DonnchaC / tor-hsdir-research

Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done to help fix these problems in Tor. Help out! https://blog.torproject.org/blog/hidden-services-need-some-love
http://donncha.is/2013/05/trawling-tor-hidden-services/
Other
11 stars 0 forks source link

Create PoC for router key generation #2

Closed DonnchaC closed 11 years ago

DonnchaC commented 11 years ago

Create a python script which will attempt to brute force the generation of router keys which will have digests arbitrarily close too, but before, a specified desc_id. Some statistics should be done to determine the size of the normal responsible HidServ directory range and how much computing power would be needed to determine the 6 onion keys which will be responsible every time. (p < 0.05)

Basically to determine the practicallity of the DDoS idea.

DonnchaC commented 11 years ago

A fork of shallot is now working which will generate secret_id_key matching a particular _identitydigest regex pattern. DDoS attacks can now be manually preformed but it should be relatively straightforward to create a python script which automates the generation of secret_id_keys for a hidden service and will copy those to the Tor nodes at the correct times to ensure a 24/7 DoS of the target hidden service.

DonnchaC commented 11 years ago

The shallot fork only appears to be working some of the time. Other times it will generate a private key but when it is loaded into Tor a different _identitydigest will be calculated.

For now the generated _secret_idkey's should be confirmed on the command line with:

openssl rsa -in secret_id_key -pubout -outform DER | tail -c +23 | sha1sum | head -c 40 | python -c "import base64,sys; print base64.b32encode(sys.stdin.readline().strip('\n').decode('hex')).lower()"
DonnchaC commented 11 years ago

The code seems to be working 'okay'. It at least shows it is quite feasible to becoming all of the responsible HSDir's for a targeted hidden service