[tor-talk] I've yet to understand <clock skew> attacks on hidden services
Robert Ransom
rransom.8774 at gmail.com
Tue Sep 6 15:12:52 UTC 2011
On 2011-08-20, hikki at safe-mail.net <hikki at safe-mail.net> wrote:
> I've read a lot about it, but I'm hoping for a simplified explanation for a
> simplified guy. ;)
>
> If my hidden service server has a clock that is 5 minutes wrong, how can
> anyone use that to locate me?
They can only use that to locate your server if they can either
connect to it directly (not through Tor) or accept a non-Torified
connection from it, and determine what your server thinks is the
current time based on information it receives on that connection.
The obvious ways that your server could leak its current time include
running a web server and sending e-mail messages. The less obvious
ways include opening an outbound TLS connection and running a cron job
with externally observable effects (e.g. an automatic update
downloader).
Robert Ransom
More information about the tor-talk
mailing list