[tor-relays] tor-relays Digest, Vol 32, Issue 29

rotpoison throngnet rotpoison at gmail.com
Sat Sep 14 19:01:09 UTC 2013


Hey guys -

I have been tracking the clickfraud botnet that is hitting  exposed Privoxy
service on Tor exit nodes since early this year. I call it Rotpoi$on, and
recently I have been working with at least one of the security teams for
the advertisement networks being leveraged for the clickfraud, as my time
allows.  You can read more about some collective findings on Rotpoi$on
here: https://b.kentbackman.com/tag/rotpoion

FYI, LUDICROUS2U is my Tor exit node.  I started purposely running
Tinyproxy on port 8118, configured such that it will forward directly to
the advertiser networks with a specific markup indicating fraud as well as
the original client IP in the X-header.  Now, if every exit relay operator
that has a Tor-injecting Privoxy service open instead replaced it with a
similar "tainted" proxy on port 8118, it might quickly reduce the
attractiveness of exit relays for "fraud service" by the Rotpoi$on
throngnet.

Recently I changed my exit relay IP address and for a week now Rotpoi$on
hasn't hit. I have changed my IP address at least a dozen times over the
last year. The time that it takes for my exit relay to again be hit on port
8118 (at times additionally 3128--Squid port) has varied considerably.
 This makes me think that the perpetrators are more or less manually adding
the list of exit relays into their click fraud operation (script?).

For a while I was under the presumption that the massive uptick of Tor
clients as recently announced by the Tor Project was sign that the
Rotpoi$on perpetrators were starting to inject their fraudulent clicks into
Tor the "legitimate" way, meaning with a Tor client.  This corresponded
with a reduction in port 8118 hits to my exit relay.  But alas,
communication with one of the advertisement network security reps does not
suggest a massive corresponding increase in click fraud originating from
Tor exit relays in general.  So I am at a loss how to explain exactly what
is going on, other than the fact that the perpetrators are still paying for
a lot of leased Windows servers whose actual effectiveness at generating a
significant clickfraud revenue streams seems limited and even silly,
according to some other researcher's comments.


On Sat, Sep 14, 2013 at 2:00 AM, <tor-relays-request at lists.torproject.org>wrote:

> Send tor-relays mailing list submissions to
>         tor-relays at lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> or, via email, send a message with subject or body 'help' to
>         tor-relays-request at lists.torproject.org
>
> You can reach the person managing the list at
>         tor-relays-owner at lists.torproject.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-relays digest..."
>
>
> Today's Topics:
>
>    1. Tor 0.2.4.17-rc on arch armv6 (Lukas Erlacher)
>    2. Re: Sent open privoxy port warning (Luther Blissett)
>    3. Re: Sent open privoxy port warning (Luther Blissett)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Fri, 13 Sep 2013 15:13:18 +0200
> From: Lukas Erlacher <l.erlacher at gmail.com>
> To: tor-relays at lists.torproject.org
> Subject: [tor-relays] Tor 0.2.4.17-rc on arch armv6
> Message-ID:
>         <CAJWOhv-pxwHnqy6-bLojr66cGWg=0ee=HhO_WuNb9N=
> PAw5mtw at mail.gmail.com>
> Content-Type: text/plain; charset=ISO-8859-1
>
> Hello to everyone with arm hardware and arch linux,
>
> I just set up Tor 0.2.4.17-rc on a raspberry pi and I want to share
> what I did just to create a piece of documentation that might be
> helpful for others.
> I got tor-git from the AUR[1], modified it to fetch 0.2.4.17-release
> instead of master, and built it according to the aur[2] and
> pkgbuild[3] instructions.
>
> Here is what I did:
>
> 1) Backup torrc, fingerprint, and private key of my tor node
> 2) Read up on AUR and PKGBUILD
> 3) pacman -R tor tor-socks
> 4) pacman -s base-devel
> 5) Download and extract the AUR
> 6) Carefully inspect the AUR package, especially PKGBUILD and tor.install
> 7) Modify the PKGBUILD file with _branch=release-0.2.4 and
> pkgver=0.2.4.17.rc.0
> 8) makepkg -s
> 9) pacman -U tor-git-0.2.4.17.rc.0-1-armv6h.pkg.tar.xz
> 10) mv /etc/tor/torrc /etc/tor/torrc.tor-git.sample
> 11) mv /etc/tor/torrc.pacsave /etc/tor/torrc
> 12) systemctl tor start
>
> That's it. Run "tor --version" and it should tell you that it's a git
> build of 0.2.4.17-rc.
>
> You will have to rebuild the package for every update you want to get!
>
> As per The Arch Way, Please familiarize yourself with pacman, the AUR,
> and PKGBUILD before attempting this!
>
> Absolutely no warranties given. The AUR can seriously damage your system!
>
> Best Regards,
> Luke
>
> [1] https://aur.archlinux.org/packages/tor-git/
> [2] https://wiki.archlinux.org/index.php/AUR
> [3] https://wiki.archlinux.org/index.php/PKGBUILD
>
>
> ------------------------------
>
> Message: 2
> Date: Fri, 13 Sep 2013 12:52:35 -0300
> From: Luther Blissett <lblissett at paranoici.org>
> To: tor-relays at lists.torproject.org
> Subject: Re: [tor-relays] Sent open privoxy port warning
> Message-ID: <1379087555.555.10.camel at tagesuhu-pc>
> Content-Type: text/plain; charset="utf-8"
>
> On Wed, 2013-09-11 at 12:35 -0700, Aaron Hopkins wrote:
> > I sent the following warning to the listed e-mail address of 14 of the 19
> > Tor nodes I found that accepted connections on port 8118, some of which
> > bounced.
> >
> > If any of you run or know how to get in touch with the operators of the
> > nodes DaJoker, FawkesSwissBlade, LUDICROUS2U, RaspberryPI, pangu,
> > mouseHouse, tornonym, or 75.137.122.118, I'd appreciate if you could pass
> > this along.
> >
> > Thanks!
> >
> >                                      -- Aaron
> >
> > ---
> >
> > I noticed your Tor node _ with an IP of _ is one of 19 nodes that accepts
> > connections publicly on TCP port 8118, which is the default port for
> > Privoxy.  I suspect this might be a configuration mistake.
> >
> > I'm investigating this because my tor node "tordienet" has received
> millions
> > of HTTP proxy requests to port 8118 per day for months.  The requests
> appear
> > to come from a botnet running on roughly 1500 IPs, and seem to be
> > advertising click-fraud related.  From the discussion in July on the
> > tor-relays at lists.torproject.org mailing list (archive at
> > https://lists.torproject.org/pipermail/tor-relays/), this appears to be
> true
> > of many nodes.
> >
> > Port 8118 is the default port for Privoxy, which comes bundled with Tor
> but
> > is meant to provide an HTTP proxy for you and your local users to browse
> > through and is not designed to be offered as a public service.  If you
> don't
> > use Privoxy, would you mind shutting it down?  Or if you do, can you
> move it
> > to a different port and/or only allow your own IPs to connect to it?
> >
> > I'd be happy to provide more information or help you with the
> configuration
> > changes if I can.
> > _______________________________________________
> > tor-relays mailing list
> > tor-relays at lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> Hello Aron,
>
> Sometime ago I noticed similar behavior from a series of IP numbers
> which mostly were inside limestonenetworks IP range and searched for
> polipo (port 8123). I sent an email alert to its admins, but received no
> answer whatsoever. I also sent to this malling list and some others, but
> since my mail wasn't registered I think it bounced. I'm copying it
> bellow. In case this is of any help.
>
> Also, wouldn't this be the case for a "routine security alert" on tor
> blogs?
>
> **************************
>
> Hello dear companions,
>
> Two days ago one of my tor exit nodes experienced something I'm now
> calling "limestonenetworks DDoS on polipo" ( $WAN_IP:8123 ), since all
> packets in the storm were flowing from a range of 514 different IP
> addresses, all of them inside limestonenetworks IP range and targeting
> port 8123 on my tor exit node WAN IP.
>
> Before the packet storm, I could observe a huge increase on attempts to
> access my WAN domain through tor. I couldn't relate IP addresses from
> this first raise to those responsible for the actual packet storm nor
> could I identify some useful pattern there, but they were all coming
> from port 9001 and increased just some hours before the storm, so I'm
> guessing they are related somehow.
>
> Also, throughout the storm, one of my log files got corrupted with some
> unreadable bin garbage. I do not know if it was intended/targeted
> exploit, but I'm reworking secrets and trying to figure out what is this
> binary.
>
> Here is a sample line of a WAN attempt:
>
> Aug 13 16:50:22 $USER user.warn kernel: [DROP INVALID WAN] : IN=vlan2
> OUT= MAC=xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
> SRC=77.56.151.190 DST=xxx.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=43
> ID=38787 DF PROTO=TCP SPT=40888 DPT=9001 SEQ=289854459 ACK=41163
>
> Here is a sample line of packet storm:
>
> Aug 13 20:39:14 $USER user.warn kernel: [hammer] : IN=vlan2 OUT=
> MAC=xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx
> SRC=74.63.216.60 DST=xxx.xxx.xxx.xxx LEN=52 TOS=0x00 PREC=0x00 TTL=48
> ID=20269 DF PROTO=TCP SPT=1757 DPT=8123 WINDOW=65535 RES=0x00 SYN URGP=0
> OP
>
> The attack persisted for at least three hours and left this binary (hex
> represented):
>
> 0000000 0000 0000 0000 0000 0000 0000 0000 0000
> *
> 0000b90 0000 0000 0000 0000 0000 0000 2067 3331
> 0000ba0 3220 3a30 3135 303a 2034 6174 6567 7573
> 0000bb0 7568 7520 6573 2e72 6177 6e72 6b20 7265
> 0000bc0 656e 3a6c 5b20 6168 6d6d 7265 205d 203a
> 0000bd0 4e49 763d 616c 326e 4f20 5455 203d 414d
> 0000be0 3d43 3030 323a 3a31 3732 663a 3a61 6464
> 0000bf0 343a 3a34 3030 313a 3a35 3966 323a 3a61
> 0000c00 6639 643a 3a39 3830 303a 3a30 3534 303a
> 0000c10 3a30 3030 333a 2034 5253 3d43 3132 2e36
> 0000c20 3432 2e35 3232 2e31 3031 2037 5344 3d54
> 0000c30 3831 2e39 3833 322e 3533 322e 3035 4c20
> 0000c40 4e45 353d 2032 4f54 3d53 7830 3030 5020
> 0000c50 4552 3d43 7830 3030 5420 4c54 343d 2038
> 0000c60 4449 313d 3335 3431 4420 2046 5250 544f
> 0000c70 3d4f 4354 2050 5053 3d54 3932 3635 4420
> 0000c80 5450 383d 3231 2033 4957 444e 574f 363d
> 0000c90 3535 3533 5220 5345 303d 3078 2030 5953
> 0000ca0 204e 5255 5047 303d 000a
> 0000ca9
>
> Attached is the list of participating IP addresses, line by line, with
> the count of packets received. The attacker started sending something
> like 4 packets per second and increased to over than 9000!!! - just
> kidding, over 30 per second.
>
> JSYK, I welcome any comments.
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: limestone_ddosers.log
> Type: text/x-log
> Size: 9631 bytes
> Desc: not available
> URL: <
> http://lists.torproject.org/pipermail/tor-relays/attachments/20130913/69e6259e/attachment-0001.bin
> >
>
> ------------------------------
>
> Message: 3
> Date: Fri, 13 Sep 2013 13:00:26 -0300
> From: Luther Blissett <lblissett at paranoici.org>
> To: tor-relays at lists.torproject.org
> Subject: Re: [tor-relays] Sent open privoxy port warning
> Message-ID: <1379088026.555.15.camel at tagesuhu-pc>
> Content-Type: text/plain; charset="UTF-8"
>
> Ow, forgot to say, don't bother with that hex. From what I could get
> with the help of others, this is just a byte reversed/corrupted log
> entry. Since the hard drive used to store logs is some years old, I
> guess this is related to badblocks.
>
> On Wed, 2013-09-11 at 12:35 -0700, Aaron Hopkins wrote:
> > I sent the following warning to the listed e-mail address of 14 of the 19
> > Tor nodes I found that accepted connections on port 8118, some of which
> > bounced.
> >
> > If any of you run or know how to get in touch with the operators of the
> > nodes DaJoker, FawkesSwissBlade, LUDICROUS2U, RaspberryPI, pangu,
> > mouseHouse, tornonym, or 75.137.122.118, I'd appreciate if you could pass
> > this along.
> >
> > Thanks!
> >
> >                                      -- Aaron
> >
> > ---
> >
> > I noticed your Tor node _ with an IP of _ is one of 19 nodes that accepts
> > connections publicly on TCP port 8118, which is the default port for
> > Privoxy.  I suspect this might be a configuration mistake.
> >
> > I'm investigating this because my tor node "tordienet" has received
> millions
> > of HTTP proxy requests to port 8118 per day for months.  The requests
> appear
> > to come from a botnet running on roughly 1500 IPs, and seem to be
> > advertising click-fraud related.  From the discussion in July on the
> > tor-relays at lists.torproject.org mailing list (archive at
> > https://lists.torproject.org/pipermail/tor-relays/), this appears to be
> true
> > of many nodes.
> >
> > Port 8118 is the default port for Privoxy, which comes bundled with Tor
> but
> > is meant to provide an HTTP proxy for you and your local users to browse
> > through and is not designed to be offered as a public service.  If you
> don't
> > use Privoxy, would you mind shutting it down?  Or if you do, can you
> move it
> > to a different port and/or only allow your own IPs to connect to it?
> >
> > I'd be happy to provide more information or help you with the
> configuration
> > changes if I can.
> > _______________________________________________
> > tor-relays mailing list
> > tor-relays at lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
> ------------------------------
>
> End of tor-relays Digest, Vol 32, Issue 29
> ******************************************
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20130914/8957871c/attachment-0001.html>


More information about the tor-relays mailing list