LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 05-09-2016, 10:00 PM   #1
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Rep: Reputation: 57
Why aren't Certificate Authorities used for links between TOR nodes but they in OpenVPN?


Not sure about this, but TOR does not seem to use Certificate Authorities. However, OpenVPN does by default. Why don't they both avoid them to prevent MITM attacks between intermediate nodes?
 
Old 05-10-2016, 12:36 AM   #2
Michael Uplawski
Senior Member
 
Registered: Dec 2015
Posts: 1,622
Blog Entries: 40

Rep: Reputation: Disabled
This would add or demand for a sort of “continuity” which is neither sought, nor desirable in the tor network. It also asks for some identification process that would be counter-productive. Although I understand the question, the concepts of Certificate Authorities and Anonymity do, in some measure, contradict each other. A “structure” of just any kind is not the only way to organize things. Most anonymous networks, at least those which existed in the past, just appeared to work alright for a while. And that was all that was needed to render them useful.

It is (or should be) more like morality, culture.., stuff that exists before the structure becomes apparent.
Edit: Read this as “It should be understood as” (and also read the remainder of this thread)

Last edited by Michael Uplawski; 05-17-2016 at 12:34 AM. Reason: clarification
 
Old 05-10-2016, 08:54 AM   #3
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Rather than pondering how things should or should not be, is it true that TOR does not use certificate authorities? If so, how do nodes authenticate to each other?
 
Old 05-15-2016, 09:26 PM   #4
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Always remember that communications protocols are always spoken-of as being "in layers." ... And also, remember why.

If "two nodes need to 'authenticate with each other,'" then it logically stands to reason that they must assure that they can do so, whether the messages are ultimately passed by TOR, by TCP/IP, by Morse code, or by carrier pigeon. This fundamental concern must therefore "be dealt with first," i.e. "by a lower level of protocol."

The two parties, having thus dealt with their authentication requirements, must also be mindful of this impact upon "higher-level" concerns, such as anonymity. Authentication matters necessitate a reduced level of entropy in the message-stream, which cannot be fully concealed by TOR.
 
Old 05-16-2016, 04:19 AM   #5
Ulysses_
Senior Member
 
Registered: Jul 2009
Posts: 1,303

Original Poster
Rep: Reputation: 57
Does the answer have something to with tor being for anonymity whereas openvpn is for privacy?
 
Old 05-16-2016, 06:46 AM   #6
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
Quote:
Originally Posted by Ulysses_ View Post
Does the answer have something to with tor being for anonymity whereas openvpn is for privacy?
Yes, indeed. But TOR is also very much for redundancy. As with TCP/IP itself, "it's important that the message gets through, somehow." But in the case of TOR (at least as originally envisioned by the Department of Defense et al), the message has to transit a network that might be hostile to both message and messenger.

TOR assumes that, if the owners of the intermediate networks could discover even that "a message is being passed," they would move to block it or to tamper with it. They might well succeed in blocking some of the message paths.

The "onion" algorithm is very similar, in that regard, to the routing that is used by the Internet itself. Remember that all of this Internet stuff grew from MILNET, which was specifically designed to withstand an atomic holocaust. ("The command to shoot our nuclear doomsday back at them must get through, so that future space-aliens visiting our now-radioactive, lifeless Planet can conclude that we were, indeed, "MAD = Mutually-Assured Destruction.")

- - - - -

It should also be clearly understood, by anyone who might be so foolish as to try to use TOR to commit a crime, that TOR doesn't work too well when you presume that the network in question can be subjected to "total traffic surveillance," especially at its various pinch-points. Which agencies such as CIA, MI5, KGB and so-on can do. (This capability is a fundamental part of their mission, and they can do it, as well as ##CLASSIFIED##. But if you're committing crime, you've established yourself as a despicable cretin, anyway. )

Last edited by sundialsvcs; 05-17-2016 at 09:33 AM.
 
1 members found this post helpful.
Old 05-17-2016, 12:34 AM   #7
Michael Uplawski
Senior Member
 
Registered: Dec 2015
Posts: 1,622
Blog Entries: 40

Rep: Reputation: Disabled
I added a clarification to my post, above. And Thank you Sundialsvcs.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Tor exit nodes face unusual activity, is Tor being raided or under hack attack? LXer Syndicated Linux News 0 12-23-2014 12:03 AM
LXer: Shutting Illegal Websites, Authorities Say They Pierced Tor Anonymity LXer Syndicated Linux News 1 11-07-2014 06:46 PM
LXer: How Google's tiff with certificate authorities can impact you LXer Syndicated Linux News 0 09-11-2014 11:03 PM
Looking For Comments (Tor Nodes) nomb Linux - Security 5 10-19-2007 05:01 PM
Tor select fastest nodes chup Linux - Software 6 06-09-2007 01:05 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:55 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration