flooding attacks to discover hidden services

Wikileaks wikileaks at wikileaks.org
Mon Jan 1 14:39:05 UTC 2007


Does the public nature of tor routers makes hidden services  
vulnerable to
discovery using flooding attacks?

Open an onion connection to the hidden service, asking for echos. Now  
flood each
router. If the "ping" is overly delayed, the router is on the hidden  
path.

Since the rendezvous node is known and the other nodes vary over  
time, this will
eventually reveal the entry node.





More information about the tor-talk mailing list