ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.
The Onion Router
Tor (The Onion Router) is an implementation of second-generation onion routing.
Tor is a distributed censorship-resistant network designed to anonymize TCP-based applications.
Tor fails when the attacker can correlate timing patterns on both ends of the communications channel.
- DNS leaks
Some applications do name resolution directly (bypassing Tor proxy). In this case lookup requests leak significant information (e.g. web site being visited).
- Web browsers
- Enabled scripts: Java and Flash applets may leak real IP address (see Metasploit Decloaking Engine);
- Enabled cookies: web server can identify clients using unique cookies.
- Direct connections in Instant Messaging (MSN, ICQ, etc) also leak real IP address
Various deviations of system time can be detected in TLS traffic (e.g. HTTPS traffic). Attacker can modify system time of the target computer (or group of them) via NTP and easily trace TLS connections from anonymous network.
Eavesdropping by exit nodes
Tor doesn't encrypt traffic between an exit node and the target server, so exit nodes are able to capture all unencrypted traffic. Malicious exit nodes can perform man-in-the-middle attacks on encrypted protocols.
Location hidden services are also vulnerable to timing correlation attack.