[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #13667 [Tor]: Prevent port scanning of hidden services
#13667: Prevent port scanning of hidden services
------------------------+------------------------------------------
Reporter: arma | Owner:
Type: defect | Status: reopened
Priority: major | Milestone: Tor: 0.2.5.x-final
Component: Tor | Version:
Resolution: | Keywords: SponsorR tor-hs 025-backport
Actual Points: | Parent ID:
Points: |
------------------------+------------------------------------------
Comment (by arma):
Replying to [comment:26 dgoulet]:
> Alice has a long lived connection to let say an IRC server on aaaa.onion
port 6667. Now, Alice receives an email saying "Hey, can you connect to
aaaa.onion:6668?" for which the HS does have that port in its exit policy.
So Alice, connects, the tor client reuses the RP circuit but on a wrong
port and blam the circuit is killed thus the long lasting connection.
I think you can do this automatically by having an img link in your
attacking page, which when Alice visits it, it blows away her existing irc
connection to that other service.
> A solution we thought of here is to pin a *good* virtual port on a
circuit and not accepting connections on it with an other port.
Right -- basically the proposed fix is to have one circuit per virtualport
Alice is reaching.
(It might be that we should re-close this ticket and open a new one for
the new issue.)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13667#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs