[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: The best way to run a hidden service: one or two computers?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: The best way to run a hidden service: one or two computers?
- From: Gregory Maxwell <gmaxwell@xxxxxxxxx>
- Date: Mon, 20 Sep 2010 11:00:41 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 20 Sep 2010 11:07:44 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=I/UNEdTHh9VALl2TUqp3O8Z7JgvYcnhHa43CcHQuRJ4=; b=mC8neWsXW28dofDSv9g/k59CQezkUq/YmMdmhkNu8Dv5pG9jm228Di3q5lUFZkFjcC 1DrF660TNffQMHaOwHc0yV3yu1fN3Numj4Mzvg0Bw/8PH9S6PuwxcVyHLkhG+7EvRggI lY7+0Pcrt/+1xsqXaiHDhBn19KHEL35GbuS8g=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=xAWFGqL0LcBeabss14iW87CqqQ8fvSYfHvRq/QvxZWOsOoggnlZ7MMxNhBT/iznCCm 6kni/1aa7AHB2w1DoeIHuIp+dfzoy4z7XRnrgmWDCJh8RA5gytE4q+bVy/KpVJQ7Fzou ElkYmrPIqkNavRo4QcfboCkLnFuYfoGlrKFGs=
- In-reply-to: <20100917194134.5489b322@xxxxxxxxx>
- References: <N1-m0I9y7QkOJ@xxxxxxxxxxxxx> <20100917194134.5489b322@xxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Fri, Sep 17, 2010 at 10:41 PM, Robert Ransom <rransom.8774@xxxxxxxxx> wrote:
> If your hidden service really needs to be annoying to find, run it:
> * using only well-written, secure software,
> * in a VM with no access to physical network hardware,
> * on a (physical) computer with no non-hidden services of any kind
> Ârunning on it (so that an attacker can't use Dr. Murdoch's âHot or
> ÂNotâ clock-skew detection attack),
> * and over a fast enough Internet connection that the adversary cannot
> Âeasily determine your connection's speed.
I think you've missed some points.
* The (Virtual) machine running the hidden service should probably
also have no _outbound_ network connectivity except via tor.
This is because it can be even easier to trick a software on a server
into making a network connection than it is to remotely compromise the
server. E.g. your GNU/Linux distribution may have installed some extra
CGIs in your webserver that you are unaware of...
And here is a potentially controversial suggestion, lets see what
others say about it:
* You should run your hidden service behind tor bridges rather than
directly connecting to the tor network.
The rationale for this suggestion is that it may make it more
difficult for a network observer to enumerate a list of tor clients in
order to apply things like the clock-skew attack or subject them to
additional network surveillance.
> The above precautions are probably enough, unless a three-letter agency
> (or four-letter association) knows about your hidden service and wants
> to find and âneutralizeâ its operator. In that case, you have to worry
> about the near-global passive adversary and other threats that Tor
> can't afford to defeat.
I fear that you're overstating the security provided.
For example, I think that if you managed to piss off the ISP community
vigilantes that go after spammers and botnets that they would have a
decent chance of tracking you down in spite of your efforts to stay
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/