> On 3 Dec. 2016, at 11:11, Bungeetaco <bungeet...@protonmail.com> wrote: > > > > > > > Hi there! I would be more than glad to apply the appropriate modifications to > my relay if it means increased security for the users ;D. I care about the > security and privacy of the people who pass through my relays, and I take > pride in supporting a project which empowers people so much. I decided to run > a Middle and 2 exit nodes because I wanted to provide diversified support to > the Tor network, I did not intend to jeopardize anyone's privacy or security. > > Would I need to add the fingerprints of my others nodes in my torrc > configuration files? If so, please let me know how to accomplish this and > I'll push an update on all my servers ASAP. The last thing I want is create a > security risk for the users and/or distrust. > > Thanks for letting me know about this btw!
Hi Bungeetaco, On each relay, add a line to the torrc that says: MyFamily fingerprint,fingerprint,fingerprint,... Where the fingerprints are the fingerprints of each of your relays. Tim > - Bungeetaco > https://bungeetaco.com/ > >> -------- Original Message -------- >> Subject: Re: [tor-dev] protecting users from known relay groups with >> end-to-end correlation capabilities >> Local Time: December 2, 2016 5:39 PM >> UTC Time: December 2, 2016 10:39 PM >> From: teor2...@gmail.com >> To: tor-dev@lists.torproject.org >> ab...@torworld.org, t...@digineo.de, Viktor Nikolov <vniko...@vnikolov.cz>, >> Nicholas Merrill <n...@calyx.com>, bungeet...@protonmail.com, Dmitrii >> Tcvetkov <demfl...@demfloro.ru>, ab...@to-surf-and-protect.net, >> bad-rel...@lists.torproject.org >> >> Dear relay operators who are CC'd, >> >> TL;DR: we're talking about blacklisting your non-exit relays, >> because they don't have MyFamily set correctly. >> >> If you'd like help configuring MyFamily correctly, please let us know. >> >> > On 3 Dec. 2016, at 08:50, nusenu <nus...@openmailbox.org> wrote: >> > >> > Hi, >> > >> > it is a well known fact that MyFamily is a largely ignored setting, >> > luckily this is not a problem in most cases because >> > >> > - all relevant relays are run in a single /16 >> > or >> > - are only guard relays (exit probability = 0*) >> > or >> > - are only exit relays (guard probability = 0*) >> > >> > but there is a limited number of relay groups** that have actual >> > end-to-end correlation capabilities, meaning they are potentially chosen >> > by tor clients for the guard _and_ exit position, even if the odds are >> > (hopefully) not very high. >> > >> > These potentially dangerous relay groups >> > - are run in multiple /16 netblocks >> > - have an exit _and_ guard probability of > 0 (because they run exits >> > and guards) >> > >> > Examples (generated daily): >> > https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups.txt >> > (see CC) >> >> This is a useful check, but it is insufficient. >> Can you please produce a similar list for middles and exits by the same >> operator? >> >> (Controlling the middle and exit leads to a guard identification >> attack.) >> >> There's also an attack when an operator controls a guard and a middle. >> But that's harder to resolve, albeit much more common. >> >> > How could the risk for tor clients be reduced? >> > (options after enough dir auths came to the conclusion that these relays >> > are in fact operated by a single entity) >> > >> > 1) try to contact the operators and give them time to fix it >> > I've done that multiple times but haven't been successful [1] >> >> Have you tried emailing them individually? >> I've typically got better results that way. >> >> > 2) build tools to easily/automatically manage MyFamily >> > done[2], but it is unlikely to be used >> >> Maybe one solution is to build a generic tool that works with more than >> just ansible? >> >> > 3) assign them the badexit flag >> > since exits are a scarce resource, not very wise >> >> +1 >> >> > 4) assign them the badguard flag >> > there is no such thing ;) >> >> We have written patches that take away the guard flag. >> This would be possible, but it doesn't resolve the issue, because they >> will still be used as middle relays. >> >> However, taking away the guard flag would fix the guard/middle case, >> because then all the relays would only be used as middle relays. >> >> > 5) blacklist the entry guards (that are outside the configured family) >> >> Yes, this is the best option, because it protects clients from >> selecting relays from that operator as either guard or middle. >> >> (However, operating a bridge and an exit still has the same issue, and >> there is no MyFamily for bridges, because that de-anonymises them. As >> do the bridge/middle and guard/middle cases. So maybe we should >> consider the risks of each case, and whether we want to educate or ban.) >> >> And, of course, it's worth noting that the ContactInfo might be >> incorrect, so we would have to do this on a case-by-case basis, and >> convince the directory authority operators it's a sensible thing to do. >> >> (If someone is using others' ContactInfo, those relays should be >> banned.) >> >> > 6) change tor's path selection algorithm to never choose more than one >> > relay with a given non-empty non-default contact string? >> > This would basically turn the ContactInfo field into the PoS token >> > mentioned by Mike in [3]. Since there are a few common contactInfo >> > strings this is probably not the best option without excluding them. >> >> No, this field is not mutually authenticated, unlike MyFamily. >> This leads to an attack where bad relays bias client path selection >> using ContactInfo. >> >> > [1] >> > https://lists.torproject.org/pipermail/tor-relays/2016-November/010965.html >> > [2] https://github.com/nusenu/ansible-relayor >> > [3] https://trac.torproject.org/projects/tor/ticket/5565 >> > * if we can assume onionoo's values to be accurate and realistic >> > ** they are considered to be operated by a single group due to their >> > contactInfo descriptor field. This string is not verified in any way and >> > can therefore result in false-positives. >> >> T >> >> -- >> Tim Wilson-Brown (teor) >> >> teor2345 at gmail dot com >> PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B >> ricochet:ekmygaiu4rzgsk6n >> xmpp: teor at torproject dot org >> ------------------------------------------------------------------------ >> >> >> > T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------ _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev