On Sat, Nov 02, 2013 at 10:46:38AM +1030, DeveloperChris wrote: > > I just reviewed the tor hidden services page. so I am pretty green > about the way it works. > > > From the description I gather this > > When a client wants to connect to a hidden service an introducer > picks a random rendezvious point which then is used to shuttle > packets back and forth between the client and the hidden service. > > If I wanted to discover the location of the hidden service is it not > simple to act as the rendezvious point? If I had enough resources > and flooded tor with nodes eventually one of my nodes would be > chosen as the rendezvious point and therefore I have the client IP > (me) the rendezvious point ip (me) and the supposedly hidden > services ip (target). There's a whole circuit between the HS and the rendezvous point. You'd have the same problem as trying to deanonymize a client from a subverted exit node. -- Andrea Shepard <andrea@xxxxxxxxxxxxxx> PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF DE79 A4FF BC34 F01D D536 PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5 DF7E 4191 13D9 D0CF BDA5
Attachment:
pgp2IyttgbRpm.pgp
Description: PGP signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk