Delivery-Date: Fri, 31 Oct 2014 08:53:45 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A18081E0080;
	Fri, 31 Oct 2014 08:53:43 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 66022205F0;
	Fri, 31 Oct 2014 12:53:31 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 7D66431875
 for <tor-talk@lists.torproject.org>; Fri, 31 Oct 2014 12:53:28 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id AmvFe-tqgJsA for <tor-talk@lists.torproject.org>;
 Fri, 31 Oct 2014 12:53:28 +0000 (UTC)
Received: from smtp.mozilla.org (mx2.corp.phx1.mozilla.com [63.245.216.70])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 567323155E
 for <tor-talk@lists.torproject.org>; Fri, 31 Oct 2014 12:53:28 +0000 (UTC)
Received: from Ornithorynque.local (unknown [64.213.97.194])
 (Authenticated sender: dteller@mozilla.com)
 by mx2.mail.corp.phx1.mozilla.com (Postfix) with ESMTPSA id 23C6FF208D
 for <tor-talk@lists.torproject.org>; Fri, 31 Oct 2014 05:53:24 -0700 (PDT)
Message-ID: <54538641.7030609@mozilla.com>
Date: Fri, 31 Oct 2014 13:53:21 +0100
From: David Rajchenbach-Teller <dteller@mozilla.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9;
 rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <20141031122302.GA5554@glue.grepular.com>
 <5453828B.2060401@mozilla.com> <54538361.20300@riseup.net>
 <5453843E.30500@mozilla.com> <20141031125021.GA6236@glue.grepular.com>
In-Reply-To: <20141031125021.GA6236@glue.grepular.com>
Subject: Re: [tor-talk] Facebook brute forcing hidden services
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============3736376900676259377=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============3736376900676259377==
Content-Type: multipart/signed; micalg=pgp-sha1;
 protocol="application/pgp-signature";
 boundary="MdxFlArddmdfB5rhFkkuDdvuBeoaKlpNw"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--MdxFlArddmdfB5rhFkkuDdvuBeoaKlpNw
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Got it. What's the behavior when two services have the same .onion addres=
s?

On 31/10/14 13:50, Mike Cardwell wrote:
> You don't get to pick the ".onion" address. It is derived from the key
> you randomly generated.
>=20
> However, you can just keep generating keys over and over again until
> you get one that matches what you want. People have been doing this
> to choose their own prefixes for a while now, but this is the first
> time I've seen somebody generate a full string of their own choosing.
>=20
> If facebook can do that, then so can GCHQ and NSA. And if they can
> do that, they can brute force a key which matches the .onion address
> of any existing hidden service. So they can then MITM hidden services.
>=20
> I don't think I'm being dramatic when I say this proves that Tor
> hidden services are now completely broken. I'd like somebody to
> show me that I'm wrong for some reason though...
>=20
>=20
>=20


--=20
David Rajchenbach-Teller, PhD
 Performance Team, Mozilla


--MdxFlArddmdfB5rhFkkuDdvuBeoaKlpNw
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUU4ZBAAoJED+FkPgNe9W+w5IH/jzUWcLGINl+yDtY+UNLsgDc
hQz6ncK042JnPa2kVRXeWQjafffaV5B9RU26V2k9/21MGcm29f76o6gI9Hcdbdf3
xGqxLhnuN6dWx0sZP/BD+FS7oTRDiCbppZ1y4W8ikuiDhbG+IBJguWES82UCWc3/
EvyXzv/RMQ84DlntUI+5CE1Gu1118S+l9pTmwEeQyyado6zy6E7zsHuE30r4lAkj
/ioOTlKNbSEiILmd/U7vA9i6tvdEMQ2D5OMYXKz0X/7rBA3vdwYIJgkUkMU4IjRa
yzZF3592xtvk2gfA8eX704W1U5Y1s6iMUQCkxWzZV1z2BF/SGtpQ5dR+42heJO4=
=jRt1
-----END PGP SIGNATURE-----

--MdxFlArddmdfB5rhFkkuDdvuBeoaKlpNw--

--===============3736376900676259377==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============3736376900676259377==--

