LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-23-2011, 03:04 PM   #16
Coresay
LQ Newbie
 
Registered: Apr 2011
Distribution: CentOS
Posts: 8

Original Poster
Rep: Reputation: 13

Quote:
Originally Posted by win32sux View Post
The HTTPS URL is transmitted within the SSL connection, so it's not visible. What is visible to the bad guys is the domain name and port you're using. Also, keep in mind that any hiding Tor may do only applies within the Tor network. That is, the Tor exit node you're using will still have the same access any other non-Tor node would have. In the case of HTTPS, it'll mean domain/port... and in HTTP, well, everything.
I once met a BlackHat guy and he said that they regularly connect to the Tor network to spy on traffic. Hopefully a bunch of those folks cannot collude to identify the original HTTPS requester by tracing backwards.

Anyway, I took Medievalist's server-side arg to mean that the more sites that use SSL for all of their connections, even to pass unimportant and trivial information, the more likely it is that an attacker randomly fishing for a connection passing sensitive data will, if successfully cracked, only discover that someone is browsing, say, a bank's product offerings or contact information rather than an account holders actual account info. It just increases the workload. This is from the perspective of an attacker not attacking a specific client, but sniffing all traffic destined for the host.
 
Old 04-23-2011, 03:10 PM   #17
lupusarcanus
Senior Member
 
Registered: Mar 2009
Location: USA
Distribution: Arch
Posts: 1,022
Blog Entries: 19

Rep: Reputation: 146Reputation: 146
I personally prefer using HTTPS over HTTP.
 
Old 04-26-2011, 09:41 AM   #18
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
Quote:
Originally Posted by Coresay View Post
I once met a BlackHat guy and he said that they regularly connect to the Tor network to spy on traffic. Hopefully a bunch of those folks cannot collude to identify the original HTTPS requester by tracing backwards.
You can spy on the traffic in a TOR node if you are an exit point. Basically how it works is that all servers are only suppose to know about the previous hop and the next hop, and the traffic from one server to the next is encrypted. However, the exit nodes see all the traffic un-encrypted so yes it is possible to monitor the traffic through them.

What will also get you is any non TCP traffic since TOR by default only works with TCP. For example if you try and nmap scanme.insecure.org through TOR, only the TCP scans will be routed through it. Other things such as the DNS request for scanme.insecure.org will still go out your regular connection.

nomb
 
Old 04-26-2011, 10:08 AM   #19
orgcandman
Member
 
Registered: May 2002
Location: new hampshire
Distribution: Fedora, RHEL
Posts: 600

Rep: Reputation: 110Reputation: 110
Quote:
Originally Posted by nomb View Post
You can spy on the traffic in a TOR node if you are an exit point. Basically how it works is that all servers are only suppose to know about the previous hop and the next hop, and the traffic from one server to the next is encrypted. However, the exit nodes see all the traffic un-encrypted so yes it is possible to monitor the traffic through them.
Not only that, but there are many people who serve exit nodes and run sslstrip/ssh renegotiation proxies to try and remove/reduce encryption.

Quote:
Originally Posted by nomb View Post
What will also get you is any non TCP traffic since TOR by default only works with TCP. For example if you try and nmap scanme.insecure.org through TOR, only the TCP scans will be routed through it. Other things such as the DNS request for scanme.insecure.org will still go out your regular connection.
This is only true if you only route your tcp traffic through. There is a torify/usewithtor utility for a reason.
 
Old 04-26-2011, 11:13 AM   #20
nomb
Member
 
Registered: Jan 2006
Distribution: Debian Testing
Posts: 675

Rep: Reputation: 58
Quote:
Originally Posted by orgcandman View Post
Not only that, but there are many people who serve exit nodes and run sslstrip/ssh renegotiation proxies to try and remove/reduce encryption.
Correct as I stated the exit nodes see the regular traffic and can use normal web attacks on it.

Quote:
Originally Posted by orgcandman View Post
This is only true if you only route your tcp traffic through. There is a torify/usewithtor utility for a reason.
Correct which is why I said by default. There were no reasons to go into which programs can get around the limitations so I intentionally left that out. One because it isn't relevant, and two because I didn't want to get the thread off topic. I originally brought it up in my first response just so the person knew there was a lot more to it; but lets stay on the topic of SSL.

nomb

Last edited by nomb; 04-26-2011 at 11:15 AM.
 
Old 04-27-2011, 08:42 AM   #21
Medievalist
Member
 
Registered: Aug 2003
Distribution: Dead Rat
Posts: 191

Rep: Reputation: 56
Sorry I was gone so long...

Quote:
Anyway, I took Medievalist's server-side arg to mean that the more sites that use SSL for all of their connections, even to pass unimportant and trivial information, the more likely it is that an attacker randomly fishing for a connection passing sensitive data will, if successfully cracked, only discover that someone is browsing, say, a bank's product offerings or contact information rather than an account holders actual account info. It just increases the workload. This is from the perspective of an attacker not attacking a specific client, but sniffing all traffic destined for the host.
Yes, that's exactly what I meant. In general, the more SSL/TLS is on the wire, the less each individual stream stands out.

Periodically SSL gets cracked, and we update or patch the software to prevent problems. But there's a period between the time a crack is discovered and the time that it is patched on all systems using the Internet. If we all use SSL all the time, even for unimportant connections, we make it harder for bad guys to find the important ones, which makes it less profitable to be a bad guy.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
ubuntu 9.10 apache2 multiple SSL sites eteck Linux - Networking 4 01-12-2010 12:31 AM
Squid SSL sites not working linuxgurusa Linux - Server 5 10-02-2009 08:48 AM
Can't access ssl sites via squid linuxgurusa Linux - Server 4 09-30-2008 08:17 AM
need help with apach virtual hosts ssl/non ssl sites danthach Linux - Networking 3 05-25-2006 06:40 AM
How to have SSL on two different pages/sites? Manuel-H Linux - General 1 08-05-2003 08:53 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration