Home

Aug 5, 2020

Disgruntled Researcher Drops Two Tor (0Days?) Vulnerabilities – Promises More Soon!

authorarticle: Master3395
Tor.jpg
video: 
youtube: 
sources: 
keywords: browser, browser vulnerability, exploiting tor, tor, tor browser, TOR browser zero day, TOR bug, tor project, Tor users, TOR vulnerability, vulnerability, Zero Day, Zero-Day Flaw
Category: General
Posted by: Admin

An angry researcher has dropped two Tor vulnerabilities (he calls them 0day) for similar reasons. He also pledges to drop more such bugs in the days to come.

Unpatched Tor Vulnerabilities Dropped Online Security researcher Dr. Neal Krawetz has dropped two unpatched Tor vulnerabilities online. He calls both the bugs 0days since they aren’t known or fixed. These public disclosures result from his bad experience in the past while disclosing vulnerabilities to The Tor Project. While he has detailed his experience along with some past bugs he reported, in his blog post, here we quickly review the recently disclosed vulnerabilities. The first of the two revolves around blocking users from connecting to the Tor network. As described in his blog post, Tor relies on randomly-generated TLS certificates that bear a distinct pattern. These TLS certificates are small enough to fit in a packet. Hence, a packet scanner can let the organizations track anyone attempting to connect to Tor. As stated,

When the packet sniffer sees a TLS server-side certificate, it generates a signature. If the signature matches the pattern for a Tor server, the scanner flags the connection as a Tor connection.

The second 0day explained in another blog post, also relates to blocking Tor network. This one specifically aims at detecting indirect connections to Tor. Tor offers bridges as a workaround for the users to evade blocking and connect to the Tor network. Bridges are Tor nodes not known to authorities censoring the Tor network.

However, TCP packet sniffing can once again help in blocking these indirect connections. Tor Projects Disagrees To Call The Bugs ‘Zero-day’ While Dr. Krawetz clearly calls both the bugs ‘zero-day’, The Tor Project disagrees. Briefly, they don’t consider these issues zero-day because the bugs are known and their researchers are working on them. Secondly, they do not agree with the threat severity as they believe the bugs can’t be enforced at scale.

They have shared a detailed response to ZDNet regarding Dr. Krawetz’s findings. Whenever security researchers get annoyed because a vendor did not listen to their report, the revenge comes in the form of disclosure of unpatched bugs online. It then depends on whether the bugs should be called zero-day or not.

Nonetheless, what remains crucial is to avoid any exploitation by patching the bugs at the earliest. Given the critical nature of Tor, let’s hope that the conflict resolves soon. And that the bugs remain unexploited to not result in a real-time disaster. Let us know your thoughts in the comments.

 

authorarticle: Master3395
Tor.jpg
video: 
youtube: 
sources: 
keywords: browser, browser vulnerability, exploiting tor, tor, tor browser, TOR browser zero day, TOR bug, tor project, Tor users, TOR vulnerability, vulnerability, Zero Day, Zero-Day Flaw

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 564  >  >>

The new version of Windows 10 is more or less finished

2004.webp

Sep 22, 2020 | Category: Microsoft | Comments

Launched next month, is in the final test period.

read more…

Mozilla tightens belt, folds two Firefox services

mozilla.jpg

Sep 21, 2020 | Category: General | Comments

The Firefox browser maker is having to trim its sails again.

read more…

The United States bans TikTok and WeChat on Sunday

Tiktok.jpg

Sep 20, 2020 | Category: General | Comments

It is now known that the USA will ban WeChat and TikTok from the Apple App Store in the USA next Sunday.

read more…

Page 1 of 564  >  >>