Delivery-Date: Sun, 21 Feb 2016 04:48:57 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1630F1E03C4;
	Sun, 21 Feb 2016 04:48:56 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9DFA9397AE;
	Sun, 21 Feb 2016 09:48:50 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 4BCB5397BC
 for <tor-talk@lists.torproject.org>; Sun, 21 Feb 2016 09:48:47 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id iEfXBD8z46b6 for <tor-talk@lists.torproject.org>;
 Sun, 21 Feb 2016 09:48:47 +0000 (UTC)
Received: from smtp25.openmailbox.org (smtp25.openmailbox.org [62.4.1.59])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 1FB2039717
 for <tor-talk@lists.torproject.org>; Sun, 21 Feb 2016 09:48:47 +0000 (UTC)
Received: by mail2.openmailbox.org (Postfix, from userid 1002)
 id 6D5757C299A; Sun, 21 Feb 2016 10:48:42 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1456048122;
 bh=tOXcWUTSFkq0A4MdGmpJbTBavUI+Vdbd88fU+EPDn/g=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=vFt4v1MC45DgbRlqsLZXv+zUwVrnbozU6YAt/Hj5dCZpFsmp6t5H79hu73jK3v1U8
 LLoVLXYZoqWfWvI+MyUkuXc8zvbEM5Xt0lNBmJ+9sl6A45QtlQYe67P1L8Yo1Yj2xe
 Py5FzMk/K+lJkF5FAhM7NcXKUbqE86BAOjQHMZxI=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=openmailbox.org;
 s=openmailbox; t=1456048112;
 bh=tOXcWUTSFkq0A4MdGmpJbTBavUI+Vdbd88fU+EPDn/g=;
 h=Subject:To:References:From:Date:In-Reply-To:From;
 b=Vs0df1jIWG+kHF5UnTRNWi6tPZgWFnPNBEnRbSvXh4MeYjCHZjhnuTo+kxAPvs6MK
 OhzhjzboRhlq+C/JU7b8Fk2ZFi0gMrpJPE8Dpg31aKE8aeLBtxd7kJdDFZoqe5eBwX
 I+zHnv/KfjH6V0b4whHOqa06cKyRTNC2fxZYVCKs=
To: tor-talk@lists.torproject.org
References: <mailman.239.1455936375.3047.tor-talk@lists.torproject.org>
 <20160219214406.0000130f@kmacpher.us> <56C800F2.9020108@gmail.com>
 <0968d98d629bf8ad78497f5719e51c3b@cannon-ciota.info>
 <20160221003840.GC10235@moria.seul.org>
 <CADL2u4joDoQebmy5hZVt2b7N=3YT8Jpv8cJ8pcRM6sKWqopzEQ@mail.gmail.com>
From: nusenu <nusenu@openmailbox.org>
X-Enigmail-Draft-Status: N1110
Message-ID: <56C987E4.2020500@openmailbox.org>
Date: Sun, 21 Feb 2016 09:48:20 +0000
MIME-Version: 1.0
In-Reply-To: <CADL2u4joDoQebmy5hZVt2b7N=3YT8Jpv8cJ8pcRM6sKWqopzEQ@mail.gmail.com>
Subject: Re: [tor-talk] Large spike in .onion addresses - port scan?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============6911558513168194690=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6911558513168194690==
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="74xqtxB9RHQFeFjr0QV7H3RWAFBb4u5rb"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--74xqtxB9RHQFeFjr0QV7H3RWAFBb4u5rb
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable



Ren=C3=A9 Ladan:
> Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <arma@mit.edu>:
>>
>> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote=
:
>>> With the large sudden spike in hidden services addresses, any way to
>>> view what the newly registered .onion addresses are or at least a
>>> list of hidden services during the suspected time frame?
>>
>> No, there is no easy way to do this. That's because there is no centra=
l
>> repository of onion addresses. There are services like Ahmia that try =
to
>> enumerate what they can, by looking at various sources like the conten=
t
>> on a set of known onion sites. But that only lets you learn about site=
s
>> that wanted to let you find out about them.
>>
>> This is actually a really complicated topic, because there are a wide
>> variety of ways of learning about onion addresses, each of which has
>> its own ethical questions around how invasive you have to be. For
>> example, you can get them by Googling for .onion addresses (probably
>> fine), or by being Verizon or Comcast and spying on the people who
>> use your DNS servers (not so fine), or by running Tor relays and spyin=
g
>> on the hidden service descriptors that people upload (not fine).
>>
> Another service is http://tor.luakt.net , which managed to find my
> otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does li=
sten
> on port 80 though.

LuaKT very likely runs a modified version of tor with additional logging
[1]. Until recently, the code was hosted on github.

Since I expected that this modified tor version will disappear from
github I made a copy of it while it was still there.


http://article.gmane.org/gmane.network.onion-routing.ornetradar/937
http://article.gmane.org/gmane.network.onion-routing.ornetradar/945




[1]
https://lists.torproject.org/pipermail/tor-relays/2016-January/008647.htm=
l


--74xqtxB9RHQFeFjr0QV7H3RWAFBb4u5rb
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJWyYfrAAoJEFv7XvVCELh0pDEP/3XM7q1ayqdRnqCP+IdI7O0W
0swnfNmoo3ymoPif0WpRgOloeA354Xz9iDYyqZHJ4pRVcOkjYSoiio4QYyR7Xnhh
BFVK4ejOmRSft+rIyl/7aYGJ6PflyekJC72voQy50U5rDpBUOy71HtkmUr8L/7Oc
E5Jz8Lj102/jMhN9IoT3r/HfXzeWA9NXkkUYrLAxiVZU5pkiERPEQimskeGSwLf0
eOxx+47J5ghEHjJGlVtfE0/fQKks/5OG5xsOu+qD2qqrqWQlpmhalKMsEIwqA4vS
eyG+l8QNz/nwBiRUqLkHIQp7TcUprawYhq6EGqzyV7oAgDKDpOc8ru9SKUCDn7rv
4m8qN6O1F8nryx61qDBYbPT6Z/hKoy9j2+1IlKR1wSdWS+FrQqASp8T0lXyQJMFD
OX10KfWf4WskWQFtSrE0UdJV158I3X0MZ5/P4CEX+ARlIUYVNdnyB2B4JozH1uWA
1IcXX+/mUKdC0KFwGuyXoIQVdHGdZr6a0pv6BFJx7sM+v0VzUiUJR5i62Uvg6OUp
2ah7GA4GjJB621TYtQkNObm8fsZHS4umFxJklT9DWnzTs/24ogjwXiLvck+kKZTS
Fx14KGq4d2/6e6kTaNoCEZYhJa465WTPat3AuS3IfrxnmGJ4IqabK0SwrLUl7roc
g1iKjrapsjWssKCxi1HH
=Eyno
-----END PGP SIGNATURE-----

--74xqtxB9RHQFeFjr0QV7H3RWAFBb4u5rb--

--===============6911558513168194690==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============6911558513168194690==--

