TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Most TOR servers are vulnerable (NSA crackable)

100 pointsby cklausover 11 years ago

9 comments

anologwintermutover 11 years ago
Given the extent of the five eyes (NSA,GCHQ,DSD, etc) taping of major fiber lines, Tor is almost certainly useless against the NSA even without backdoors. The NSA doesn&#x27;t need to resort to expensive key cracking operations to break either the anonymity or confidentiality of Tor. They just have to be able to see entry and exit node traffic.<p>From the original paper by the Tor developers:<p>&quot;A global passive adversary is the most commonly assumed threat when analyzing theoretical anonymity designs. But like all practical low-latency systems, Tor does not protect against such a strong adversary.&quot; --- Tor: The Second-Generation Onion Router <a href="http://www.dtic.mil/dtic/tr/fulltext/u2/a465464.pdf" rel="nofollow">http:&#x2F;&#x2F;www.dtic.mil&#x2F;dtic&#x2F;tr&#x2F;fulltext&#x2F;u2&#x2F;a465464.pdf</a>
评论 #6347935 未加载
评论 #6347933 未加载
评论 #6349027 未加载
reirobover 11 years ago
&quot;Of course, this is still just guessing about the NSA&#x27;s capabilities. As it turns out, the newer Elliptical keys may turn out to be relatively easier to crack than people thought, meaning that the older software may in fact be more secure. But since 1024 bit RSA&#x2F;DH has been the most popular SSL encryption for the past decade, I&#x27;d assume that it&#x27;s that, rather than curves, that the NSA is best at cracking.&quot;<p>So it is suggested to update to a newer version that uses EC, but we are not sure if EC is not breakable? Others ([1], [2]) suggest that RSA is more secure than EC!?<p>I wish that the security experts could give &quot;clear&quot; advise.<p>EDIT: Added proper links to sources suggesting RSA over EC.<p>[1] Bruce Schneider in <a href="http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance" rel="nofollow">http:&#x2F;&#x2F;www.theguardian.com&#x2F;world&#x2F;2013&#x2F;sep&#x2F;05&#x2F;nsa-how-to-rema...</a><p>&quot;Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.&quot;<p>[2] Fefe (it&#x27;s in German) <a href="http://blog.fefe.de/?ts=acd52294" rel="nofollow">http:&#x2F;&#x2F;blog.fefe.de&#x2F;?ts=acd52294</a>
评论 #6348414 未加载
m_ramover 11 years ago
2.3.25 is the current stable version. 2.4.* is in development. Tor server operators would have to compile from source or use the upstream deb&#x2F;rpm repos.<p><a href="https://www.torproject.org/download/download-unix.html.en" rel="nofollow">https:&#x2F;&#x2F;www.torproject.org&#x2F;download&#x2F;download-unix.html.en</a>
contingenciesover 11 years ago
Posted a gentoo bug: <a href="https://bugs.gentoo.org/show_bug.cgi?id=484154" rel="nofollow">https:&#x2F;&#x2F;bugs.gentoo.org&#x2F;show_bug.cgi?id=484154</a>
eksithover 11 years ago
Debian&#x2F;Ubuntu isn&#x27;t alone in this. It should be noted that the majority of nodes are using Linux and of those, the 0.2.4 package is still not available unless you&#x27;re running some flavor of &quot;untested&quot; or other bleeding edge distro.<p>Of course that doesn&#x27;t stop operators from simply downloading the latest package themselves from the Tor project or compiling from source.
tptacekover 11 years ago
<i>Of course, this is still just guessing about the NSA&#x27;s capabilities. As it turns out, the newer Elliptical keys may turn out to be relatively easier to crack than people thought, meaning that the older software may in fact be more secure.</i><p>Wait, what?
coopdogover 11 years ago
So why isn&#x27;t the repo up to date?<p>I honestly don&#x27;t know the answer as I don&#x27;t deal with Linux repo&#x27;s much
评论 #6348336 未加载
评论 #6347735 未加载
doomroboover 11 years ago
I don&#x27;t see how ECDHE has any effect on the (in)security mentioned in the article. It clearly states that the RSA keys being only 1024 bits is the problem. How does using ECDHE-RSA change this?
thingummywutover 11 years ago
Why is ECDHE+3DES a &quot;lulz-worthy combination&quot;?