{"id":64624,"date":"2015-04-04T04:47:11","date_gmt":"2015-04-04T08:47:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/bugs-in-tor-network-used-in-attacks-against-underground-markets\/"},"modified":"2015-04-04T04:47:11","modified_gmt":"2015-04-04T08:47:11","slug":"bugs-in-tor-network-used-in-attacks-against-underground-markets","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/bugs-in-tor-network-used-in-attacks-against-underground-markets\/","title":{"rendered":"Bugs in Tor network used in attacks against underground markets"},"content":{"rendered":"<p><p>    Too many onion circuits can spoil the server, thanks to a Tor    hidden service vulnerability.  <\/p>\n<p>    Aurich Lawson \/ Thinkstock  <\/p>\n<p>    The operator of an underground marketplace hosted within the    Tor network has reported a flaw in    Tor that he claims is being used for an ongoing denial of    service attack on the site.  <\/p>\n<p>    The problem, which is similar to     one reported by another hidden site operator in December on the    Tor mailing list, allows attackers to conduct a denial of    service attack against hidden sites by creating a large number    of simultaneous connections, or \"circuits,\" via Tor,    overwhelming the hidden service's ability to respond.  <\/p>\n<p>    The problem is still under review, but it appears to be related    to abuse    of the \"introduce\" message in the Tor Hidden Services    protocol, which is used to negotiate the connection between    the client and the hidden server. By sending multiple    \"introduce\" requests to the same hidden service, an attacker    could make the targeted server create multiple circuits (paths    over the Tor network used for the session), eating the server's    available CPU and network resources and making it inaccessible    to users.  <\/p>\n<p>    An individual associated with Middle Earth, one of the hidden    sites targeted by the denial of service attacks, posted to    reddit's \"darknet markets\" subreddit earlier this week to    apologize for the long downtime associated with the attack.    Using the reddit account name MEMGandalf, he claimed \"Middle    Earth and Agora are the focus of the most serious attack TOR    has ever seen.\" He additionally reported that Middle Earth's    operator had reported the flaw to Tor. (The bug report was    opened under the name \"alberto.\") The attack raised the    server's processor load to 100 percent utilization.  <\/p>\n<p>    While the problem has been reproduced by at least one Tor    developer, short-term fixes proposed to prevent the attacks    have, thus far, not panned out. A number of long-term fixes    have been proposed that require substantial changes to Tor's    Hidden Services Protocol implementation, including the use of    dedicated bridges to connect larger hidden sites to Tor (part    of     Tor's Proposal 188, first put forward in 2012 by Tor    co-founder and developer Roger Dingledine in June 2012).  <\/p>\n<p>    There was also a number of Tor client-related security patches    pushed out this weeklargely triggered by a critical \"safety    hazard\" alert from Mozilla for Firefox, Firefox Extended    Support Release, and the Thunderbird mail client. Both the Tor    Browser Bundle and Tails live-bootable operating system were    updated to fix problems in the Mozilla browser engine used    across all the projects. Because of problems in how the browser    engine handled memory safety, \"we presume that with enough    effort at least some of these (flaws) could be exploited to run    arbitrary code,\" the Mozilla team noted in the alert.  <\/p>\n<p>    The Tor Browser Bundle and the Tor browser in Tails both use    Firefox ESR as their code base. In theory, the flaws could be    exploited to run script within a browser session that could be    used to launch an attack against the browser by loading code to    memory outside the browser's context. Now that the flaw has    been made public, Tor and the Tails project are urging users to    update their software as soon as possible.  <\/p>\n<p>    The latest Tails release also fixes more problems in OpenSSL,    the open-source crypto kit that was the source of last year's    Heartbleed bug. A set of problems in OpenSSL that could have    caused memory corruption and software crashes found in the    Debian distribution of Linux were patched in mid-March; Tails    is based on Debian, and these fixes were rolled into the latest    bootable distribution.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2015\/04\/bugs-in-tor-network-used-in-attacks-against-underground-markets\" title=\"Bugs in Tor network used in attacks against underground markets\">Bugs in Tor network used in attacks against underground markets<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Too many onion circuits can spoil the server, thanks to a Tor hidden service vulnerability.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/bugs-in-tor-network-used-in-attacks-against-underground-markets\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-64624","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/64624"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=64624"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/64624\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=64624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=64624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=64624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}