Bitcoin Forum
April 27, 2024, 12:46:37 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How to locate a Tor Hidden Service ?  (Read 1109 times)
BitcoinFX (OP)
Legendary
*
Offline Offline

Activity: 2646
Merit: 1720


https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF


View Profile WWW
December 22, 2014, 09:58:14 PM
Last edit: December 23, 2014, 01:55:04 PM by BitcoinFX
 #1

As a Tor user and Tor Rely operator for a number of years now I have decided to make this post. I think both anonymity and privacy on the internet is increasingly important in today's world. I personally do not conduct any 'illegal' activities when using the Tor network. I make this open post to help ensure the future security of all Tor users.

Tor Hidden Services are just that i.e. 'hidden' and thus they are not totally invisible or anonymous.

- http://www.bbc.co.uk/news/technology-29987373

- https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous

Browsing via Tor does provide improved privacy, security and anonymity for most internet users and further protects against traffic analysis, in the main.

This is not a software bug report. This is out-of-the-box reverse engineering, of sorts...

"How did they locate the hidden services?

So we are left asking "How did they locate the hidden services?". We don't know.   Shocked  In liberal democracies, we should expect that when the time comes to prosecute some of the seventeen people who have been arrested, the police would have to explain to the judge how the suspects came to be suspects, and that as a side benefit of the operation of justice, Tor could learn if there are security flaws in hidden services or other critical internet-facing services. We know through recent leaks that the US DEA and others have constructed a system of organized and sanctioned perjury which they refer to as "parallel construction."

Unfortunately, the authorities did not specify how they managed to locate the hidden services. Here are some plausible scenarios:

... Operational Security ... SQL injections ... Bitcoin deanonymization ... Attacks on the Tor network ... "


 
~ It is already known that a Tor Hidden Service provides better anonymity for users over Hidden Service operators. Tor developers have made this very clear in the existing website documentation.

1. Always Read the Manual - https://www.torproject.org/docs/tor-manual.html

" StrictNodes 0|1

    If StrictNodes is set to 1, Tor will treat the ExcludeNodes option as a requirement to follow for all the circuits you generate, even if doing so will break functionality for you. If StrictNodes is set to 0, Tor will still try to avoid nodes in the ExcludeNodes list, but it will err on the side of avoiding unexpected errors. Specifically, StrictNodes 0 tells Tor that it is okay to use an excluded node when it is necessary to perform relay reachability self-tests, connect to a hidden service, provide a hidden service to a client, fulfill a .exit request, upload directory information, or download directory information. (Default: 0)

"ExcludeNodes node,node,…

    A list of identity fingerprints, nicknames, country codes and address patterns of nodes to avoid when building a circuit. (Example: ExcludeNodes SlowServer, ABCD1234CDEF5678ABCD1234CDEF5678ABCD1234, {cc}, 255.254.0.0/8)

    By default, this option is treated as a preference that Tor is allowed to override in order to keep working. For example, if you try to connect to a hidden service, but you have excluded all of the hidden service’s introduction points, Tor will connect to one of them anyway. If you do not want this behavior, set the StrictNodes option (documented below).

    Note also that if you are a relay, this (and the other node selection options below) only affects your own circuits that Tor builds for you. Clients can still build circuits through you to any node. Controllers can tell Tor to build circuits through any node.

    Country codes are case-insensitive. The code "{??}" refers to nodes whose country can’t be identified. No country code, including {??}, works if no GeoIPFile can be loaded. See also the GeoIPExcludeUnknown option below."


2. Thinking outside the box.

With basic text edits to the Torrc .config file and using a process of elimination we can commence with a search for the most likely Geo location of a Tor Hidden Service.

Listing routers by country code via http://torstatus.blutmagie.de/ or another mirror presents data for the majority of Relays and Exits.

So, lets imagine that a .onion address might be physically hosted in say the US. First we try to connect to a hidden service to check its currently 'live'. If so, we exit Tor and edit the config with StrictNodes 1 and ExcludeNodes {us} then re-start Tor and try to browse to the hidden service once more and if it is now inaccessible then we might assume, with up to 99% accuracy (against MaxMind GeoIP) that the 'Hidden Service' is potentially hosted (or at the very least that its current Guard Server is routed) within the US.

If not, then we keep trying blocks of GeoIP country codes in descending order until a likely country match is found. Of course the actual percentage accuracy is less when including satellite, A1, unknown IP addresses and potential spoofing or Geo-rotational IP's that advanced Hidden Services might utilize.

Obviously this method cannot be considered 100% accurate, although when combined with other Tor network stats. and/or chronological data it is a potential method to commence with unmasking the location of a Hidden Service or attempting to monitor its users:

- What is the first know publication of the .onion address ?

- Was a new Relay created around that time and does this match the likely GeoIP location ?

- Does all or part of the Hidden Service code / software only run on linux or windows etc. ?

- What Relays probably don't host this hidden service ? Etc., etc.,

...

~ I could post a lot more with regards to this possible 'attack vector' for Tor Hidden Services. Its not really necessary to do so. In less than 30 bootstrap attempts to the Tor network using a regular home PC and some networking tools you can quite easily determine the most likely Geo location of a Tor Hidden service with a fairly high degree of accuracy. Combining this information with other already known and more sophisticated 'attack vectors' perhaps gives you something towards a "parallel construction" ... Well, in terms of networking anyway.

Always RTM.
 
EDIT: The obvious question is if StrictNodes are really strictly necessary as a hard coded Tor function ?
 

"Bitcoin OG" 1JXFXUBGs2ZtEDAQMdZ3tkCKo38nT2XSEp | Bitcoin logo™ Enforcer? | Bitcoin is BTC | CSW is NOT Satoshi Nakamoto | I Mine BTC, LTC, ZEC, XMR and GAP | BTC on Tor addnodes Project | Media enquiries : Wu Ming | Enjoy The Money Machine | "You cannot compete with Open Source" and "Cryptography != Banana" | BSV and BCH are COUNTERFEIT.
Even if you use Bitcoin through Tor, the way transactions are handled by the network makes anonymity difficult to achieve. Do not expect your transactions to be anonymous unless you really know what you're doing.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714221997
Hero Member
*
Offline Offline

Posts: 1714221997

View Profile Personal Message (Offline)

Ignore
1714221997
Reply with quote  #2

1714221997
Report to moderator
BitcoinFX (OP)
Legendary
*
Offline Offline

Activity: 2646
Merit: 1720


https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF


View Profile WWW
January 09, 2015, 11:09:28 PM
 #2

Additional : Optional avoid servers list for ExcludeNodes :

Herewith, a 'block' of Tor nodes linked to an academic institution.

Also see: https://bitcointalk.org/index.php?topic=331077.msg8328447#msg8328447

and https://bitcointalk.org/index.php?topic=331077.msg8327557#msg8327557

UK nodes :

mighty1,81.150.197.163
mighty2,mighty3,81.150.197.165
mighty4,mighty5,81.150.197.166
mighty6,mighty7,81.150.197.167
mighty8,mighty9,81.150.197.168
mighty10,mighty11,81.150.197.170
mighty12,mighty13,81.150.197.171
mighty14,mighty15,81.150.197.172
mighty16,mighty17,81.150.197.173
mighty18,mighty19,81.150.197.174

Code:
mighty1,81.150.197.163,mighty2,mighty3,81.150.197.165,mighty4,mighty5,81.150.197.166,mighty6,mighty7,81.150.197.167,mighty8,mighty9,81.150.197.168,mighty10,mighty11,81.150.197.170,mighty12,mighty13,81.150.197.171,mighty14,mighty15,81.150.197.172,mighty16,mighty17,81.150.197.173,mighty18,mighty19,81.150.197.174

FR node :

southsea0,37.187.247.150

Code:
southsea0,37.187.247.150


Aside from the reasons already given in my other posts as to why the majority of Tor users might want to avoid Tor servers run by educational establishments and academic institutions...

All of the above are currently Tor Entry servers (non-Exit). The main 'mighty' block of servers have all been running for 107 days approx. (at the time of writing this post), so were started / installed at the same time. They are all utilizing almost 0 bandwidth availability. They are all running Tor 0.2.4.20 (as are many Tor servers) - which is an old version of Tor now known to have a security vulnerability.

Furthermore, all of these nodes have the same admin. / contact info. which can be found via http://torstatus.blutmagie.de/ The provided admin. contact is for a senior lecturer in computing, security and cryptography at a UK academic institution - yet these Tor servers have not set a list of fingerprints as advised for such a large set of Tor routers. RTM !?

See: https://www.torproject.org/docs/tor-manual.html.en

" NodeFamily node,node,…

    The Tor servers, defined by their identity fingerprints or nicknames, constitute a "family" of similar or co-administered servers, so never use any two of them in the same circuit. Defining a NodeFamily is only needed when a server doesn’t list the family itself (with MyFamily). This option can be used multiple times. In addition to nodes, you can also list IP address and ranges and country codes in {curly braces}. "


and

"MyFamily node,node,…

    Declare that this Tor server is controlled or administered by a group or organization identical or similar to that of the other servers, defined by their identity fingerprints or nicknames. When two servers both declare that they are in the same 'family', Tor clients will not use them in the same circuit. (Each server only needs to list the other servers in its family; it doesn’t need to list itself, but it won’t hurt.) Do not list any bridge relay as it would compromise its concealment.
    When listing a node, it’s better to list it by fingerprint than by nickname: fingerprints are more reliable."


How many Tor servers should one individual or entity operate, from the perspective of privacy and security, without even setting the torrc NodeFamily or MyFamily options ? Perhaps not this many.

You might also like to take a look at the administrators .me website - which you can research easily.

  Roll Eyes


Erm... BAZINGA ?!?

- https://www.youtube.com/watch?v=oZdeRmlj8Gw - Tor: Hidden Services and Deanonymisation [31c3]

"no one noticed..."  Cheesy  Roll Eyes

N.B. These Tor Relays no longer appear to be part of the Tor network.

Thanks for that !

"Bitcoin OG" 1JXFXUBGs2ZtEDAQMdZ3tkCKo38nT2XSEp | Bitcoin logo™ Enforcer? | Bitcoin is BTC | CSW is NOT Satoshi Nakamoto | I Mine BTC, LTC, ZEC, XMR and GAP | BTC on Tor addnodes Project | Media enquiries : Wu Ming | Enjoy The Money Machine | "You cannot compete with Open Source" and "Cryptography != Banana" | BSV and BCH are COUNTERFEIT.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!