Hidden service question

Geoffrey Goodell goodell at eecs.harvard.edu
Wed Mar 22 18:42:49 UTC 2006


On Wed, Mar 22, 2006 at 12:42:32PM -0500, Dan Mahoney, System Admin wrote:
> On Wed, 22 Mar 2006 circut at youtopia.homelinux.org wrote:
> 
> The webserver will see the IP of the "exit node" which is usually an IP on 
> the same server.  Running a hidden service gives you no more insight into 
> a TOR user's identity than being a standard node.

Right conclusion, incomplete reason.  Nodes with hidden services do get
to construct a Tor circuit to a rendezvous point, so they know that
point and may potentially have some control over the choice of that
point, but clients accessing hidden services also construct Tor circuits
to this rendezvous point, so provided that Tor works, neither party
learns the address of the other.

Indeed, this means that packets between a client and the hidden service
may traverse seven hosts, not just three.  Perhaps there are some
reasonable "middle ground" options:

- Server anonymity only: a way for clients to access hidden services by
just connecting directly to the rendezvous point (for situations in
which the client does not care about his/her own anonymity)

- Client anonymity only: a way for servers to advertise themselves
without anonymity (e.g. a web service running at http://router.exit/,
for situations in which the service does not want anonymity per se but
wants people to connect via Tor, perhaps for the purpose of providing
consistent reachable service from behind a NAT / firewall / dynamic
address.

Geoff

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060322/a46a3bd3/attachment.pgp>


More information about the tor-talk mailing list