[tor-talk] A question about hidden services and tor in general

Andrea Shepard andrea at torproject.org
Sat Nov 2 09:45:51 UTC 2013


On Sat, Nov 02, 2013 at 10:46:38AM +1030, DeveloperChris wrote:
> 
> I just reviewed the tor hidden services page. so I am pretty green
> about the way it works.
> 
> 
> From the description I gather this
> 
> When a client wants to connect to a hidden service an introducer
> picks a random rendezvious point which then is used to shuttle
> packets back and forth between the client and the hidden service.
> 
> If I wanted to discover the location of the hidden service is it not
> simple to act as the rendezvious point? If I had enough resources
> and flooded tor with nodes eventually one of my nodes would be
> chosen as the rendezvious point and therefore I have the client IP
> (me) the rendezvious point ip (me) and the supposedly hidden
> services ip (target).

There's a whole circuit between the HS and the rendezvous point.  You'd
have the same problem as trying to deanonymize a client from a subverted
exit node.

-- 
Andrea Shepard
<andrea at torproject.org>
PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF  DE79 A4FF BC34 F01D D536
PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5  DF7E 4191 13D9 D0CF BDA5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 328 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20131102/2cc09369/attachment.sig>


More information about the tor-talk mailing list