[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: SANS Paper: Detecting Tor
On Sun, Nov 09, 2008 at 09:54:53PM -0500, Roc Admin wrote:
> I just read this article in the SANS reading room called "Detecting and
> Preventing Anonymous Proxy Usage"
>
> http://www.sans.org/reading_room/whitepapers/detection/32943.php
>
Cosmetic issues:
1) It's "Tor", not TOR.
2) The paper cites the website rather than any of the actual
published academic papers on Tor: lame.
3) The paper doen't say when the research was done or what version
of Tor was used, so it may not be _inaccurate_ so much as
outdated.
Actual issues:
The Tor-detection method described in this paper involves looking
for a string in the outgoing connections. You wouldn't know it
from reading the paper, but the string in question is part of the
CNAME field of a certificate sent from a client to a server. We
don't follow that protocol any more; in particular see proposal 124
and proposal 130.
Where Tor stands today:
We're a lot better at avoiding dumb regex-matching attacks in the
Tor protocol than we were before. When an 0.2.0.x client is
talking to an 0.2.0.x server, there should not be any regular
expressions that can be used to distinguish the data stream from a
regular HTTPS session.
(Some may remain; we may have missed some details. Nonetheless,
the approach described in this paper doesn't work on any recent
version of the Tor protocol.)
--
Nick