TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Critical Tor flaw leaks users’ real IP address

239 pointsby sds111over 7 years ago

13 comments

mirimirover 7 years ago
&gt; TorMoil, as the flaw has been dubbed by its discoverer, is triggered when users click on links that begin with file:&#x2F;&#x2F; rather than the more common <a href="https:&#x2F;&#x2F;" rel="nofollow">https:&#x2F;&#x2F;</a> and <a href="http:&#x2F;&#x2F;" rel="nofollow">http:&#x2F;&#x2F;</a> address prefixes. When the Tor browser for macOS and Linux is in the process of opening such an address, &quot;the operating system may directly connect to the remote host, bypassing Tor Browser,&quot; according to a brief blog post published Tuesday by We Are Segment, the security firm that privately reported the bug to Tor developers.<p>Oh, well ... This is basically the same vulnerability exploited by the FBI&#x27;s NIT. And this is the key aspect ...<p>&gt; ... &quot;the operating system may directly connect to the remote host, bypassing Tor Browser,&quot; ...<p>Well, in any sort of secure Tor implementation, such a thing should be impossible. The Tor client should be running in a router or gateway VM, and the machine used for browsing should not even have a public IP address. That&#x27;s easy to manage with Whonix.<p>I&#x27;ve badgered Tor Project about this for years. And they&#x27;ve ignored me. Their mantra has been about keeping things simple, so more people will use Tor.<p>Damn.<p>Edit: They&#x27;ve plugged this leak, but the fundamental weakness remains. Tor Browser doesn&#x27;t even block non-Tor connectivity with firewall rules. Even VPN clients block non-VPN connectivity.
评论 #15634863 未加载
评论 #15634032 未加载
评论 #15637068 未加载
评论 #15636798 未加载
评论 #15637075 未加载
评论 #15634000 未加载
评论 #15635283 未加载
评论 #15636053 未加载
saurikover 7 years ago
&quot;Critical Tor flaw leaks users’ real IP address&quot;<p>This is not a problem with Tor: this is a problem with the Tor Browser (and even then, only on macOS and Linux: users on Windows are not affected)... I&#x27;d recommend changing the title as this otherwise sounds like some extremely concerning flaw in the platform itself, which this attack is not targeting.
评论 #15633839 未加载
评论 #15633806 未加载
amlutoover 7 years ago
Ugh. Linux has this shiny feature called network namespaces. Tor Browser should run in a network namespace such that it has no access to the Internet and doesn&#x27;t know it&#x27;s real IP address in the first place and therefore <i>can&#x27;t</i> have this kind of leak barring a code execution attack <i>and</i> a sandbox break.
评论 #15636195 未加载
评论 #15634510 未加载
linkmotifover 7 years ago
Just the other day I saw some file:&#x2F;&#x2F;-based exploit. Didn’t read the specifics of this, but not validating a URL’s scheme must be a very common source of problems. It’s so easy to overlook the scheme when everything is https?:&#x2F;&#x2F; all the time. But alas, file:&#x2F;&#x2F;, it’s real, browsers attempt to work with it. Another edge to be aware of!!
评论 #15633678 未加载
评论 #15634572 未加载
评论 #15633491 未加载
sillysaurus3over 7 years ago
If anyone is wondering how the attack works, here&#x27;s a guess:<p>file:&#x2F;&#x2F;..&#x2F;..&#x2F;dev&#x2F;tcp&#x2F;74.125.225.19&#x2F;80<p>That would also explain why it works on &#x27;nix but not windows.<p>(This is probably mistaken, but the attack might be something along those lines.)<p>Hmm... Anyone have a link to the hotfix diff? We could just look rather than guess.
评论 #15634884 未加载
评论 #15633810 未加载
forapurposeover 7 years ago
If an attacker learned a Tor Browser user&#x27;s real IP address yesterday, and the leak gets fixed today, can the attacker still somehow identify that user&#x27;s traffic tomorrow?<p>Browser fingerprinting comes to mind, but is there another method?
评论 #15633572 未加载
评论 #15634018 未加载
评论 #15633544 未加载
评论 #15635461 未加载
评论 #15633597 未加载
MR4Dover 7 years ago
Can someone please explain something to me? I’ve had this question for a long time, and finally decided to ask it...<p>Why does anyone rely on TOR for security? Obviously bugs happen, but it seems pretty easy to hack by any large organization....or government.<p>For instance, according to this page ( <a href="https:&#x2F;&#x2F;metrics.torproject.org&#x2F;networksize.html" rel="nofollow">https:&#x2F;&#x2F;metrics.torproject.org&#x2F;networksize.html</a> ), there are less than 7,000 relays in the TOR network. To me, the US, British, Russian, or Chinese government could easily control most of those (i.e. running their own nodes) without anyone knowing, and use that to listen in (or at least infer) what TOR users are doing.<p>At that small of a scale, I’d bet a large corporation could even run a bunch of nodes.<p>How can that be protected against - or can it?<p>Am I missing something?
captainmuonover 7 years ago
And this is why I usually run Tor as a transparent proxy, and put the browser in a VM. All traffic from the VM is forced through Tor via iptables.<p>One downside is that you no longer look like all the other users that are using TorBrowser. But I value non-identifiability (that they can&#x27;t get to my real identity) more than non-trackability.
评论 #15634673 未加载
mirimirover 7 years ago
This is truly such an obvious exploit, given well-acknowledged risks of opening files downloaded via Tor browser. I&#x27;m quite embarrassed that I didn&#x27;t think of it. And I&#x27;m pretty sure that others have exploited it.<p>But on reflection, this is actually excellent news. At least, for those of us who don&#x27;t rely on Tor browser. That is, Tor users occasionally get pwned. And now there&#x27;s less reason to suspect unreported vulnerabilities in Tor itself.
评论 #15633946 未加载
Tepixover 7 years ago
There is a similar old attack with file URLs: Redirect-to-SMB (<a href="https:&#x2F;&#x2F;blog.cylance.com&#x2F;redirect-to-smb" rel="nofollow">https:&#x2F;&#x2F;blog.cylance.com&#x2F;redirect-to-smb</a>). The fix is to block outbound SMB connections in your router.
fulafelover 7 years ago
Interesting that this has been posted 5 times in the past few days without receiving votes.
评论 #15633763 未加载
danjocover 7 years ago
How long has the exploit existed? Did it magically appear after Appelbaum was run out of town on vague allegations of sexual harrassment?
评论 #15633768 未加载
rb666over 7 years ago
Let us quickly catch all the pedos on there and then close the leak for good.<p>Just this once...