[tor-talk] Dutch police break into webservers over hidden services
gozu at xerobank.net
Fri Sep 9 10:14:21 UTC 2011
Alternatively, one could run Tor on VMs that can only access the
internet via OpenVPN-based "anonymity services". OpenVPN clients can be
run on physical routers, with tunnels routed to physical LANs that lack
management access. Even if attackers manage to compromise VM hosts,
getting real external IPs also requires compromising the routers. One
can readily extend this approach using nested OpenVPN tunnels.
On 09/09/11 08:36, tor at lists.grepular.com wrote:
> Probably the safest way to run a hidden service is to do it from inside
> a VM.
> Install Tor on the host OS. Configure up the Hidden Service on the host
> OS, but point it at the IP of the VM. Set up a firewall on the VM to
> prevent all other network traffic going in or out of it. Or
> alternatively use the TransPort functionality of Tor so all traffic
> leaving the VM goes through Tor.
> If the webserver on the VM is compromised, they get access to the VM,
> but the VM shouldn't know its real IP address (just the NAT'd one), or
> anything else about where it is or who it belongs to.
> You're still relying on there being no vulnerabilities in the VM
> software or the Tor software which allow an attacker to access the host
> system, but that sort of attack is much more difficult to pull off than
> compromising a web server, or any of the software being served by the
> web server.
> For all we know, this was a simple PHP exploit that allowed the attacker
> to make a HTTP request from the target server to a host on the wider
> Internet, to discover its IP.
More information about the tor-talk