[tor-talk] Is this a practical vulnerability?

Anon Mus my.green.lantern at googlemail.com
Sat Oct 20 10:46:18 UTC 2012


On 19/10/2012 16:01, somepony wrote:
> My question is, if you NEVER requested the 1 web page in the first 
> place, would you have experienced the same attack?  I mean if I were 
> looking for new live Tor services I would probably periodically just 
> roll through unknown IPs and check for a live node (or something) as 
> one layer of attack.  No live node, move on.  Live node not already 
> discovered?  The fact that the node responds (in some manner I'm 
> looking for) is enough information, it's possible I don't even care 
> that it has anything to do with Tor.
>
> Just a thought, it should be clear I have no idea what I'm talking 
> about. e.g. I don't know what your middleman server not getting 
> attacked indicates.
>
> Anon Mus wrote:
>>
>> Within 24hrs of making that Tor hidden service live I could see, in 
>> my firewall logs, hundreds of repeated attempts trying to hack my 
>> server, directly from the internet, not via my hidden Tot service.
> [...]
>> Now bearing in mind that I had only EVER requested 1 web page (a 
>> blank test page - requested about 4 times) from my own Torrified web 
>> browser (out and back so to speak), and no OTHER (external)
> _______________________________________________
> tor-talk mailing list
> tor-talk at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
Your guess is as good as mine.


More information about the tor-talk mailing list