Question of IP and TOR

Discussion in 'privacy technology' started by adlisila, Nov 7, 2008.

Thread Status:
Not open for further replies.
  1. adlisila

    adlisila Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    3
    Hello I have question of TOR and IP-
    When I connect TOR, it is SSL, yes?
    And we have ME->TOR1->TOR2->TOR3->DESTINATION ok?
    My question is this-
    TOR1 can see my IP. Yes. But does it know My ISP IP or My Router IP?

    Also!! It is possible that DESTINATION makes fake DNS server if malicious
    So I want to know if when ME makes DNS lookup through SSL at
    TOR1 and it goes through to DESTINATION will DESTINATION get my
    IP or router IP or ISP IP?

    Will it show as 127.0.0.1 or will it be ISP IP?
    Thank you very so much you best!
     
  2. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    1. The IP your ISP assigns is the public one that your router picks up, which is the same external IP address you have. They are one in the same.

    2. Tor3 does not know that Tor1 is part of the circuit. It only knows about Tor2 and Destination. Typically destination will not be able to get your real IP address without performing a malicious attack.

    In a DNS leak instance, which I think you are talking about, your DNS requests would leak to your ISP, and not go through Tor, so your ISP would know the pages you would be trying to request.
     
  3. adlisila

    adlisila Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    3
    What if TOR3 is friend with TOR2? Bad!
    OR if TOR3 make evil DNS server and fakes DNS response this bad.

    Also when I type www.google.com in browser,
    and it look up DNS throuhg TOR, is supposed to look up
    DNS at my ISP DNS server? So ISP could check time of
    my packet send to TOR1 and check DNS request time and
    compare? BAD!
     
  4. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    It's true. Tor isn't perfect. The inherent problem with tor is that it relies on the kindness and honesty of it's participants to make them trustworthy. Because of this, tor nodes are untrustworthy, and you should only use tor for https web viewing.
     
  5. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    Does JanusVM and XB Machine protect against the problems that you mentioned?
     
  6. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    No. Nothing can correct that feature of Tor, it will always exist, and always be an exploitable characteristic.
     
  7. adlisila

    adlisila Registered Member

    Joined:
    Nov 7, 2008
    Posts:
    3
    What about have more nodes?
    If 2 out of 3 are friend, bad. If 2 out of 5 or 6 are friend, still good. Yes?

    If you are verizon ISP customer,
    and DNS request is rout through TOR,
    does destination go to verizon DNS servers?
    So verizon know its you?
     
  8. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    1. Adding more links in the chain (nodes in the circuit) will not change the fact that the exit node can inject malicious traffic into your web session.

    2. If your DNS requests are routed through Tor, then your ISP doesn't have them (unless your network is incorrectly configured, which you would have a hard time telling.)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.