Category: General|Aug 5, 2020 | Author: Admin

Disgruntled Researcher Drops Two Tor (0Days?) Vulnerabilities – Promises More Soon!

Share on

An angry researcher has dropped two Tor vulnerabilities (he calls them 0day) for similar reasons. He also pledges to drop more such bugs in the days to come.

Unpatched Tor Vulnerabilities Dropped Online Security researcher Dr. Neal Krawetz has dropped two unpatched Tor vulnerabilities online. He calls both the bugs 0days since they aren’t known or fixed. These public disclosures result from his bad experience in the past while disclosing vulnerabilities to The Tor Project. While he has detailed his experience along with some past bugs he reported, in his blog post, here we quickly review the recently disclosed vulnerabilities. The first of the two revolves around blocking users from connecting to the Tor network. As described in his blog post, Tor relies on randomly-generated TLS certificates that bear a distinct pattern. These TLS certificates are small enough to fit in a packet. Hence, a packet scanner can let the organizations track anyone attempting to connect to Tor. As stated,

When the packet sniffer sees a TLS server-side certificate, it generates a signature. If the signature matches the pattern for a Tor server, the scanner flags the connection as a Tor connection.

The second 0day explained in another blog post, also relates to blocking Tor network. This one specifically aims at detecting indirect connections to Tor. Tor offers bridges as a workaround for the users to evade blocking and connect to the Tor network. Bridges are Tor nodes not known to authorities censoring the Tor network.

However, TCP packet sniffing can once again help in blocking these indirect connections. Tor Projects Disagrees To Call The Bugs ‘Zero-day’ While Dr. Krawetz clearly calls both the bugs ‘zero-day’, The Tor Project disagrees. Briefly, they don’t consider these issues zero-day because the bugs are known and their researchers are working on them. Secondly, they do not agree with the threat severity as they believe the bugs can’t be enforced at scale.

They have shared a detailed response to ZDNet regarding Dr. Krawetz’s findings. Whenever security researchers get annoyed because a vendor did not listen to their report, the revenge comes in the form of disclosure of unpatched bugs online. It then depends on whether the bugs should be called zero-day or not.

Nonetheless, what remains crucial is to avoid any exploitation by patching the bugs at the earliest. Given the critical nature of Tor, let’s hope that the conflict resolves soon. And that the bugs remain unexploited to not result in a real-time disaster. Let us know your thoughts in the comments.

 

Sponsored Ads:

Comments:


LG has launched 48 ″ OLED gaming screen

Category: General|May 27, 2022 | Author: Admin

This is Microsoft's “Mac Mini”

Category: Microsoft|May 26, 2022 | Author: Admin

Modern Warfare 2 launches on October 28

Category: IT|May 25, 2022 | Author: Admin

Apple wrecks iPhone 14 manufacturer

Category: Apple|May 24, 2022 | Author: Admin

This projector will be a TV

Category: IT|May 23, 2022 | Author: Admin

iPhone error disables iMessage and FaceTime

Category: Apple|May 22, 2022 | Author: Admin

Microsoft refuses to let you do that, but you can fool them

Category: Microsoft|May 21, 2022 | Author: Admin

The iPhone feature you've never tested is awesome

Category: Apple|May 20, 2022 | Author: Admin

What, even more betas ?!

Category: Apple|May 19, 2022 | Author: Admin

iOS 15.5 and macOS 12.4 have been launched

Category: Apple|May 18, 2022 | Author: Admin

Norway’s national day

Category: General|May 17, 2022 | Author: Admin

This may be the date of the new Windows 11

Category: Microsoft|May 16, 2022 | Author: Admin

The speakers on the Deer MacBook Pro fail

Category: General|May 15, 2022 | Author: Admin

There will be a cheaper Apple TV claiming top-notch

Category: Apple|May 14, 2022 | Author: Admin

Starfield is postponed until next year

Category: General|May 13, 2022 | Author: Admin
more