[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13667 [Tor]: Prevent port scanning of hidden services



#13667: Prevent port scanning of hidden services
------------------------+------------------------------------------
     Reporter:  arma    |      Owner:
         Type:  defect  |     Status:  new
     Priority:  major   |  Milestone:  Tor: 0.2.6.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  SponsorR tor-hs 025-backport
Actual Points:          |  Parent ID:
       Points:          |
------------------------+------------------------------------------

Comment (by yawning):

 Drawing from the PT bag of tricks...

 5) Send back END_STREAM_REASON_DONE as if the application closed the
 connection, optionally after either a certain amount of time has passed or
 a certain amount of data has been received from the peer.  Once this
 happens once, tag the circuit as "kind of sketch", and apply the same
 policy for all new streams regardless of if the destination port is
 actually valid or not.

 It makes debugging harder, but slows down scanning as much as 2 (though a
 intelligent scanner would try common ports first), and it gives the bad
 guys more work to do post processing the results.

 Not sure about the implications for "close the stream after a while" in
 this context, parts of it scare me but it may be something that's less
 scary if the parameters are set correctly.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13667#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs