the blog post I linked to contains some more information. We are using tools such as exitmap [1] to systematically scan the