【24h】

'Major Key Alert!' Anomalous Keys in Tor Relays

机译:“主要按键警报!” Tor继电器中的异常键

获取原文

摘要

In its more than ten years of existence, the Tor network has seen hundreds of thousands of relays come and go. Each relay maintains several RSA keys, amounting to millions of keys, all archived by The Tor Project. In this paper, we analyze 3.7 million RSA public keys of Tor relays. We (ⅰ) check if any relays share prime factors or moduli, (it) identify relays that use non-standard exponents, (Hi) characterize malicious relays that we discovered in the first two steps, and (ⅳ) develop a tool that can determine what onion services fell prey to said malicious relays. Our experiments revealed that ten relays shared moduli and 3,557 relays—almost all part of a research project—shared prime factors, allowing adversaries to reconstruct private keys. We further discovered 122 relays that used non-standard RSA exponents, presumably in an attempt to attack onion services. By simulating how onion services are positioned in Tor's distributed hash table, we identified four onion services that were targeted by these malicious relays. Our work provides both The Tor Project and onion service operators with tools to identify misconfigured and malicious Tor relays to stop attacks before they pose a threat to Tor users.
机译:在其十多年的发展中,Tor网络已经见证了成千上万的继电器来来去去。每个中继都维护着多个RSA密钥,总计达数百万个密钥,所有这些密钥均由The Tor Project存档。在本文中,我们分析了370万个Tor中继的RSA公钥。我们(ⅰ)检查是否有任何中继共享素数或模数,(它)识别使用非标准指数的中继,(Hi)表征在前两个步骤中发现的恶意中继,并且(ⅳ)开发一种工具可以确定哪些洋葱服务成为了恶意中继的牺牲品。我们的实验表明,十个中继共享模数,而3557个中继(几乎是研究项目的所有部分)共享素数,从而使对手可以重建私钥。我们还发现了122个使用非标准RSA指数的中继,大概是为了攻击洋葱服务。通过模拟洋葱服务在Tor的分布式哈希表中的位置,我们确定了这些恶意中继所针对的四个洋葱服务。我们的工作为Tor项目和洋葱服务运营商提供了工具,以识别配置错误和恶意的Tor中继,从而在对Tor用户造成威胁之前阻止攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号