<div dir="ltr">Two simple fixes for the case of non-anonymous services:<div><br></div><div>1) Don't use onion addresses. For non-anonymous services it's just being used as a hack around the difficulty of reliably identifying Tor connections. Otherwise you could just tell users to browse to <a href="http://tor.facebook.com">tor.facebook.com</a> and then the server would give an error page if you weren't coming from an exit. It'd be faster too.</div><div><br></div><div>2) Use an EV certificate so the browser shows the true name of the service in the address bar. Chrome will show it in green next to the address, Safari will actually show the organisation name instead of the URL, thus solving the issue completely.</div><div><br></div><div>Of course neither approach works for truly anonymous web sites. Sucks to be them.</div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote">On Fri, Oct 23, 2015 at 11:10 PM, Philipp Winter <span dir="ltr"><<a href="mailto:phw@nymity.ch" target="_blank">phw@nymity.ch</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">The Tor network uses self-authenticating names for onion services, e.g.,<br>
3g2upl4pq6kufc4m.onion. These onion domains are difficult to recognise<br>
and remember, which is one reason why some onion service providers<br>
started generating vanity domains. The idea is to keep generating key<br>
pairs until the hash's prefix contains a desirable string. Facebook got<br>
a pretty good one with facebookcorewwwi.onion.<br>
<br>
Attackers have now started to impersonate onion services by generating<br>
onion domains whose prefix resembles the original. An example is<br>
DuckDuckGo's search engine:<br>
<br>
Original: 3g2upl4pq6kufc4m.onion<br>
Impersonation: 3g2up5afx6n5miu4.onion<br>
^^^^^<br>
Users who encounter an impersonated onion domain might mistakenly assume<br>
it's the original because they recognise the prefix. I worry that this<br>
kind of phishing attack is particularly effective against vanity onion<br>
domains because they might incentivise users disproportionately to only<br>
verify the easily recognisable prefix.<br>
<br>
As a result, I wonder if vanity onion domains raise more problems than<br>
they solve. Should onion domain generation be made deliberately slow to<br>
render vanity onion domains and phishing attacks impractical? Should we<br>
provide browser-based tools to manage onion domains instead of treating<br>
them like normal, memorable domains?<br>
<br>
Thoughts?<br>
_______________________________________________<br>
Messaging mailing list<br>
<a href="mailto:Messaging@moderncrypto.org">Messaging@moderncrypto.org</a><br>
<a href="https://moderncrypto.org/mailman/listinfo/messaging" rel="noreferrer" target="_blank">https://moderncrypto.org/mailman/listinfo/messaging</a><br>
</blockquote></div><br></div>