[tor-relays] Strange BGP activity with my node
charlie
contact at charlieluna.com
Mon May 14 18:19:31 UTC 2018
in the current state of society with certain governmental agencies
performing things the way they are, i don't trust any ISP anymore or
government agency anymore. the apology from that ISP, in my opinion,
smells like the worst pile of crap ever. i don't buy it.
i wish there was a way for us to run a TOR network without having to be
on an ISP's network.
On 05/14/2018 10:39 AM, Trevor Ellermann wrote:
> Thanks for the responses. To follow up this is how the offending ISP
> responded to our inquiries. I do not believe any further follow up is
> necessary.
>
> *snip*
> Thank you for getting in touch.
>
> I am afraid an engineer made an error in the BGP configuration of one
> of our devices earlier this afternoon, which resulted in a number a
> host routes being inadvertently announced to certain of our upstream
> providers.
>
> The route itself existed as part of a set of prefixes internally
> routed to null on our network. This particular IP hosts a TOR relay
> node, and while that is perfectly legitimate we have a business
> requirement to block access to these internally:
>
> https://metrics.torproject.org/rs.html#details/383D6E34D9BEA92E97092B134A708EEF476DF2E4
> <https://metrics.torproject.org/rs.html#details/383D6E34D9BEA92E97092B134A708EEF476DF2E4>
>
> The route should never have been announced outside our own AS.
> Unfortunately due to human error it was advertised earlier today (May
> 9th) from approx. 11:04 to 11:10 UTC. I can assure you this was an
> unintentional error, we had no desire to interrupt or affect
> communications outside our AS. The mistake was quickly spotted by our
> own NOC team and reverted.
>
> I hope you can accept our sincere apologies for this issue, we have
> taken steps to ensure that any similar mistake will not have such
> impact in future.
> *snip*
>
> On Wed, May 9, 2018 at 11:54 AM, grarpamp <grarpamp at gmail.com
> <mailto:grarpamp at gmail.com>> wrote:
>
> On Wed, May 9, 2018 at 2:06 PM, Trevor Ellermann
> <trevor at ellermann.net <mailto:trevor at ellermann.net>> wrote:
> > I just a notification from my data center that someone is trying
> to hijack
> > the IP of my exit node. Seems like the sort of thing someone
> might do when
> > trying to attack Tor. I'm in a very remote area with limited
> access but any
> > suggestions on actions I should take?
>
> Make sure your box and keys aren't compromised.
> If that's ok, best they can do if the announcements are
> listened to is camp on the ip for a while using their own keys,
> (there might be some identification attacks made possible with
> such a transient reroute,) circuits would fail till the consensus
> updated to them, but there could be some duplicate ip split horizon
> issues involved due to filtering.
> If they hacked the boxes there's hardly need to expend noisy
> reroutes when they can do most attacks using the box itself.
>
> Hop on the route servers or your other favorite interfaces
> to the net and analyze who all is announcing /32's trying to
> cover any other tor nodes.
>
> Sane isp's will filter such things without prior coordination.
> It's fairly rare,
> and for them to bother giving customers courtesy reports. Though
> depending on nature of ticket / relationship with GBLX, you might want
> to reply saying you've never worked with Asavie and don't approve
> of the action regarding your IP.
>
> You can also search AS200005 to see what kind of heat
> they catch from other operators / internet analysis tools.
>
> > ====================================================================
> > Possible Prefix Hijack (Code: 10)
> > ====================================================================
> > Your prefix: 204.17.32.0/19 <http://204.17.32.0/19>:
> > Prefix Description: GBLX-US-BGP
> > Update time: 2018-05-09 12:11 (UTC)
> > Detected by #peers: 1
> > Detected prefix: 204.17.56.42/32 <http://204.17.56.42/32>
> > Announced by: AS200005 (Asavie Technologies Limited)
> > Upstream AS: AS200005 (Asavie Technologies Limited)
> > ASpath: 200005
> >
> >
> >
> https://torstatus.blutmagie.de/router_detail.php?FP=383d6e34d9bea92e97092b134a708eef476df2e4
> <https://torstatus.blutmagie.de/router_detail.php?FP=383d6e34d9bea92e97092b134a708eef476df2e4>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> <mailto:tor-relays at lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20180514/91b398b8/attachment.html>
More information about the tor-relays
mailing list