4.9 • 696 Ratings
🗓️ 27 May 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Friday, May 27th, 2016 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Orich, and today I'm recording from Seattle, Washington. |
| 0:13.1 | Xavier published today a diary about how to identify connections coming from tour exit notes. This has been a problem for some sites that experienced a lot of attacks emerging from the Tor network. |
| 0:28.6 | Of course there are other VPNs out there that have similar effects, but one of the advantages of Tor is that there are published lists of exit notes, so it's |
| 0:40.5 | relatively easy to identify them, while some of the other VPN solutions to sort of go out |
| 0:48.0 | of their way to make it difficult to identify their exit points. |
| 0:53.3 | Another problem with Torr can also be that users in your network are using it in order to evade |
| 1:00.3 | egress policies. |
| 1:02.5 | Identifying outbound Tor connections can not be done via the exit nodes. |
| 1:08.3 | However, usually you can identify them by looking for a zel |
| 1:12.1 | connections with specific certificates used by Torr and speaking about Torr the |
| 1:19.4 | next version of Tor also known as Proposal 224 has been successfully |
| 1:27.0 | tested for the first time in this particular |
| 1:30.5 | test multiple servers were stood up with the new software running and then they |
| 1:37.3 | actually intentionally took down some of these servers during critical phases |
| 1:41.7 | off the protocol and the network as as they say, behaved as expected. |
| 1:48.0 | Now, one interesting feature that this new version of Tor Includes is a distributed random number generator. |
| 1:54.6 | Generating good random numbers is always a big challenge, and in this case, one way this challenge is addressed by |
| 2:01.9 | actually having multiple systems cooperate to come up with a good random |
| 2:08.6 | numbers so the idea here is that whatever bias a particular system has in |
| 2:13.9 | generating random numbers the other systems will make up for it. |
| 2:18.3 | We'll have to see how this will work out in real-life network and whether or not this |
| 2:25.3 | distributed random number system can be used somehow against Tor. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.