LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-12-2014, 07:52 AM   #16
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600

Quote:
Originally Posted by Ulysses_ View Post
If only one site is visited per session and the live CD is rebooted between sessions, and the TOR IP is changed between sessions (done on the gateway), then is the profile unique, as built by a single site? Noise probably makes it more unique, cause no one else will be doing such random-looking browsing.
If you say so.


Quote:
Originally Posted by Ulysses_ View Post
We do not want to stop execution of trojans here, we want to execute them and survive them (ie keep anonymity).
Doesn't seem like the right approach to me.


Quote:
Originally Posted by Ulysses_ View Post
The routers see TOR traffic coming out of the gateway VM. What can a rigged router do about TOR packets passing to reveal my true IP to the site being visited or register me as interested in the site?
If it's part of a larger setup you won't know it could be sending data for analysis.


Quote:
Originally Posted by Ulysses_ View Post
How will a rigged live CD reveal my true IP if the gateway is rock solid openbsd (sources thoroughly reviewed with structured walkthroughs etc).
Phone home?


Quote:
Originally Posted by Ulysses_ View Post
Even a rigged vmware hypervisor cannot see my true IP if the gateway is not a VM
If you say so.
 
Old 01-12-2014, 08:57 AM   #17
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Quote:
The routers see TOR traffic coming out of the gateway VM. What can a rigged router do about TOR packets passing to reveal my true IP to the site being visited or register me as interested in the site?
If it's part of a larger setup you won't know it could be sending data for analysis.
OK, and the data would be timing of packets that is compared with the timing of packets at a monitored site?

If yes, then doesn't a big download from one site while you'll browsing another site remove the timing information at your end?

Quote:
Quote:
How will a rigged live CD reveal my true IP if the gateway is rock solid openbsd (sources thoroughly reviewed with structured walkthroughs etc).
Phone home?
Rigged live CD does not know my true IP, but if it phones home to tell what site I am visiting, this is proposed:
Quote:
the gateway can be set up to prompt you with

"Allow connection to 215.34.3.4 (somedomain.com)?"

every time you visit a site and if this is not the site you want, you say no.
Quote:
Originally Posted by Smokey_justme View Post
the weakest link is actually the browsers while being connected to the internet (think about a 0-day XSS exploit found in some weird combination of unclosed tags, or some 0-day header exploit).
How much harm can they do though in this setup? They do not know the true IP, they cannot phone home, what harm are they going to do in their short life span till the next reboot?

Last edited by Ulysses_; 01-12-2014 at 09:17 AM.
 
Old 01-12-2014, 11:58 AM   #18
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Quote:
Originally Posted by Ulysses_ View Post
There is a difference between insecurity because your knowledge is incomplete and insecurity because you know but do not bother. Let us concentrate on the issues we know of and can do something about.

Since TOR is clearly the weakest link, what else is available? How about ultra long chains of socks proxies (not http proxies), spanning as many hostile countries as possible?
VPNs in certain countries offer anonymity. The question is how much you trust them to do what they say they do. Then there's also the question of encryption. I won't even ask if the NSA can crack it, because it's a rhetorical question.

Personally, I would start by asking myself how much anonymity I need, and who my adversary is. If you know these, then you know what you need. 100% anonymity doesn't exist, and maybe it's a good thing. Can you get away with less, it's a roll of the dice. Carefully consider why you need it, how much you need, and who your adversary is.

If you're not doing anything the three letter agencies care about, then Tor should do fine. Either way, they have bigger fish to fry like I posted about the Silk Road.

Last edited by metaschima; 01-12-2014 at 12:02 PM.
 
Old 01-12-2014, 02:24 PM   #19
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
VPN potential honeypots better than international chains of socks proxy honeypots?

Last edited by Ulysses_; 01-12-2014 at 02:29 PM.
 
Old 01-14-2014, 03:31 PM   #20
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Quote:
Originally Posted by jessetaylor84 View Post
However, other adversaries (such as the NSA) will very likely be able to de-anonymize you in spite of using Tor.
Among the conclusions of the above, a promising one:

"Surprisingly, we observe that high diversity in destinations may actually result in improved security against a network adversary."

May be re-inventing the wheel here, but what if lots of scripts pretending to be firefox are made to browse a high diversity of destinations, for example retrieved from search engine results with search terms picked randomly from an offline dictionary over and over? With some country-specific searches too to diversify geographically?

In other words, one VM is your normal browsing VM, another is a bot with extremely diverse interests in many country domains. Both running under instances of the same live CD.

Any thoughts on this?

Last edited by Ulysses_; 01-14-2014 at 04:18 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
TorK weaknesses and risks pgonzamailcn Linux - Software 3 12-23-2009 10:17 PM
LXer: JavaFX preview highlights critical weaknesses LXer Syndicated Linux News 0 08-21-2008 09:41 PM
Does this motherboard have weaknesses? newbiesforever General 16 06-02-2008 02:47 PM
Language Strengths/Weaknesses dosnlinux Programming 9 05-05-2005 06:23 PM
known server-weaknesses at openoffice.org? ungua Linux - Software 2 10-03-2004 03:01 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:36 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration