[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tor-talk] SIGAINT email service targeted by 70 bad exit nodes
-----BEGIN PGP SIGNED MESSAGE-----
> On Sun, Apr 26, 2015 at 11:19:08AM +0000, nusenu wrote:
>>> On Thu, Apr 23, 2015 at 07:30:57PM +0000, nusenu wrote:
>>>>> Almost all of them were younger than one month and they
>>>>> seem to have joined the network in small batches. I
>>>>> uploaded Onionoo's JSON-formatted relay descriptors, so
>>>>> everybody can have a look:
I compared your list (71 FPs) with my list (55 FPs) from
>>>> 2015-04-05 , we have an overlap of (only) 30 relays. An
>>>> overlap of around ~50 would be better.
>>> Yes, I remember your list. Thanks a lot for sharing it, it's
>>> really helpful!
>>> The relays that are in your, but not in my list indeed look
>>> quite similar to the rest. They don't have a BadExit flag
>>> because nobody has caught them doing something nasty yet.
>> So you do not think that they are controlled by the same
>> (malicious) entity? (even though some declare their MyFamily
> I'm not sure, unfortunately.
I would appreciate to hear your thoughts on the MyFamily group .
Lets make sure that we are on common ground regarding the following
- - you saw their (speaking about the 55 relays ) sign up timing/pattern
- - you saw their restart timing/pattern
- - the combination of these two
- - you saw that all of them changed their DirPort setting after 
- relay: Chifuniro (BadExit)
- relay: Kyriakos + 3 others (no BadExit flag)
currently down - shutdown ~20 hours ago
both signed up on 2015-04-01 within a two hours timeframe
(2015-04-01 06:00:00 vs. 2015-04-01 08:00:00)
both restarted on 2015-04-04 within a 11 seconds timeframe
(2015-04-04 01:33:11 vs. 2015-04-04 01:33:22)
other matching properties:
- tor version
- no contact
- no family
- DirPort auto (back then)
Now to actually weight the information above one would have to compare
that with the rest of the network. How likely is it that something
like this happens coincidentally? I didn't do the actual processing
but I'd say the likelihood is low.
Anyway, it is good that relays are not flagged to easily as BadExits.
>> The case that one took over legit relays is unlikely since many
>> are rather 'fresh' ones.
> Maybe somebody started a Tor relay after breaking into them?
Is that a reason to *not* flag them as BadExit?
I mentioned the sentence above (compromising legit relays) since that
would/should influence the decision whether a group of relays operated
by one entity should be treated as 'bad' if one behaves 'bad'.
>> Did you (or anyone else?) try to reach out to them via their
> Not yet, but I hope to get to it later today.
Thanks for doing this, keep us posted.
(I was also about to ask the hoster whether some IPs relate to the
same customer but I'll leave it to you then.)
> It's certainly odd that all these relays were in only a few data
Why is that odd? I thought that is good as it makes detection
potentially easier if bad guys use just a single or few ISPs, no?
I was also wondering whether current doctor should trigger on events
like the one on 2015-04-01.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
tor-talk mailing list - email@example.com
To unsubscribe or change other settings go to