<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, Apr 9, 2014 at 3:31 PM, Geri <span dir="ltr"><<a href="mailto:toxiroxi@gmail.com" target="_blank">toxiroxi@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">

<div dir="ltr">Hi Guys,<div><br></div><div>im running also a few guard relays and they are listed in here - but today i've patched and restarted all the nodes - so these logs arent actually anymore.</div><div>what does it mean, available for challenger?</div>

</div></blockquote><div><br></div><div>Note that this list is as unofficial as it gets. It's meant more for doing diagnostic metrics stuff, getting aggregate (publicly available) statistics about these relays, etc.</div>

<div><br></div><div>'challenger' is just a script meant for somewhat different purposes; it will eventually produce graphs out of aggregate metrics data: <a href="https://github.com/kloesing/challenger">https://github.com/kloesing/challenger</a></div>

<div><br></div><div>The vulnerable fingerprints file is now somewhat outdated I'm sure. It's useful for doing retrospective metrics inquiries ("what part of the network in terms of bandwidth did the vulnerable relays comprise three days ago?"); don't worry too much (and sorry if the initial email sounded alarm bells, that was not the intention, at all.)</div>

<div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div dir="ltr"><div>another thing: is it a real good idea to post public which ip/ports are vulnerable to that openssl bug? in my opinion it is much more getting dangerous for those relays being attacked - the information which of the relays are still vulnerable should be treatened more carefully to minimally get rid of the scriptkiddies trying to attack.</div>

</div></blockquote><div><br></div><div>The scripts for testing out relays and any kinds of arbitrary web services are available publicly (see: <a href="https://blog.torproject.org/comment/reply/843/55536">https://blog.torproject.org/comment/reply/843/55536</a> ); this would be a quintessential instance of 'security through obscurity'; people need to do their diagnostics. But I agree that providing PoC's all over the place does not reduce the number of scriptkiddie attacks.</div>

<div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div dir="ltr"><div>furthermore - how can i check if my tor nodes are now safe now?</div>

</div></blockquote><div><br></div><div>If you upgrade your openssl and then restart tor, you're fine. I guess you can use of them unofficial tools which do not guarantee anything. There's a python script you might try running,</div>

<div><br></div><div><a href="http://s3.jspenguin.org/ssltest.py">http://s3.jspenguin.org/ssltest.py</a></div><div>as of now, it says 'access denied', here's a copy:</div><div><a href="http://ravinesmp.com/volatile/ssltest.py">http://ravinesmp.com/volatile/ssltest.py</a><br>

</div><div><br></div><div>Be careful running random scripts from the internet, of course. This whole thread is not meant to convey things in any kind of official capacity (quite the opposite.)</div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">

<div dir="ltr"><div>thanks! </div></div></blockquote><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div dir="ltr">

<div><br></div><div><br></div></div><div class="gmail_extra"><br><br><div class="gmail_quote">
2014-04-09 5:41 GMT+02:00 Kostas Jakeliunas <span dir="ltr"><<a href="mailto:kostas@jakeliunas.com" target="_blank">kostas@jakeliunas.com</a>></span>:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">

<div><div class="h5">
<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Wed, Apr 9, 2014 at 3:49 AM, Kostas Jakeliunas <span dir="ltr"><<a href="mailto:kostas@jakeliunas.com" target="_blank">kostas@jakeliunas.com</a>></span> wrote:<br>




<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div dir="ltr">Making a separate thread so as not to pollute the challenger[1] one.<div>




<br></div><div>Roger: you wanted to know (times are UTC if anyone cares),</div><div> <br></div></div></blockquote><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">




<div dir="ltr"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">[22:08:35] [...] we now have a list of 1000 fingerprints, and we could pretend those are in the challenge and use our graphing/etc plans on them<br>




[22:08:45] they happen to be the relays vulnerable to our openssl bug<br>
[22:11:43] "what fraction of the tor network by consensus weight are they?"<br>[22:11:49] "over time"</blockquote><div><br></div><div>Given them[2], the challenger (with minimal changes to fix downloader and to make Onionoo not falter)[4] will spit out the following results:</div>





<div><br></div><div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-bandwidth.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-bandwidth.json</a></div><div>




  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-weights.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-weights.json</a></div>
<div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-clients.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-clients.json</a>    [uh oh, this one's empty. Why is it empty? Didn't look into it.]</div>





<div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-uptime.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1024-combined-uptime.json</a> </div><div><br></div><div>The 'combined-weights.json' is probably the one you might be after. But that's all I did for now.</div>





<div><br></div><div>You also said that these aren't all the vulnerable relays that there are out there. You linked to a more complete list[3], but it has some typos, etc. I haven't done anything with it, maybe someone will take over, or I will do something later on.</div>




</div></blockquote><div><br></div><div>fwiw, I ran the script for the larger batch of vulnerable relay fingerprints available[5], and these are the resulting files:</div><div><br></div><div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-bandwidth.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-bandwidth.json</a></div>




<div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-weights.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-weights.json</a></div><div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-clients.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-clients.json</a>  [empty]</div>




<div>  - <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-uptime.json" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln1648-combined-uptime.json</a></div><div><br></div><div>The whole thing (with the sleep delays included) took ~84 minutes to run.</div>




<div><br></div><div>(It may be that Onionoo doesn't know (at least not in a way that allows it to provide the relevant info here) about the majority of those fingerprints (?), so not sure if this is useful much, but it can't hurt.)</div>




<div><br></div><div>Okay, I'm probably done running and patching code I'm not familiar with for the time being. :)</div><div> </div></div></div></div></div></div></blockquote></div></div></blockquote><div><br class="">

regards,<br clear="all"><div><div dir="ltr"><div><br></div><div>--</div><div><br></div><div>Kostas.</div><div><br></div>0x0e5dce45 @ <a href="http://pgp.mit.edu/" target="_blank">pgp.mit.edu</a></div></div></div><div><br>

</div><div> </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div class="gmail_extra"><div class="gmail_quote">

<blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex"><div><div class="h5"><div dir="ltr"><div class="gmail_extra">

<div class="gmail_quote"><div></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;padding-left:1ex">


<div dir="ltr">
<div><div><br></div><div>[1]: <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/004214.html" target="_blank">https://lists.torproject.org/pipermail/tor-relays/2014-April/004214.html</a></div><div>[2]: <a href="http://ravinesmp.com/volatile/challenger-stuff/vuln_fingerprints.txt" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/vuln_fingerprints.txt</a></div>





<div>[3]: <a href="http://freehaven.net/~arma/vulnerable-keys-2014-04-08b" target="_blank">http://freehaven.net/~arma/vulnerable-keys-2014-04-08b</a><br clear="all"><div><div dir="ltr"><div>[4]: commits:</div><div><div>  -  <a href="https://github.com/wfn/challenger/commit/38d88bcb1136f97881f81152d3d883c4e9480188" target="_blank">https://github.com/wfn/challenger/commit/38d88bcb1136f97881f81152d3d883c4e9480188</a></div>





<div>  -  <a href="https://github.com/wfn/challenger/commit/39c800643c040474402fc62d2a2db75c25889dfc" target="_blank">https://github.com/wfn/challenger/commit/39c800643c040474402fc62d2a2db75c25889dfc</a></div><div>  -  <a href="https://github.com/wfn/challenger/commit/7425ef6fc00dedf3b2b7f2649e832fb4c93909ae" target="_blank">https://github.com/wfn/challenger/commit/7425ef6fc00dedf3b2b7f2649e832fb4c93909ae</a></div>




</div></div></div></div></div></div></blockquote><div><br></div>[5]: fingerprints ready for challenger: <a href="http://ravinesmp.com/volatile/challenger-stuff/1648_vuln_fingerprints.txt" target="_blank">http://ravinesmp.com/volatile/challenger-stuff/1648_vuln_fingerprints.txt</a></div>

</div></div></div></div></blockquote></div></div></blockquote></div><br></div></div>