Closed DonnchaC closed 11 years ago
A fork of shallot is now working which will generate secret_id_key matching a particular _identitydigest regex pattern. DDoS attacks can now be manually preformed but it should be relatively straightforward to create a python script which automates the generation of secret_id_keys for a hidden service and will copy those to the Tor nodes at the correct times to ensure a 24/7 DoS of the target hidden service.
The shallot fork only appears to be working some of the time. Other times it will generate a private key but when it is loaded into Tor a different _identitydigest will be calculated.
For now the generated _secret_idkey's should be confirmed on the command line with:
openssl rsa -in secret_id_key -pubout -outform DER | tail -c +23 | sha1sum | head -c 40 | python -c "import base64,sys; print base64.b32encode(sys.stdin.readline().strip('\n').decode('hex')).lower()"
The code seems to be working 'okay'. It at least shows it is quite feasible to becoming all of the responsible HSDir's for a targeted hidden service
Create a python script which will attempt to brute force the generation of router keys which will have digests arbitrarily close too, but before, a specified desc_id. Some statistics should be done to determine the size of the normal responsible HidServ directory range and how much computing power would be needed to determine the 6 onion keys which will be responsible every time. (p < 0.05)
Basically to determine the practicallity of the DDoS idea.