[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Possible Whois demasking of Tor using
Hello, listers!
I have detected that some IP addres of obfs3 briges have demasking
WHOIS information.
For example
obfs3 bridge with IP at range 192.36.31.0 - 192.36.31.255
(there are several bridges; I dont want to publish it at the list but
can send by private messages if somebody wants).
RIPE WhoIs tool at https://apps.db.ripe.net/search/query.html
reports on this address:
--------------------------
inetnum: 192.36.31.0 - 192.36.31.255
netname: ZWIEBELFREUNDE
descr: Zwiebelfreunde e.V.
...
address: Palaisplatz 3
address: 01097 Dresden
address: Germany
phone: +49-351-21296018
fax-no: +49-911-3084466748
abuse-mailbox: abuse@xxxxxxxxxxxxxx
remarks: ---------------------------------
remarks: This network is used for research
remarks: in anonymization services and
remarks: provides Tor exit nodes to end
remarks: users.
remarks: ---------------------------------
remarks: Dieser Netzblock wird zur
remarks: Erforschung von Anonymisierungs-
remarks: techniken genutzt und stellt
remarks: Endnutzern Tor zur Verfuegung.
remarks: ---------------------------------
remarks: http://www.torservers.net/abuse.html
remarks: ---------------------------------
nic-hdl: MB22990-RIPE
---------------------------
I think these whois data and remarks easy can demasking using
of Tor network by ISPs. Also it may cause blocking of bridges IP in
some areas.
194.132.208.0 - 194.132.208.255 IP range has the same problem.
I wrote to Tor developers about this but have no answer received yet.
WBR, Michael Hock
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk