[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] What is being detected to alert upon?



On 04/30/2015 09:15 PM, Frederick Zierold wrote:
>
>
> Hi,
>
> I am very curious how a vendor is detecting Tor Project traffic.
>
> My questions is what are they seeing to alert upon?  I have asked
them,
> but I was told "that is in the special sauce."
>
> Is the connection from the users computer to the bridge encrypted?
>
> Thank you for your insight.
>
>
>

Special Sauce, I'll buy that for a dollar ..

At a minimum, there are different kinds of detection for Tor within the Snort "Emerging Threats" Free-version signatures. So, this isn't even 'hard' necessarily.

One rules file is dedicated to it (emerging-tor.rules), that file has all the Tor IP addresses hardcoded into it. Additionally, there are other, non-IP-address related detections for Tor within other rules files (do an egrep in the directory for "Tor " to see those).

If you run Snort with the emerging threats ruleset, but disable the emerging-tor.rules (removing its awareness of the IP addresses of tor nodes), it still gives 3 alerts when Tor starts up. "ET POLICY TLS possible TOR SSL traffic". That's with a regular Tor connection, I don't know if bridges would change anything.



--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk