LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-04-2016, 10:53 AM   #1
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Rep: Reputation: 57
Under TOR, is there any danger typing wget to random IPs to confuse site fingerprinting?


Site traffic after a TOR exit node can be statistically compared with traffic at an entry node in order to break anonymity. Then the first defense that comes to mind is to visit thousands of sites automatically.

What can go wrong when a wget bot is released on lots of random IP's?

If it hits illegal sites, do I have any responsibility? Do search engines have any responsibility?
 
Old 01-04-2016, 11:36 AM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Well, don't forget that "doing that is immediately suspicious." You are generating an uncommonly large number of uncommonly diverse requests. In any sort of traffic analysis, that would stand out like a sore thumb.
 
Old 01-04-2016, 11:40 AM   #3
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Wouldn't that be indistinguishable from other people watching videos on youtube or downloading torrents?
 
Old 01-04-2016, 12:33 PM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
It would have a different "fingerprint" of request timing, I think. Just as WW2 monitoring stations could identify the "fist" of a particular Morse code operator, the pattern and timing of requests generated by videos, downloads, and ordinary web surfing would be distinctive. Whereas a smoke-screen being put up by a "bot" would be different.

Now, this might not initially attract the attention of the sleeping dragon, but if it woke-up and started paying attention to you, it would certainly notice that the traffic followed an unusual pattern.
 
Old 01-04-2016, 01:09 PM   #5
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Here's what I think happens.
All TOR users are having their traffic logged using software force-installed by the authorities.
Selected sites are fingerprinted how they respond to a visit by the spy, what traffic patterns they create on the visitor's side.
User traffic is pattern-matched against the fingerprints of all selected sites, and given a score of match against each site.
A user's score will be low for all sites if they visit lots of sites simultaneously.

The adversary need not watch any exit nodes to do the above. But if an exit node is being watched, then chances are it will include the traffic from several users, therefore it is a much longer shot to detect the user visiting hundreds of sites.

Last edited by Ulysses_; 01-04-2016 at 05:18 PM.
 
Old 01-04-2016, 01:57 PM   #6
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,624

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
if you are not using the tor-bundle you have BIGGER issues
your browser(/OperatingSystem/fonts/cookies/plugins) "fingerprint"

this is normally a 1 in a few million chance it is NOT you

it is so accurate that only a few other people in the world will match


or
if you ARE using the bundle and DID NOT !!!! disable "javascript" -- YES!!! it is ON by default !!!!
this can be used to TRACK YOU!!!! by pinging in the "clearnet" a fbi server
 
Old 01-04-2016, 02:04 PM   #7
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Sure, was going to use tails or whonix actually. But only when convinced that TOR works.
 
Old 01-04-2016, 03:08 PM   #8
Steven_G
Member
 
Registered: Dec 2015
Location: Western US
Distribution: Home spun
Posts: 142

Rep: Reputation: 67
I haven't played with Tor in several years. It was obvious to me long before CM cracked it that there were / are a lot of major issues with it.

Here is my strategy for dealing with those issues, for good or ill. (Other sec minded folks please pick this apart if you find holes.)

This strategy combines both tech and real world techniques.

1) Create an obfuscated identity. And I'm not talking about ID theft. Google it. There's a lot to it. Personally, my first step was to purchase, with cash, a reloadable card at a wally world 1500 miles from my home while visiting my sister-in-law then jumping through a couple of dozen hoops to create a hard (but not impossible) to follow money trail.

(Note this step has been rendered irrelevant by the advent of bitcoin. Unless you want to be ultra, completely knackers beyond clinically paranoid and use that ID to set up BC.)

2) Use the obfuscated ID to pay for hosting a vt VPN instance in a country w/ much stronger privacy laws than the US. (If you already live in one of those then still put your VPN in another country for legal reasons.) Build the VPN appliance yourself so that you actually know what's in it. And wrap the connection in an SSL tunnel so that to your ISP it just looks like you're logging in to a web site inside the hosted IP block.

3) Connect to the VPN before connecting to Tor. If they trace you back to that IP they have to go through both legal and technical hurdles to get the info on your obfuscated identity and then go through whatever hurdles you laid out there before they actually find you. And of course, using basic Tor sec as has already been mentioned.

4) To speed up your Tor connection follow a tut like this one. It's been years since I've dinked with this and I can't find the exact tut I used. But the idea was similar.

5) Then to make it harder to track me back from the destination to Tor I used multiple random pathway chained proxys that chained 8 random proxies after each of the 8 exit nodes. (It was relatively fast, all things considered. Even with the chains it was faster than exiting a single node.)

Tada!

It wasn't completely unbustable. Nothing is. But it was the most secure scenario I could come up with. (Any body see any gaping holes that I should be spanked for?)

Of course with the advent of IPv5 exploits all of that may be completely superfluous now. But I can't say for sure yet. I only found out they even existed a few days ago.

--------

EDIT:

Like I said, I haven't played with this in a while, I forgot a step above.

Before connecting to the VPN connect to proxy in a randomized pool; preferably never the same one twice and the most secure with the least logging you can find and never transparent ones. That way if they track you back to your VPN the logs from the host won't show your IP and they'll have to go through legal / investigatory measures to crack your obfuscated identity.

And, of course, if you ever drop your shields, even once, you're busted. That's how they got Sabu.

Last edited by Steven_G; 01-04-2016 at 03:47 PM.
 
Old 01-04-2016, 04:55 PM   #9
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Of course with the advent of IPv5 exploits all of that may be completely superfluous now.
What is that about? Any link?
 
Old 01-04-2016, 06:29 PM   #10
Steven_G
Member
 
Registered: Dec 2015
Location: Western US
Distribution: Home spun
Posts: 142

Rep: Reputation: 67
I haven't gone through any of this yet. I need to fire up a pot of coffee and start reading.

http://www.zdnet.com/article/researc...-interception/

https://events.ccc.de/congress/2013/...ents/5304.html

http://phenoelit.org/stuff/CSLI.pdf
 
Old 01-05-2016, 12:32 PM   #11
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
What might be a specialized forum for the sort of issues you are trying to address with all this elaborate scheme?

I'd probably be like a sheep among wolves there. Discussing what we'd have for dinner.
 
Old 01-05-2016, 01:49 PM   #12
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
[Apologies, wrong post, made a new thread for it.]

Last edited by Ulysses_; 01-05-2016 at 03:35 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
iptables + postfix = random 5 IPS opencag Linux - Server 9 07-19-2015 04:04 PM
Adding your own IPs to socksify/torify Tor list? SentralOrigin Linux - Software 1 03-28-2008 06:05 PM
Synaptics / touch pad typing with random cursor jumps --solution 1kyle SUSE / openSUSE 0 03-25-2008 06:54 AM
Danger, Danger, Danger. Dead Rat Killed My Slack vdemuth General 2 07-12-2004 03:54 PM
Ping Random IPs using a tcsh script.. zeppelin Programming 7 08-07-2003 11:07 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:38 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration