logs archiveIRC Archive / Oftc / #tor / 2015 / August / 2 / 1
whitanne_
j
woossa
http://chronicle.su/2015/06/17/jacob-appelbaum-expelled-from-wikileaks-organization-after-opm-hack-reveals-tor-is-funded-by-us-navy/
OH NOSE
i feel so betrayed
whitanne_
woossa: that's no secret
bigfondue
woossa: That should make you feel better. If the US military is using it, it's pretty safe
jager
wow that's some pretty strong language from assange
50 million is a lot of money though wtf
qore
it's satire, bad satire
somewhat like The Onion
jager
hah ok here i am searching for a better article too
thanks
woossa
looooooooooooool
gwenne
lol
         

sej
.
knicklux
hi there, i wanted to fiddle around with flashproxy and ... it doesn't work. setup: arch linux, tbb instaled from aur, latest. inbound connections on tcp 9000 only via ipv6. when i tried to run the flash proxy from the cli (./.tor-browser-en/INSTALL/Browser/TorBrowser/Tor/PluggableTransports/flashproxy-client --register :0 :9000 -6) I got "File "./.tor-browser-en/INSTALL/Browser/TorBrowser/Tor/PluggableTransports/flashproxy-client", line 163"
"new line" "except socket.error, e:". could anyone help me?
Guest243
is 9000 open?
knicklux
yes, but only via ipv6.
i used this guide: https://trac.torproject.org/projects/tor/wiki/FlashProxyHowto
according to it passing -6 to flashproxy should force it to use only v6 (i still found "Bridge flashproxy 0.0.1.0:3 4D6C0DF6DEC9398A4DEF07084F3CD395A96DD2AD" in my torrc though)
and 4 other lines with v4 addresses, no lines with v6 addresses
Guest250
kiaora clonak
tanemahuta
Hi. I'm trying to create a twitter account while accessing the twitter website over Tor, but they insist on asking for my mobile phone number or telling me they cant create an account for me if I want to use this computer (and maybe I would like to download the iphone or android app)... IS there a way to create a twitter account over Tor without giving a mobile phone number?
ok well nice chatting with you all
Brownout
patience patience
rndmusr
hello guys, im bit confused about this news :/ http://thehackernews.com/2015/08/unmask-tor-network.html
suelin
what about it
it's a website fingerprinting attack
rndmusr
nothing, just "unmask Tor users with 88 percent accuracy even without decrypting the Tor traffic." sounds bit scary ;}
suelin
a basic and mostly unrelated example would be TLS/SSL encrypted websites. Say a website has 10 pages on it. An attacker who can watch your link to the website can count packets + determine the website you are going to, so based on how many packets you receive they can tell which page you are on without decrypting the traffic.
that is just a basic example so you understand the concept though, the Tor attack is a different form of the same general concept
rndmusr
suelin: i understand that article, just want to see some opinions
suelin
most notably in the TLS example, the attacker already knows the specific website you are going to, just they are trying to determine which page of it you are on. In the Tor case, they don't have direct access to the website you are going to. But there are still fingerprinting attacks they can do.
well, an attacker who owns your entry guard is already able to do a lot of scary things. And this requires the attacker to own your entry guard. So it is just saying an attacker who owns your entry guard can do yet another scary thing.
TheVoid
would the attack be harder to achieve if the tls/ssl encrypted site was using massively-oversold shared hosting?
on a single ip address
suelin
But there are a lot of false positives still, so it probably isn't too worrying tbh. Though there are other things that can happen, I haven't actually read this paper, but for example are they fingerprinting single pages or are they not missing the forest for the trees? A fingerprint over many pages can be more accurate than the fingerprint of a single page.
I don't think so TheVoid, in the TLS example I gave, because the attacker can still see the certificate I believe so
TheVoid
oh, i see
suelin
it wouldn't blend in. But this is mostly #nottor, I was just giving that example because it is a basic fingerprinting attack to show the concept of determining encrypted traffics plaintext without decrypting it.
rigo8542
How is it #nottor? It's news about vulnerabilities of tor lol.
suelin
that is #tor, but the TLS fingerprinting attack isn't
rigo8542
Well it's TLS fingerprinting applied to tor. Any dm,nvm.
         

suelin
sure but it is a different attack than the one I used to give an example is all
but feel free to talk about either I guess I think velope is sleeping 0_0
rigo8542
ah right lk
*k
Novice201y
Hello. Who want's to chat via Ricochet?
rndmusr
thanks for opinions, hope that fix will come soon
i forgot to paste that paper, if someone is interested @ https://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf
_aeris_
hello guys !
my relay lost all flags today, is restarting « too much » this relay this morning can explain this ?
(guard, stable, fast, hsdir&)
knicklux
enough power?
_aeris_
knicklux > yep
just this morning i reconfigure all my server to add more tor instance
and i have to restart this relay few times during arround 1 hour
then, no more flag :'(
knicklux
so you're running multiple tor procesees/instances?
_aeris_
yep
2 instances for now :)
knicklux
how many for relaying?
_aeris_
2 for relaying
knicklux
i generally run three:one for tor browser and one for technical stuff and one for ricochet, so they're seperated
i don't know if it makes much sense to setup two for relaying
_aeris_
i have one for technical stuff too
2 for relaying because of multicore usage
i have plenty of CPU and bw, but one instance consume only 100Mbps
knicklux
ok
how about putting the technical stuff into a third tor instance? sounds worth a try though i always perceived tor as a very stable software
velope
"technical stuff"??
knicklux
emergency ssh login, bitmessage, etc
maybe a netcat chat server
let's call it miscellaneous stuff
_aeris_
and hidden service
knicklux
yep
has anyone tried running two tor instances with the identical hidden-service-dir?
suelin
lol
I always wondered why Tor didn't isolate the technical stuff from the non-technical stuff
knicklux so you are saying to use multiple instances of Tor for different applications?
_aeris_
suelin > this is not just a problem of isolation suelin
velope
CatVidSocksPort 9056
knicklux
you don't want the tor-browser's stream to identify your bitmessage stream
_aeris_
this is also a problem of public bw stats available
if you use your relay for others things than just relaying, bw graph are publicly available for relay and so, you can be fingerprinted
suelin
what
give an example scenario
because I can't make sense of that
knicklux
A question: i only have port forwarding for ipv6. when i setup a relay what will work and what wont? would it be of greater benefit for the network if i set up an obfuscated bridge with v6 instead?
suelin
which may entirely be my fault I dunno
knicklux
i guess he's worried that by looking into the difference between traffic received and traffic sent one can find out when you're active without talking to your isp
suelin
did you get my last messages _aeris_
_aeris_
suelin > https://trac.torproject.org/projects/tor/ticket/8742
suelin
well I know that
up to the entry guard right
_aeris_
nope
suelin
oh for relays
_aeris_
all relays
if you use your relay for hidden service or socks proxy, your bw is fingerprintable
« prev 1 2 next »