Hacker News new | past | comments | ask | show | jobs | submit login
Russia offers $110,000 to crack Tor anonymous network (bbc.com)
149 points by theklub on July 28, 2014 | hide | past | favorite | 79 comments



How on Earth is $110,000 a reasonable value for this level of vulnerability? (And with a multi-thousand dollar up front cost to boot.) I'm not remotely an expert on security, much less nefarious black-market hacks, but I would think that a whole lot of nations around the world would be willing to pay millions (each!) for this capability. Heck, if not for this, I would have included Russia on that list.


The "hackathon" spirit has caught on at the state level. Get a bunch of college kids to slave away for free and give the best one a paltry sum for their efforts and retain all rights to the work.


How is that the "hackathon" spirit?


It's the spirit ever since the term "hackaton" caught the attention of the employers and the events are organized by companies for their profit instead of hobbysts/enthusiasts just for fun.


For ex: Hackathon's shouldn't primarily be about cash prizes. It defeats the purpose and ideology behind hacking culture.


Isn't that the parent comment's point? That it's such a relatively small amount of money that the only people who are into hacking stuff anyway would attempt it.


There shouldn't be any money at all in hackathons, it should be voluntary and tinkering/hacking on technololgy for fun or societal benefit. This is for a project with a well-defined goal defined by a large government that may be used against dissidents by a authoritarian state.

That doesn't quite fit into hacker culture at all.

If they aren't going to hire a well-paid hackers full-time like the NSA does to do the same thing, then at least make the prize significant similar to X-prize.


They should have just put the proposal on elance


They may not intend to pay it. Just inspiring worries about the safety of TOR might be enough for their nefarious purposes.


I saw this headline and immediately thought, "that's much too low."

But I've got no idea how much that vulnerability would actually go for. Millions? Tens of millions? Anyone with a stronger understanding of the market have any rough estimate?


I'm like you, I'm not sure how to assign a dollar value to this vulnerability. The implications of a broken TOR are huge for all players, especially over time. Considering TOR protects the livelihood (and lives even) of so many people who employ it, it doesn't seem unreasonable to put the ticket price up in the tens of millions to me. TOR's mission-critical for the work of a lot of folks, shady-dealings or no.


As Schneier says:

"The reward of $114,000 seems pretty cheap for this capability. And we now get to debate whether 1) Russia cannot currently deaonymize Tor users, or 2) Russia can, and this is a ruse to make us think they can't."

https://www.schneier.com/blog/archives/2014/07/russia_paying...


Assuming Russia can deanonymize Tor users, isn't this a way of finding out "who else out there can denonymize Tor users", and later question these people very gently "what else can you do?"

I wouldn't disclose something like this to the big boys , as it would reveal far too much about my own capabilities and/or connections.


That's because they're asking if someone's done it and wants some cash. If you had, monetizing the knowledge isn't exactly easy. No intelligence agency will bother paying for it.


Why wouldn't they? This is exactly the stuff I'd want to pay for if I was an intelligence agency; you want the hackers to come back with more exploits, after all.


No intelligence company would pay for it if it were publicized they had paid for it. It's more useful to keep quiet and let people think Tor is still anonymous.


Could the person who sold it to them publicize it? Assuming they would be outside of Russia or unbound from any sort of gag order (not likely)?


It's a closed tender, so that's hardly a possibility.


"or 2) Russia can, and this is a ruse to make us think they can't."

Even if they could ... why say anything at-all? Perhaps - to encourage use of an exploitable method of communication, but even-then why would somebody looking to hide use a form of communication they know is actively being targeted by the government they're looking to evade?


Heh. This is low-ball. I was once offered $150,000 in a discussion with a broker when I inquired about a hypothetical Tor 0day. After the broker's fees, I would have still walked away with $120,000 if I had one. (Then taxes, of course.)

If anyone wants to do this, I recommend shopping around first ;P


Last paragraphs are very interesting:

"In its 2013 financial statements, the Tor Project - a group of developers that maintain tools used to access Tor - confirmed that the US Department of Defense remained one its biggest backers. The DoD sent $830,000 (£489,000) to the group through SRI International, which describes itself as an independent non-profit research centre, last year. Other parts of the US government contributed a further $1m. Those amounts are roughly the same as in 2012."

I'm not familiar at all how those founding works, could someone, from US, explain how and why US government is giving money to TOR?


I've seen two explanations for why the US government gives money to the Tor Project. One reason is to support dissidents in countries like China. Another is that US agents use Tor, but that the network requires a degree of popularity in order for agents to "hide" in it.


Another option is an effort to identify cryptographically-capable individuals around the works as targets for potential contact, work, on behalf of the U.S. and its allies.

TOR as a recruitment tool?


Isn't there a third possibility that US security services are capable of breaking Tor, and want to popularize it in order to encourage Tor usage among potential targets?


I should think that both are likely true.


Two possible motivations:

1. Help political dissent in countries that cannot crack tor.

2. There's a reasonable chance that they can crack tor, at least to some extent ,especially with the help of the 5-eyes countries. Having that ability while "evildoers" think tor is safe is valuable.


Well, TOR was originally developed by the US Naval Research Lab for the purpose of securing government comms.

Source: https://www.torproject.org/about/overview


I was of a slightly different impression, but have no idea what is the "truth".

"Tor was not started by the US Navy. The US Naval Research Labs (NRL) started a project in the 1990s called onion routing7. Tor uses the basic onion routing principles and applies them to the Internet. The volunteer Tor group started in 2001. The formal charity, The Tor Project, started in 2006. We continue to work with Dr. Paul Syverson from NRL on improving onion routing and therefore Tor."

Source: https://blog.torproject.org/category/tags/sida


Not started by the US Navy but started by US Naval Research Labs instead? Is there any practical difference except where it appears on a military budget sheet? :)

If you ignore some of the drama, Pando has a very long and fairly comprehensive look at its funding (at least, it seemed comprehensive to me, I am not a Tor expert) - http://pando.com/2014/07/16/tor-spooks/


The Pando article is FUD at its best.

Yes, the government funds Tor. Pando thinks that all of the US government is akin to the NSA and wants to spy on people. This is not how it works. The government is not just one body and there are many parts of it that probably don't agree with what the NSA is doing.

Yes Tor is funded by the US government. My question is, how does it matter? The protocol is open. The code is open. There are research groups at some major universities researching on Tor.

Let the code speak, not fear mongering.


> This is not how it works. The government is not just one body and there are many parts of it that probably don't agree with what the NSA is doing.

This, I think, is a very important point. It is beyond naive to assume that a large body of structures that together are called "the US government" is a homogeneous entity that can be ascribed goals as if it were a single agent.


"Securing government comms" can be misleading. Tor is not by itself a secure channel, but may be part of a secure channel if you're concerned that a local or semi-local adversary may intercept your communications. My understanding is that Tor was developed primarily to facilitate informants and dissidents in countries with restrictive internet access policies, like China, who would not take kindly to seeing communications between Chinese IPs and U.S. military IPs.

There is a very widespread and dangerous misconception that Tor is a one-stop shop for secure or anonymous communication. This is not true. You need to encrypt your messages separately. When outside the onion network, Tor actually exposes all content sent through it to a third-party, the exit node. This means using Tor may be more dangerous than not using Tor if you don't know what you're doing.


Very good point. In fact, I had to council one of my colleagues on this issue as she prepares for an overseas trip. She was asking about Tor, but I advised that our organization's VPN is the correct solution... especially since she wanted confidentiality rather than anonymity.


The primary intended purpose of the tor network was to provide cover for US agents. Many of the core developers of TOR have at various times either directly worked for US intelligence or have been funded by them. It was opened to the public and popularized, because an anomization network that is only used by spies is pointless. Most of the current exit nodes are currently located in the US, so there is no question that almost all TOR traffic is monitored by the NSA. The tradeoff is that while TOR makes it slightly harder to identify targets, the majority of them use TOR and there are still ways to identify them if they are not extremely careful (this has been revealed in some of Snowdens documents).


> The primary intended purpose of the tor network was to provide cover for US agents. Many of the core developers of TOR have at various times either directly worked for US intelligence or have been funded by them

That's very interesting. Could you provide sources that back this up, especially the employment history of TOR developers?


See http://www.syverson.org/, he still works for the Navy. Dingledine worked briefly for the NSA, http://www.freehaven.net/~arma/cv.html.


It isn't just FUD, there are some serious questions that have been raised which are ignored by the EFF crowd. At the bare minimum it has been used as an intelligence honeypot because most users have no idea what they are doing. Google, FB, and so on forcing SSL may have reduced this value a little bit.


What are these questions?


I don't think that you need to crack anything.

$100,000 is for a research paper.

Translation of the auction lot title: "Research the possibility of getting technical information about Tor users (their hardware)".

Here's the talk that claims the possibility to deanonymize Tor users for less than $3,000 http://web.archive.org/web/20140705114447/http://blackhat.co...

There are published papers on the topic e.g., http://www.syverson.org/tor-vulnerabilities-iccs.pdf

Lesson one is that Tor guards against traffic analysis not traffic confirmation. If there is reason to suspect that a client is talking to a destination over Tor, it is trivial to confirm this by watching them both. </quote>


Bear in mind that in Russia, many "offers" like this are not ment to be real competitions for accomplishing something (to crack Tor, to build a bridge, etc), but simply a way to appropriate state's money.


Right, someone's CS drop out cousin is getting this.


Are we saying that Russian intelligence services cannot hack TOR and need some random hacker to do it?

Imagine if the CIA offered $1M to crack TOR. They would be the laughingstock of the intelligence community.

I think there is something else going on. I would not touch this. It looks like bait.


I wonder if this would backfire and make Tor even stronger, as now even more attention is given to Tor's robustness.


maybe that is their goal. Perhaps they want to (or already are) use(ing) tor to hide their own activities from the NSA. They want to make sure what they are doing is truly as secure as it claims to be and if not motivate devs to make it so. After all, it seems it would be cheaper to offer this small reward than to have to pay full time employees to help keep their activities secure from prying eyes.


It likely will, open source projects are nearly impossible to stop. The SSL/TLS standard and their associated standards and clients has shrugged off a number of attacks at surprising speeds. Patch cycles are measured in hours or days apposed to weeks or months.

If the attack is particularity disastrous then there will likely be a large fork. But once a project is started and a community built its unlikely that force will be stopped.


I don't know why anyone would do this for $110,000. Especially after the entry fee, probably wouldn't make much money after the hardware costs, though if you're good enough to take on TOR, you probably also have a botnet. Also, why the hell would anyone give it to the Russians? Of all people, they're definitely who need exclusive access to a TOR hack. Especially if you consider that some of those people who are using it in Russia could be regular people who are trying to not be persecuted for their sexual orientation. Bad idea overall.


All the sources refer the same government requisition for a "performing the scientific research, code "TORUS/Fleet". The details should be available for people who chose to participate and foreign nationals are specifically banned from participation.

With the Russian word for torus being "тор" which could be transliterated as "tor" I see why people might get excited. But I'd like to see something more concrete than word play to support the news articles' theory.


"Applicants must pay 195,000 roubles to enter the competition"

This seems rather bizarre... ~$5500 cannot simply be a symbolic sum to deter idiots.


IMO Russians intend to make their venture profitable.


It wasn't clear to me from the article that there was any sort of time limit. Presumably a researcher could simply enter the contest once he was sure he had an exploit? The math doesn't really work out for profitability.


The deadline is August 13th, and the winner (if any) will be announced on the 20th. (According to an Helsinki Times article, but the English translation[1] doesn't have the dates)

[1]: http://www.helsinkitimes.fi/finland/finland-news/domestic/11...


Then the point stands. If a Russian researcher has an exploit on the 13th and thinks the prize is worth it, she'll enter. Why would anyone else enter? With that in mind, the proposed profit model seems unlikely.


Or probably the guy who thought of this is hoping for the odd $5500 in his bank account


I'd be really surprised if Russia were actually not able to do this already, they're known for having a very strong national community of security experts and overall excellent mathematicians.


They _had_ this community.

Nowadays most of them emigrated and those who don't, they mostly will not work for KGB spooks.


What's to stop someone from selling one of these exploits to multiple nations and companies?

What is the normal process for selling these exploits? They'd want to see the exploit first, I'm guessing in person, then they transfer over the money, then you give the code and details?

What if someone wanted to remain anonymous during the transaction? What would be the best method of doing that? You couldn't really send a friend because it might be easy to trace back to you, and it would be hard to trust a stranger.


They don't want to 'buy' the exploit outright, just fund the R&D. Thank you sensationalist media.


I don't understand, it seems like researchers have to pay to enter and then are only given the funding if successful, that's not exactly funding R&D, more of a contest. It seems really strange that Russia would be offering this kind of bounty in effort to improve the program's security, don't they know how many activists and dissidents use it. Is the sole reason to aid their own spies?

They should just provide funds on a site such as https://hackerone.com/

I really wish the US government would offer bounties for their sites and systems. Right now if people try to exploit a US government system, even if they have the intention to properly disclose the vulnerability they face prosecution.


It is definitely R&D to find a vulnerability in TOR or lack thereof, it's just that BBC as usual is arbitrarily choosing what to report and what to stay silent about.

Look no further than the tender page: http://zakupki.gov.ru/epz/order/notice/zkk44/view/common-inf...

Here they explicitly state that it's a tender for 'Выполнение научно-исследовательской работы, шифр «ТОР (Флот)»' (Research and Development works, code "TOR (Navy)")

Then it's a closed tender (stated in the same document), meaning that they come up with a list of organisations they invite to participate in this tender. No organization they did not invite can participate.

So you see this is nothing like a bounty.

>it seems like researchers have to pay to enter

I wager they are required by law to demand some sum of money, maybe this sum is determined as a function of a tender value; I don't believe there is some additional meaning to asking people to pay 5500 usd to participate in a closed tender.


I already posted publicly online how to find the identity of a Tor user.

To reiterate:

1. Get the Tor user in question to visit a website controlled by you ( or at least a site where you can cause JS to run; such as an advertisement )

2. Know which ISP the user is on, and be allowed to install a high speed device watching all traffic for a sequence of specific sized packets.

3. Use the JS to send a specifically crafted sequence of sized packets with specific time periods in between them. After sending this preamble, send sized packets to send the 'pseudo identity' of the user ( whatever pseudonym you wish to attach back to their real IP )

4. Use your monitored ISP device to detect the preamble, then log IP and the data.

Note this method could be done en-masse and would only require high speed FPGA devices at each ISP "trunk". Inject JS code correlating users back for any system which you wish to identify the users.

Done. Whichever Russian demonstrates this and wins the $100k; throw me a bone please. :)


>( or at least a site where you can cause JS to run; such as an advertisement )

So you cannot find the identity of a tor user.

* Either the TOR user is a 'newbie' (no offense), and he will use the tor package wich come with a version of firefox where JS is disabled by default

* Either he is a seasoned user and knows that disabling JS while using TOR is mandatory.


I don't know the exact parameters of the competition, but I doubt pretty strongly if the solution is allowed to manipulate the targeted user's behavior, and, oh, by the way, install a high speed listening device on the trunk of every ISP in the world.

If you have to know already which ISP the suspected user is using, you're not really finding the user, you're just confirming their identity.

And as others have pointed out, running with JS enabled is a vulnerability. If the user is that careless, it's probably easier to get them to load a particular file over plain HTTP and just listening to requests for that file.


I assume a Tor user with js turned off would be immune to this?


I don't think so. What you could do is have the webserver set up chunked encoding on a resource (say an image) and vary the size of the chunks for each user.


I thought Tor padded all packets to obscure payload size. Is this not true, or does this method work in some other way I'm not grokking?


I wonder if something similar could be done with detecting specifically sized images?


You're all making this much too complicated. Who needs the client to make multiple requests when you control the server? Client does "GET /" and the server starts sending a large index.html using irregular sized packets at specific intervals.

But suppose we broke it, now we have to fix it, right? Start padding everything to power-of-two size boundaries with a minimum of 16. Or if that would make Tor traffic too identifiable, then instead add random()%packetsize padding to each packet. Either would reduce the number of detectable packet sizes below a 1500 byte MTU to 8 at the cost of less than doubling the bandwidth consumption.


I think this will be a bit harder, as you don't really have control in what order the images are being loaded. They could be loaded in parallel for example. If you try to circumvent it by adding delay's on the server side you quickly block the browser as you will reach the maximum amount of parallel connections.


Even simpler: create a website which responds in a recognizable way, serially rather than concurrently. If person A received recognizable packet P at time T, and the site was serially serving that connection at time T to recognizable-but-pseudonymous person X, then A==X.


> 2. Know which ISP the user is on

How easy would it be to do this (even with JS on)?


They are also charging an entry fee for this "contest" in addition to the prize being ridiculously small. The good news is that it's quite unlikely this will be successful regardless of the prize.


I'd assume you wouldn't have to look to hard to find someone willing to pay $110k+ to identify specific individual Tor users, let alone find general exploits in Tor.



I submitted this one as well but was not very successful: https://news.ycombinator.com/item?id=8083790


Must be some small agency there, not really representing "Russia"

And anyway why cant people then just use Freenet or some such network?


Freenet is a resource hog, and can be rather slow. It's also not particularly interesting for people who just want to browse and access the "normal" web anonymously. There are few services. There's little interesting content.. Plus it's not clear Freenet can really provide that much as far as anonymity goes. The consensus recently has been that opennet is quite vulnerable, and the only way to be really safe out there is with a global darknet where everyone only connects to trusted peers. Achieving this is not so easy, and there are potential complications.


Great news. $110,000 from Russia to find and (although they did not intend it) patch Tor bugs. Thanks, Putin!


ugh, capitalism. someone somewhere will actually do work towards this goal with that much money in mind as a worthwhile payoff. ending tor anonymity should have at least 2 more 0s on the end of the figure.


I bet NSA is willing to pay much more.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: