On 11/01/2013 06:16 PM, DeveloperChris wrote:
I just reviewed the tor hidden services page. so I am pretty green about
the way it works.
From the description I gather this
When a client wants to connect to a hidden service an introducer picks a
random rendezvious point which then is used to shuttle packets back and
forth between the client and the hidden service.
If I wanted to discover the location of the hidden service is it not
simple to act as the rendezvious point? If I had enough resources and
flooded tor with nodes eventually one of my nodes would be chosen as the
rendezvious point and therefore I have the client IP (me) the
rendezvious point ip (me) and the supposedly hidden services ip (target).
Then to cover my tracks I spread a story about how the target left clues
in facebook pages etc etc..
How does tor prevent this type of attack?
Both hidden services and clients accessing hidden services connect to
rendezvous points via three-relay Tor circuits.
Please keep the replies civil. I know there is one in every crowd. don't
be that one.
DC