Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
What Happens When Anonymous Gets a Bank?
#61
This story is getting very weird - when people start dying over bitcoins. If you really want to plumb the depths of some of this...here is the place...or one of them https://bitcointalk.org/index.php?topic=504715.0
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#62
I just discovered there is an 'exchange' for the different cryptocurrencies! https://c-cex.com/?p=btc-usd
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#63
Worth checking some of the comments at the article too.

Quote:

Analyzing the FBI's Explanation of How They Located Silk Road

Sunday, September 7, 2014

The first incarnation of online drug marketplace Silk Road was shutdown in October 2013 resulting in the arrest of Ross Ulbricht. In the indictment the Department of Justice contend that Ulbricht was Dread Pirate Roberts, the owner and administrator of Silk Road. The case has been in pretrial for some time now, with defense lawyers contesting many elements as part of a large and broad motion to dismiss (subsequently denied) and other filings.
The marketplace was hosted as a hidden service on Tor, a distributed network that provides a layer of anonymity for web and other traffic on the internet. Edward Snowden's leaks revealed that the NSA target Tor users and that the agency has struggled to deanonymize users on the network.
One of the big outstanding issues was how the FBI managed to uncover the real IP address of the server hosting the Silk Road. The indictment is intentionally vague on the details of how the server was discovered, and the issue is important since a large number of users (numbering in the millions) rely on the Tor software network to protect their identity.
Last month Ulbricht's lawyers filed a motion seeking to uncover details on how the FBI located the server. The core of the issue for the defense is if the FBI violated Ulbricht's Fourth Amendment right to privacy in tracking down the server IP address by using any unlawful techniques or a method that would have required a warrant. If the evidence is found to have been obtained unlawfully, then much of the case against Ulbricht would collapse as all subsequent evidence discovered as a result of the server being uncovered would be ruled inadmissible.
On Friday Wired reported that the FBI had responded with their own filing detailing how they uncovered the server:
The FBI claims to have found the server's location without the NSA's help, simply by fiddling with the Silk Road's login page until it leaked its true location.
[..]
they found a misconfiguration in an element of the Silk Road login page, which revealed its internet protocol (IP) address and thus its physical location.
The government response consists of first the DOJ filing, and then the affidavit from the FBI tech team (PDF). The affidavit is more interesting since it delves into the "tech" of how the server was uncovered. Breaking it down:
The first three sections go into the background and experience of the team investigating. The fourth briefly explains what Tor is, its purpose and how it works. The fifth section opens with:
In order for the IP address of a computer to be fully hidden on Tor, however, the applications running on the computer must be properly configured for that purpose. Otherwise, the computer's IP address may "leak" through the traffic sent from the computer. See, e.g., Tor Project, Guide on How to Tor-ify Various Applications, https://trac.torproject.org/projects/tor/ wiki/doc/TorifyHOWTO ("Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor.").
This is true there are many, many ways that a Tor configuration can leak and reveal details about a user that could lead to them being identified. The cited wiki page on the Tor project website lists a number of the potential leaks. One problem the page they link to and cite refer to Tor clients not hidden services. The leak issues and attack vectors on that page are for end users of Tor browsing the web or hidden services (it goes into how to use an isolating proxy, how to torify certain applications such as email and irc clients, etc.), they don't apply to Tor hidden services and servers.
The only page for hidden services is on the main Tor project website, and all it says about "leaks" for servers is:
You need to configure your web server so it doesn't give away any information about you, your computer, or your location. Be sure to bind the web server only to localhost (if people could get to it directly, they could confirm that your computer is the one offering the hidden service). Be sure that its error messages don't list your hostname or other hints. Consider putting the web server in a sandbox or VM to limit the damage from code vulnerabilities.
The reason why there isn't a longer page on hidden service leaks is because there isn't much to add. Tor operating as a hidden service doesn't leak information directly, the risk is at the application layer. The advice found at the Tor website, as well as in similar tutorials such as at the Whonix project, are all about setting up your web server so that it doesn't do anything silly such as include its IP address in the server signature. This is an entirely separate class of "leaks" to those described on the Tor wiki page cited in the FBI affidavit.
The affidavit goes on to say:
During the course of the FBI's investigation of the Silk Road website, the SR Server was located by myself and another member of the CY-2 squad of the FBI New York Field Office as a result of such a leak.
They couldn't have been using a leak described in the cited Tor wiki page, since they only apply to Tor clients. The FBI indictment and affidavits make no mention of the Silk Road server being used as a client, but it does describe other servers that Silk Road administrators were using as either Tor clients or bridges. The first step in setting up a hidden service on Tor is to disable the client functionality (and even were it left enabled, it would only be listening on localhost as default and would not be used).
Further, onto sections 6, 7 and 8 :
6. The IP address leak we discovered came from the Silk Road user login interface.
[..]
7. In or about early June 2013, another member of CY-2 and I closely examined the traffic data being sent from the Silk Road website when we entered responses to the prompts contained in the Silk Road login interface. This did not involve accessing any administrative area or "back door" of the site. We simply were interacting with the website's user login interface, which was fully accessible to the public, by typing in miscellaneous entries into the username, password, and CAPTCHA fields contained in the interface. When we did so, the website sent back data to the computer we were using specifically, the Silk Road homepage, when we used valid login credentials for undercover accounts we had on the site, or an error message, when we used any username, password, or CAPTCHA entry that was invalid.
8. Upon examining the individual packets of data being sent back from the website,3 we noticed that the headers of some of the packets reflected a certain IP address not associated with any known Tor node as the source of the packets. This IP address (the "Subject IP Address") was the only non-Tor source IP address reflected in the traffic we examined. The Subject IP Address caught our attention because, if a hidden service is properly configured to work on Tor, the source IP address of traffic sent from the hidden service should appear as the IP address of a Tor node, as opposed to the true IP address of the hidden service, which Tor is designed to conceal. When I typed the Subject IP Address into an ordinary (non-Tor) web browser, a part of the Silk Road login screen (the CAPTCHA prompt) appeared. Based on my training and experience, this indicated that the Subject IP Address was the IP address of the SR Server, and that it was "leaking" from the SR Server because the computer code underlying the login interface was not properly configured at the time to work on Tor.
These are the key pieces of information the actions the agents took to uncover the IP address. This description raises more questions than it answers.
Anybody with knowledge of Tor and hidden services would not be able to read that description and have a complete understanding of the process that the agents followed to do what they claim to have done. Were the Silk Road site still live today, and in the same state it was as in back in June 2013 when the agents probed the server, you wouldn't be able to reproduce or recreate what the agents describe in the affidavit.
This is why there are so many different theories now on how they achieved what they claim to have achieved. The first conclusion to come out of this filing was the "leaky CAPTCHA" theory. This theory does not stand up to scrutiny because the Silk Road image CAPTCHA was hosted on the same server and at the same hidden URL as the Silk Road website. It was not, contrary to some reports, a third-party CAPTCHA. The CAPTCHA image was produced by a script that sat alongside the login and authentication endpoints.
The CAPTCHA being hosted on the same server and endpoint as the main Silk Road application caused the site problems. Since generating a CAPTCHA is resource intensive, there was a DoS attack against Silk Road which did nothing more than continuously request CAPTCHA images. The site was later modified to use cached versions of the CAPTCHA images, but these too were served from the same host and onion as the web application.
Note: I would cite more sources here, but a lot of this is from my own memory. I spent a lot of time investigating and testing the security of Silk Road (for sport) and became familiar with both its architecture and operation over the entire duration that the first site was up. I have Burp sessions of Silk Road stored somewhere which I will have to dig up if anybody else has any screenshots or mirrors of Silk Road from this time i'd love to hear from them.
The idea that the CAPTCHA was being served from a live IP is unreasonable. Were this the case, it would have been noticed not only by me but the many other people who were also scrutinizing the Silk Road website. Silk Road was one of the most scrutinized sites on the web, for white hats because it was an interesting challenge and for black hats since it hosted so many bitcoin (with little legal implication if you managed to steal them).
The second theory, that the agents "discovered" the real IP address by just looking at packet captures produced by a sniffer is similarly impossible. This also would have been discovered much sooner and noticed by most of the internet very quickly.
There is another related hole in the FBI theory related to the "packet sniffer." If you are observing a hidden site on Tor, it means you are routing all of your traffic in that session over the Tor network (using your local SOCKS or HTTP proxy server). Even in the hypothetical case where for some unrealistic reason the Silk Road hidden site was including an image on an external server by referencing its IP address or hostname, the agents would still observe this traffic as having come from Tor. There is no magic way that the traffic from a real IP embedded within the HTML of a hidden service would find its way directly to a client without passing over the Tor network and through Tor nodes. Were this the case, it would be a huge vulnerability in Tor, as it would allow the administrator of a hidden site to uncover visitors by including an element that is served directly to the client over clearnet (thankfully it isn't and this doesn't work try it).
No matter how much the agents entered "miscellaneous entries" into the login form fields, and no matter what they caused the server to respond, at no time would it have been possible for a layer 3/4 sniffer to see the real IP address it only ever would have seen Tor nodes, even if it had been accessing the real IP address.
Filling the login form with junk could only ever have altered what appeared in the application layer, and it is at the application layer that the FBI uncovered the IP address.

A More Likely Scenario

Since the FBI explanation doesn't hold up to the IP address being revealed at lower layers, and since "typing in miscellaneous entries into the username, password, and CAPTCHA fields" (aka fuzzing) could only alter application-layer data, we need to find an explanation for what the FBI did that fits both the reality of how Tor, hidden services and the Silk Road application work and what the FBI are describing in their legal affidavit.
The FBI affidavit wouldn't mention fuzzing if it wasn't required to, so this must play an important part of their method. We know that the Silk Road server didn't simply volunteer its IP address to every visitor, but we do know that the Silk Road application suffered from numerous security flaws during its lifetime.
Ross Ulbricht was not an experienced programmer and was learning how to develop web applications and write PHP at the same time as he was implementing the Silk Road web application. He (according to the DOJ) posted a question to Stack Overflow asking how to connect to a hidden service using PHP and Curl. The lax security of the web application lead to Silk Road being hacked a number of times and the personal data of users and vendors being leaked (DPR paid off at least one hacker who threatened to release data).
A much more plausible explanation is that the FBI discovered a security exploit or information leak in the login page, in the same way a number of other people discovered similar security holes or information leaks in both the login page and the Silk Road application itself.
There is a history of users reporting such security exploits and information leaks in Silk Road on various forums. On the 27th of March 2013 a user posted on reddit "WARNING: The Silk Road Revealed it's Public IP Last Night":
I am a penetration tester by trade, and while I do not use SR, I do occasionally conduct informal tests of the security of various Tor Hidden Services.
[..]
Last night, while SR was down for maintenance, a brief few moments allowed a certain set of circumstances that caused me to be able to view the public IP of the httpd server of Silk Road. This isn't an obvious flaw, but it is extremely simple if you know where to look the server basically will publish a page containing all of the configuration data of the httpd server including the public IP address.
I referenced that thread in my answer on Stack Exchange on how the Silk Road server may have been discovered shortly after the site was taken down.
"If you know where to look", as mentioned in the comment, is a suggestion that a hidden URL was found, or the login form was forced to error and produce some debug output.
Further, on the 3rd of May 2013 there was a similar warning from another user on reddit, "Should we be worried? Showing on login page"
[Image: sr_reddit_screnshot.png]
If this isn't familiar to you, it is a var_dump of PHP's $_SERVER variable. It would suggest somebody was debugging a problem on the server and editing live code, using the var_dump function to debug a problem (and inexperienced programmer would both edit on a live server and use var_dump to debug).
Further, these two dates and IP leaks are supported in the FBI's own affidavit. In a footnote they mention:
After Ulbricht's arrest, evidence was discovered on his computer reflecting that IP address leaks were a recurring problem for him. In a file containing a log Ulbricht kept of his actions in administering the Silk Road website, there are multiple entries discussing various leaks of IP addresses of servers involved in running the Silk Road website and the steps he took to remedy them. For example, a March 25, 2013 entry states that the server had been "ddosd" i.e., subjected to a distributed denial of service attack, involving flooding the server with traffic which, Ulbricht concluded, meant "someone knew the real IP." The entry further notes that it appeared someone had "discovered the IP via a leak" and that Ulbricht "migrated to a new server" as a result. A May 3, 2013 entry similarly states: "Leaked IP of webserver to public and had to redeploy/shred [the server]." Another entry, from May 26, 2013, states that, as a result of changes he made to the Silk Road discussion forum, he "leaked [the] ip [address of the forum server] twice" and had to change servers.
Ulbricht made his diary entry on the 25th of March, the first leak was posted to reddit on the 27th. The second leak was posted to reddit on the 3rd of May, the exact date that Ulbricht notes in his diary.
The FBI agents state that their investigation was carried out "In or about early June 2013″, and that they had the IP by the 12th of June since that is when they sent the request for a mirror of the server to be made by the authorities in Iceland (where the server was located).
The FBI investigation and uncovering of the IP address was taking place at the exact same time bugs that were known to expose the IP address of Silk Road were present on the site. A more likely scenario for how the FBI uncovered the real IP address would thus be that they either saw the debug information, or more likely took advantage of a security vulnerability in the login page and forced the server to output its $_SERVER variable (which includes the real IP (although it shouldn't)).
This would explain why the FBI included the statement about "typing in miscellaneous entries into the username, password, and CAPTCHA fields", because they needed to enter an exploit command to prompt the server to either dump or produce the IP address variable.
In this scenario, the description of packet sniffers and "inspecting each packet" is all a distraction from what the FBI really did. Technically, saying that a packet sniffer revealed the true IP address of the server is true what isn't mentioned is the packet sniffer was picking up responses from a request to the login page that was forcing it to spit out the IP address as part of a bug.
The FBI have good reason to not mention any bugs or forcing the server to do anything, and to pretend that they simply picked up the IP address from the wire, since such actions would raise concerns about how lawful their actions in uncovering the IP address were. What we do know is that their description of "packet sniffing" for the IP through a "leak" is impossible.
Thanks to: harisec, thegrugq and the ever useful Silk Road timeline by moustach for links and tips.

Addendum

1. If you still believe that the server was discovered in the way the FBI described it try it. I did. I setup a virtual machine with a web server running a Tor hidden server. I then accessed the hidden server over Tor and looked at the traffic. No matter how much I intentionally misconfigured the server, or included scripts from clearnet hosts, I never observed traffic from a non-Tor node or a "real" IP address.
2. Many enquiries in various comment threads about how best to setup a hidden service so that application layer bugs won't expose your real IP address. The answer is to host the web application in a virtual machine that is on a private network isolated behind a gateway that will only forward Tor traffic. This also works for Tor clients (to prevent malware based attacks such as the that used by the FBI). I'll likely write up details for both client and server isolated VM setups in the future.


https://www.nikcub.com/posts/analyzing-f...silk-road/
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Wells Fargo bank exec, who supervised creation of 2 mllion fake accounts, scores $125M payday Drew Phipps 0 5,228 13-09-2016, 01:32 AM
Last Post: Drew Phipps
  Deutsche Bank Blows Lid on Cartel who Fixes Gold Price David Guyatt 7 8,302 23-04-2016, 09:42 AM
Last Post: David Guyatt
  Iceland looks at removing commercial bank money making Magda Hassan 2 7,303 16-04-2015, 06:26 PM
Last Post: R.K. Locke
  Asian Infrastructure Investment Bank Magda Hassan 2 7,069 21-03-2015, 09:30 AM
Last Post: David Guyatt
  The World Bank - Exporting Debt Bondage as a Weapon of Control David Guyatt 0 3,250 01-02-2015, 12:26 PM
Last Post: David Guyatt
  Game Changer - The New BRICS Development Bank David Guyatt 14 11,454 13-09-2014, 04:34 AM
Last Post: Lauren Johnson
  Vatican Bank Magda Hassan 47 35,092 25-06-2014, 02:49 PM
Last Post: Peter Lemkin
  Did Bank of England allow forex market manipulation? David Guyatt 6 4,347 21-03-2014, 06:26 PM
Last Post: David Josephs
  Bill Black: How to Rob a Bank Lauren Johnson 1 2,562 13-03-2014, 10:12 AM
Last Post: David Guyatt
  Bank bosses circumvent European bonus cap law David Guyatt 0 2,479 22-02-2014, 09:52 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)