Delivery-Date: Thu, 26 Jun 2014 12:27:40 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 454141E0AF1
	for <archiver@seul.org>; Thu, 26 Jun 2014 12:27:39 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 22AF22F1BF;
	Thu, 26 Jun 2014 16:27:23 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id F11332EEA1
 for <tor-talk@lists.torproject.org>; Thu, 26 Jun 2014 16:25:49 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id jXUXIZlU3BE8 for <tor-talk@lists.torproject.org>;
 Thu, 26 Jun 2014 16:25:49 +0000 (UTC)
Received: from mail-qg0-x235.google.com (mail-qg0-x235.google.com
 [IPv6:2607:f8b0:400d:c04::235])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id CD1442EDF8
 for <tor-talk@lists.torproject.org>; Thu, 26 Jun 2014 16:25:49 +0000 (UTC)
Received: by mail-qg0-f53.google.com with SMTP id i50so3225870qgf.40
 for <tor-talk@lists.torproject.org>; Thu, 26 Jun 2014 09:25:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type:content-transfer-encoding;
 bh=8G+/Dl2wxxTeqDVVEq7OTo9WZZZECwrKkuyuGGFleVE=;
 b=OTUoxYv4MtAbnWD2puo2HrNZIRNcZHnfAVJUJ8+VGOgprvIbMF6g4lNIPAjMFT7bRy
 tKmKV/imlEnQ71XUyzJRG1g8xyhgWG0+0bXuNqPTHvu3NjnCo+DC7Hp4AP34aezRa+lb
 eWrbacAgJQjsFWT8o3mYQcJfHt1NT3X/K3a+k1pQiTplqodTzPXr6kVEt9ReWuRxK/3S
 8oeRKJA4FMXOU+cHBYgwgPGK+VvaHtij5DmvEdXtf5Zbg1jXd7lgl5R9CZUPESWAsvKN
 w5ZD+oVDVvT7dYXrQ4+WUwBb1FGzFSmp2M0Raswah/pNty1R8pwLMHYbj7R4k2VJurmB
 h28Q==
MIME-Version: 1.0
X-Received: by 10.224.137.9 with SMTP id u9mr13434358qat.24.1403799947378;
 Thu, 26 Jun 2014 09:25:47 -0700 (PDT)
Received: by 10.96.179.232 with HTTP; Thu, 26 Jun 2014 09:25:47 -0700 (PDT)
In-Reply-To: <C21E9389-F7C9-47E7-B475-A3D23C8C4F14@hidemeta.com>
References: <DUB121-W32E5B8525EB5756FB0DD73C8190@phx.gbl>
 <53AB3C75.4020105@gmx.com>
 <DUB121-W401DDF2EB0B4F36357ADA2C8190@phx.gbl>
 <53AB742E.5000400@riseup.net>
 <DUB121-W1602424B2673FF14097129C8180@phx.gbl>
 <53ABAAFA.1040406@riseup.net>
 <C21E9389-F7C9-47E7-B475-A3D23C8C4F14@hidemeta.com>
Date: Thu, 26 Jun 2014 09:25:47 -0700
Message-ID: <CAJVRA1TnfcoabMcqmjvna1awfvsTuMreTzO0fiDNJ8Ge9JMNBg@mail.gmail.com>
From: coderman <coderman@gmail.com>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Secure Hidden Service (was: Re: ... Illegal Activity
 As A Metric ...)
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Wed, Jun 25, 2014 at 11:50 PM, Tor Talker <tortalker@hidemeta.com> wrote:
> ....
> More to the point, do you have specific concerns regarding the Linux/Tor/Apache/Perl stack we are using?  We do sanitize error messages to prevent Apache from leaking system information, but that's really the only special effort other than maintaining good overall system security.


i never use apache, php, perl. i use custom built nginx against custom
built dependencies to front custom python/c++ web services.

these hidden services have never been compromised, but they're also
not designed like most web services. (i have used bounties in the past
to attract scrutiny, but to be fair "never been compromised" is also a
pretty poor metric for security or privacy. this is more a sanity
check.)



> What sort of vulnerabilities would you expect to see?

i've seen vulnerabilities in configuration, where insecure options
enabled by default allow local execution and privilege escalation.

i've seen vulnerabilities in implementation, where poor coding implies
errors around authorization or authentication.

i've seen vulnerabilities in database communication, where failure to
sanitize inputs leads to complete compromise.

the list goes on, and on, ...


building secure systems is hard.  Tor is pretty hard, but the things
people run across it much less so; double for hidden services.



trying to remain anonymous while hosting an average site on a hidden
service?  this is difficult.

trying to remain anonymous while posting and chatting and otherwise
practicing horrible opsec?  this is near impossible.


last but not least, the entire premise of this thread is around
blatant, public illegal behavior brazenly displayed being
discover-able through search and publication - the sites that practice
good privacy aren't spamming their links everywhere.  by definition,
the original survey is collecting only the worst run sites.



too much thought wasted on this thread already.

best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

