[tor-onions] brute forcing Onion domains
teor
teor at riseup.net
Mon Apr 27 00:52:35 UTC 2020
Hi,
V2 onions are a truncated SHA1. Doing an entire hash is expensive.
V3 onions are an ed25519 key plus a suffix. So if you're just looking
for a prefix, you can choose a random value. Then increment by the
basepoint until you find the prefix you want. (This is a relatively
cheap operation, because you're just adding 255-bit numbers.)
You can save the expensive suffix calculations for the final
candidate keys.
Here's one implementation:
https://github.com/Yawning/horse25519/blob/master/src/horse25519.c#L209
This is a summary: there are a few important details to get right,
like key masking and security.
T
--
teor
----------------------------------------------------------------------
> On 27 Apr 2020, at 06:37, niftybunny <abuse-contact at to-surf-and-protect.net> wrote:
>
> Hi there,
>
> quick question. Is there a fundamental time difference between brute forcing V3 to V2 Onion domains or did my 4 lucky feet just stopped working?
>
> niftybunny
>
>
> _______________________________________________
> tor-onions mailing list
> tor-onions at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20200427/4b4b4176/attachment.html>
More information about the tor-onions
mailing list