prevent tor accepting dns requests on dnsport initiated by itself

Robert Hogan robert at roberthogan.net
Sat Jun 23 12:08:33 UTC 2007


On Friday 22 June 2007 16:52:48 Nick Mathewson wrote:
> On Thu, Jun 21, 2007 at 10:53:08PM +0100, Robert Hogan wrote:
> > This would also prevent the user resolving a dns request if it
> > coincided exactly with the very same request by tor. I don't know
> > how likely this would be in practice - I certainly haven't been
> > quick enough on the draw.
>
> I think this is actually a dangerous idea.  We separate the client DNS
> cache from the server DNS cache for a reason: if you're using a Tor
> instance as both a client and a server, it's a good idea to keep the
> client's behavior more or less uncorrelated by the server's.
>

Sorry, I don't get it!

I don't think any mixing of the caches takes place here. The patch prevents a 
Tor server from resolving DNS requests when a broken system configuration 
routes them all back to its own DNSPort. In this situation the tor server 
will always be unable to resolve anything and the server admin will be warned 
accordingly.

If the same Tor instance is being used as a client then the only occasion in 
which an application's requests (e.g. from firefox) will fail is if it 
happens to request the exact same dns resolve at precisely the same moment 
the server's same dns request is in progress. Otherwise its requests, even 
for the same hostname, will be successfully routed over the tor network.

I don't believe a failure of the client request in the above situation will 
result in a cache hit (server or client), the request will just fail and the 
app will try again or give up.

> Here's an attack: I have a server that doesn't see much usage at
> evil-nick.com.  You have a non-exit Tor host.  I suspect that you're
> connecting to my server.  I control the DNS for evil-nick.com, so I
> whenever your Tor server asks for the address of evil-nick.com I give
> you IP1.  (If it never asks, I can resolve evil-nick.com.yourhost.exit
> a lot.)  When any other server asks, I give them IP2.  If I see
> anybody connect to IP1, I know that it's probably your client peeking
> inside the server DNS.
>

My understanding of the patch is: 

In the case where all DNS requests are looping back into Tor's DNSPort  the 
server will never get IP1 or IP2 since all it's dns requests will fail. The 
client meanwhile will either get IP2 (request routed over tor network) or 
will also fail and get nothing.

In the case where the system is properly configured and the server's requests 
are not proxied but the client's arrive at the DNSPort, the server will 
always get IP1 and the client will always get IP2. If client and server 
request evil-nick.com at the exact same moment, the server will get IP1 and 
the client will receive DNS_ERR_REFUSED.


> There are probably easier attacks here too.



-- 

Browse Anonymously Anywhere	- http://anonymityanywhere.com
TorK	- KDE Anonymity Manager	- http://tork.sf.net
KlamAV	- KDE Anti-Virus 	- http://www.klamav.net



More information about the tor-dev mailing list