Difference between revisions of "The Onion Router"

From Forensics Wiki
Jump to: navigation, search
(New page: '''Tor''' ('''The Onion Router''') is an implementation of second-generation onion routing. == Overview == Tor is a distributed censorship-resistant network designed to anonymize TCP-base...)
 
m
Line 12: Line 12:
  
 
'''Eavesdropping by exit nodes'''
 
'''Eavesdropping by exit nodes'''
 +
 
Tor doesn't encrypt traffic between an exit node and the target server, so exit nodes are able to capture all unencrypted traffic.
 
Tor doesn't encrypt traffic between an exit node and the target server, so exit nodes are able to capture all unencrypted traffic.
 
Malicious exit nodes can perform man-in-the-middle attacks on encrypted protocols.
 
Malicious exit nodes can perform man-in-the-middle attacks on encrypted protocols.

Revision as of 03:43, 1 June 2008

Tor (The Onion Router) is an implementation of second-generation onion routing.

Contents

Overview

Tor is a distributed censorship-resistant network designed to anonymize TCP-based applications.

Attacks

Timing attacks

Misconfigured software

TLS attacks

Eavesdropping by exit nodes

Tor doesn't encrypt traffic between an exit node and the target server, so exit nodes are able to capture all unencrypted traffic. Malicious exit nodes can perform man-in-the-middle attacks on encrypted protocols.

Hidden services

External Links