[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: "Practical onion hacking: finding the real address of Tor clients"

On Fri, Oct 20, 2006 at 06:49:45PM -0400, Roger Dingledine wrote:
> On Fri, Oct 20, 2006 at 03:31:22PM -0700, coderman wrote:
> > i'm fond of the transparent proxy router approach we've used to try
> > and fail safe for most protocols (at least with respect to the DNS
> > leaks and covert TCP connections via Java/Flash/etc).[1]
> [snip]
> > it would be nice to have a detailed proxy checker available that looks
> > at these Java/Flash/RealPlayer/etc holes.  right now there are a
> > handful of common http proxy checkers but these look for headers and
> > IP at best.

Expanding what I was suggesting in my previous message, which I know
is just one little piece of the pie, is that when you run the
installer wizard for your favorite OS. Part of it is to run a
configuration check.  This causes you to connect to a snoop server
that identifies you every which way it can think of both within and by
bypassing the anonymized circuit, maybe compares to info from an
unanonymized connection from you. There should then be
warnings/suggestions/links/more-wizard-dialogues/etc for things to do
if you come up found. I think there are already servers out there that
do a moderate job at this, and there are at least a few people I can
think of to suggest other things to do (who no doubt have plenty of
time to do this ;>). There can also be a link from the Tor
home page for general use, and/or for periodic rechecking, etc.

Gotta go,
Paul Syverson                              ()  ascii ribbon campaign  
Contact info at http://www.syverson.org/   /\  against html e-mail