[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #15951 [Tor]: FairPretender: Pretend as any hidden service in passive mode
#15951: FairPretender: Pretend as any hidden service in passive mode
------------------------+-----------------------------------------
Reporter: twim | Owner: twim
Type: defect | Status: new
Priority: major | Milestone:
Component: Tor | Version:
Resolution: | Keywords: tor, hs, descriptor, tor-hs
Actual Points: | Parent ID:
Points: |
------------------------+-----------------------------------------
Comment (by twim):
Replying to [comment:5 yawning]:
> I'm unconvinced:
> * At some point, the adversary will need to run their own HS to do
anything actually harmful.
Yes, sure. I look at this as the first stage of the attack when an
attacker could insensibly turn the majority of the original HS users to
use evil an address (and descriptors). Using trawling the attacker can
determine (approximately) the portion of users that are using this evil
address. If it's more than e.g. 96% (too good for spoofing, just example)
the attacker perform an "active MitM" by running the evil HS and do any
evil thing because they are already the "legitimate HS".
> * An attacker can host their HS on a pwned box or something, and use 1
hop circuits to the RP and the victim HS's RP to cut out most of the
latency.
I didn't think of this scenario before, thanks for the tip! Now it doesn't
seems to be conspicuously slow.
> * Mitigation exists in the form of a self signed SSL cert if HS
operators currently care about this. The lack of a trust root is
irrelevant, as long as the user doesn't compound "clicking on the bad"
with "accepted a SSL cert with an incorrect DN", the adversary at that
point has to mount a full MITM.
I don't consider self-signed certificates here because it provides almost
zero additional security for HSes. Anyone can create it and they should be
stored in the browser in order to validate something (problem with Tails).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15951#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs