[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Malicious Exit Nodes?
Thus spake Hideki Saito (hidekis@xxxxxxxxx):
> If it is AIM, you can type "1" when that message appears to force
> logoff people in other connection.
That may solve the problem of stolen messages after you log back in,
but what about while you are offline.
Is this "keeping a connection open" actually a property of Tor? Or is
it some bug? Or do we actually have rogue exit nodes operating here?
Should I make some effort to make a list of exits this happens for?
> 2005/8/4, Harry Hoffman <hhoffman@xxxxxxxxxxxxxxxx>:
> > Mike,
> >
> > Yep, it happens quite frequently to me. I haven't been able to investigate
> > yet so I don't IM thru tor right now :-(
> >
> > but remember that if someone wanted to they can steal your creds on their
> > exit node.
> >
> > Cheers,
> > Harry
> >
> >
> > On Thu, 4 Aug 2005, Mike Perry wrote:
> >
> > > Is anyone else experiencing issues with remaining logged on to AIM
> > > (specifically gaim) after signing off when using Tor? For some reason
> > > even after explicitly going to signoff, my screenname remains online
> > > and I lose IMs. When I go to sign on again I get the annoying "Your
> > > AIM account is being used in another location", sometimes even hours
> > > later.
> > >
> > > I don't really know the AIM protocol, but doesn't it log you out
> > > automatically normally as soon as the TCP connection dies? Perhaps Tor
> > > isn't properly terminating randomly dropped circuits? But what about
> > > when I deliberately go to signoff?
> > >
> > > This is obviously distressing, because what is to stop someone from
> > > say, intercepting and then dropping my logoff at an exit server and
> > > then keeping the connection alive to recieve copies of my IMs..
> > >
> > > --
> > > Mike Perry
> > > Mad Computer Scientist
> > > fscked.org evil labs
> > >
> >
>
>
> --
> Hideki Saito mailto: hidekis@xxxxxxxxx
--
Mike Perry
Mad Computer Scientist
fscked.org evil labs