Tor安全性分析 - V2EX
ISSAY

Tor安全性分析

  •  
  •   ISSAY Apr 29, 2012 5997 views
    This topic created in 5131 days ago, the information mentioned may be changed or developed.
    报告还没交,先总结一下:
    1。作为匿名通信网络,tor有先天的不足,exit node能得到明文。如果他能嗅探到你的账户和密码,你是谁或在哪里或许就不是一个令人感兴趣的问题了。
    2。低延时的网络先天无法抵御timing analysis,如果网络中有大量恶意节点,hidden server位置(IP)可以通过timing analysis attack ,predecessor attack 或者distance attack在短时间内获得。
    3。entry guard node的位置同样会被这种方法得到,意味着随机选择entry guard的策略不够安全保护匿名。
    4。有方法基于观察clock clew来得到hidden server的IP,目前没有好的办法抵御这种攻击。
    5。以上方法结合Javascript等等plugin和恶意路由和网站可以定位client的位置。有时torbutton也会加速这种攻击。
    6。至于嗅探就不说了,近三千个路由器有多少是恶意节点,我不知道,不过从一些观察来看,比例是比较大的。


    参考:

    verlier, L., and Syverson, P. Locating Hidden Servers.

    Murdoch, S. J. Hot or not: Revealing hidden services by their clock skew.

    Lasse verlier1,2 and Paul Syverson3,Valet Services: Improving Hidden Servers with a Personal Touch.

    Tim Abbott, Katherine Lai, Michael Lieberman, Eric Price:Browser-Based Attacks on Tor

    http://www.teamfurry.com/wordpress/
    5 replies    1970-01-01 08:00:00 +08:00
    corwyn
        1
    corwyn  
       Apr 29, 2012
    Tor不是最安全的FQ工具么
    ISSAY
        2
    ISSAY  
    OP
       Apr 29, 2012
    @ corwyn 不是吧
    9hills
        3
    9hills  
       Apr 29, 2012
    天朝把Tor节点都给封光了。。
    eric_q
        4
    eric_q  
       Apr 29, 2012
    见过BUPT学长写过的硕士论文。就写的Tor的漏洞分析
    ISSAY
        5
    ISSAY  
    OP
       Apr 29, 2012
    呵呵 我看到有期刊论文讨论这个
    About     Help     Advertise     Blog     API     FAQ     Solana     892 Online   Highest 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 39ms UTC 22:21 PVG 06:21 LAX 15:21 JFK 18:21
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86