[HN Gopher] Tor is a great sysadmin tool (2020)
       ___________________________________________________________________
        
       Tor is a great sysadmin tool (2020)
        
       Author : azalemeth
       Score  : 378 points
       Date   : 2021-08-31 17:07 UTC (16 hours ago)
        
 (HTM) web link (www.jamieweb.net)
 (TXT) w3m dump (www.jamieweb.net)
        
       | swiley wrote:
       | I loved TOR when I was a broke student without enough money to
       | have one or two always on machines with public IPs I could
       | reverse proxy to.
        
       | kaycebasques wrote:
       | Just wanted to send a drive-by comment that I very much like the
       | design of this website. Very information dense. The top nav could
       | use some work on mobile but other than that it is quite well
       | done. Author, if you're reading this, I will probably "borrow"
       | much of your design! (I'll give a shout-out in my footer however
       | if I do end up "borrowing")
        
       | rinron wrote:
       | One very important thing not mentioned is that the tor exit node
       | could be capturing your traffic or do a MITM attack. Its a great
       | idea for testing but only after you have encryption working, and
       | of course pay special attention to your ssh fingerprints.
        
         | fswwi wrote:
         | Cloudflare is mitm, btw.
        
           | vntok wrote:
           | So is your network firewall, what's your point?
        
             | fswwi wrote:
             | Cloudflare can see decrypted content when HTTPS is used.
        
         | boring_twenties wrote:
         | Hidden services are not accessed through exit nodes. Relay
         | nodes cannot capture your traffic or perform MITM attacks.
        
         | segfaultbuserr wrote:
         | If the endpoint is in your control and you'd like to experiment
         | with Tor, you can configure your server as an Onion Service, so
         | you are protected by Tor's own end-to-end encryption (whose
         | traffic cannot be captured by MITM since the hostnames
         | themselves are the public keys). For non-anonymous uses, you
         | should active the "Single Service Onion" mode, so the 6-hop
         | (extra 3-hop for server anonymity) is skipped, allowing
         | standard 3-hop latency and performance. It also saves bandwidth
         | for exit nodes - all non-exit relays can forward Onion traffic.
        
       | slacka wrote:
       | Tor is also useful is to verify country specific customization on
       | your website are working. I regularly used Tor on reports of
       | issues with default language or currency. It's just a quick
       | toggle of a setting in "torrc" to limit your exit node to a
       | specific country code.
        
       | lambdaba wrote:
       | ngrok.com allows some of these, at full (or at least, much better
       | speed, haven't benchmarked), and is mostly free (paid plan
       | required for custom subdomains). Sharing this for those still
       | unaware of it, it's a great service.
        
         | anaganisk wrote:
         | Or better yet, use cloudflare tunnels and setup an actual
         | permanent tunnel with custom subdomain support. If you want it
         | to be a temporary one, it supports that too. For FREE.
        
           | Shank wrote:
           | Is that part of Cloudflare Teams? No offense to Cloudflare,
           | but their pricing is really unclear. I have an account and I
           | use them for a lot, but they have 3 different "plans" and
           | then they have various ad-hoc products. Tunnel just says
           | "view in dashboard." [0] If I click on that link while logged
           | in, I'm taken to my dashboard with no indication of how to
           | use Tunnel or anything. The plans page [1] indicates that
           | it's part of argo smart routing. If I click on "activate
           | argo" it actually does the exact same thing as the teams
           | "view in dashboard" button -- it redirects me to the
           | dashboard and has no indication of being activated or
           | anything. Really frustrating.
           | 
           | [0]: https://www.cloudflare.com/products/tunnel/
           | 
           | [1]: https://www.cloudflare.com/plans/
        
             | PaywallBuster wrote:
             | It's confusing for me too
             | 
             | product page says it requires paid Argo (smart routing)
             | subscription https://www.cloudflare.com/en-
             | gb/products/tunnel/
             | 
             | the blog page says its free
             | https://blog.cloudflare.com/tunnel-for-everyone/
             | 
             | and actually you can install and run it quite easily
             | brew uninstall cloudflare/cloudflare/cloudflared
             | cloudflared login        cloudflared tunnel
             | 
             | this will launch a tunnel with a random subdomain listening
             | to http://localhost:8080
        
               | pigeonhole123 wrote:
               | It became free recently, so they've probably just
               | forgotten to update their documentation which seems to be
               | a pattern with CF.
        
       | RIMR wrote:
       | I used to have Nessus installed on a NUC that I would just drop
       | into a customer's network closet for a weekend, and monitor
       | remotely.
       | 
       | I hosted the Nessus UI as a Tor Hidden Service, and it worked
       | great. We just cycled the key every quarter for added security,
       | and so that ex-employees wouldn't know where to find it.
        
       | unsignedint wrote:
       | Back when I was managing system in a small company, I had a
       | couple of systems on hidden service with auth cookies. When port
       | forward failed or otherwise had problem accessing, it provided
       | decent plan B for getting things back online.
        
       | skadamat wrote:
       | Smells a bit like Wireguard use case!
        
         | RIMR wrote:
         | Wireguard is a great technology, and if latency and file
         | transfers are important you should use it, but a Tor hidden
         | service is way easier to set up, and way more reliable.
        
       | brightball wrote:
       | This is an excellent set of use cases! I didn't know about
       | torsocks either.
        
       | nyanpasu64 wrote:
       | In sysadmin use cases where you're only interested in accessing a
       | website from a different IP, or setting up a reverse
       | shell/service to hole-punch NATs, but don't need anonymity and
       | untraceability, is Tor's multi-layered onion routing a latency
       | and bandwidth impediment, and would you be better off turning it
       | off (not sure if possible with the current codebase)?
        
       | azalemeth wrote:
       | In many ways I think this blog post really makes quite compelling
       | arguments and honestly opened my eyes a bit.
       | 
       | One (perhaps mad) idea for more secure access to a machine deep
       | behind many levels of NAT where you, the sysadmin, have lawful
       | access but are fed up with having to have a 12 KB ~/.ssh/config
       | file in order to access it because of your university's
       | overbearing IT department^W^W^W^W network topology, would be to
       | "just" run an onionsite with onion services authentication [1],
       | preventing it being publicly accessed without the pre-shared key.
       | If your onion service just redirects to ssh (presumably with
       | certificate-only auth) I can't help but think that this is
       | _almost_ an example of security by obscurity done right.
       | 
       | [1] https://support.torproject.org/en-US/onionservices/client-
       | au...
        
         | KingMachiavelli wrote:
         | For that use case why not just use Wireguard?
        
           | [deleted]
        
             | alisonkisk wrote:
             | Wireguard is not the same as ZeroTier.
        
         | nine_k wrote:
         | If your hard-to-reach server can connect to the internet (via a
         | bunch of NATs and whatnot), you can just make it access your
         | box of choice by e.g. Wireguard, or plain SSH with port-
         | forwaring, or attach it as a node to your ZeroTier private
         | network.
         | 
         | You only need a bunch of jump hosts if your target server has
         | no Internet connectivity, and should not, in which case all
         | these levels of bastions do make sense.
        
           | azalemeth wrote:
           | That requires having another publicly accessible box, or
           | trusting ZeroTier though, doesn't it? The onion approach does
           | not.
        
             | lacrosse_tannin wrote:
             | you _could_ use your other device (the one you're
             | connecting from) as the controller. whomst amongst us
             | doesn't have a 3rd machine or VPS?
        
               | a1369209993 wrote:
               | Your other device doesn't have a public IP address
               | either.
        
             | novok wrote:
             | ZeroTier, Tailscale and such are OSS and have been
             | independently security & crypto audited. I don't know if
             | tailscale has been audited, but since they are a more
             | popular tool I bet they probably are too. They're actually
             | really good tools and would probably be more reliable than
             | tor tbh, I would recommend looking into them.
        
               | Nullabillity wrote:
               | > ZeroTier, Tailscale and such are OSS and have been
               | independently security & crypto audited.
               | 
               | Both rely on their centralized coordinator servers which
               | can mess with your routes (and thus your traffic) however
               | they please.
               | 
               | ZeroTier has a published (but not OSS) coordinator, but
               | their documentation pushes you towards their SaaS.
               | Tailscale's coordinator is SaaS-only, unless something
               | has changed very recently.
        
               | lacrosse_tannin wrote:
               | zerotier adhoc networks are controllerless, though ipv6
               | only.
               | 
               | The client can be set to not allow routes/addresses from
               | a controller.
               | 
               | The client and controller are licensed BSL.
        
               | Nullabillity wrote:
               | Ad-hoc networks don't seem particularly useful here. From
               | their documentation:
               | 
               | > Keep in mind that these networks are public and anyone
               | in the entire world can join them. Care must be taken to
               | avoid exposing vulnerable services or sharing unwanted
               | files or other resources.
        
               | nine_k wrote:
               | Does this require addresses of nodes to be globally
               | routable? (With such addresses you can as well connect
               | directly.)
        
               | nine_k wrote:
               | This is fair.
               | 
               | Their client node software is audited though, and the
               | contents of your packets are not accessible to the
               | router. This is why the amount of the possible meddling
               | is limited to a DoS, AFAICT.
               | 
               | Who audits the Tor nodes that do onion routing is
               | anyone's guess; I suppose ZeroTier is no worse than them.
        
               | Nullabillity wrote:
               | > Their client node software is audited though, and the
               | contents of your packets are not accessible to the
               | router. This is why the amount of the possible meddling
               | is limited to a DoS, AFAICT.
               | 
               |  _Normally_ the coordinator just forwards the keys from
               | your peers, and so doesn 't see the contents (the traffic
               | doesn't pass through it, and even if it did it didn't
               | have the key).
               | 
               | However, that assumes that the coordinator is being
               | truthful with the network topology that it sends you. It
               | could send you any topology that it wants to! This means
               | that it could start MITMing whenever it wants to by
               | telling you that $SERVER_IP's peer is now _actually_
               | $COORDINATOR_KEY at $COORDINATOR_IP.
               | 
               | Theoretically you could defend against this by, say,
               | running a cronjob that validates that the Wireguard keys
               | are unchanged. But at that point you're not really
               | gaining much compared to just using wg-quick.
               | 
               | Tor is different, because the .onion domain name
               | _inherently_ encodes the public key of the site you 're
               | connecting to. There is no way to change the key without
               | also changing the URLs that people connect to!
        
         | krtyiktj wrote:
         | at our lab the tor traffic would be noticed by the cyber
         | security group's ids and all traffic from your host would start
         | dropping at the border so fast your head would spin. you'd get
         | an unpleasant phone call or visit to your office and be warned
         | never to try side stepping the bastion ssh hosts that log all
         | the things ever again.
        
           | derefr wrote:
           | Obviously, you should plan around this by gathering all the
           | MAC addresses of every machine in the office, and then have
           | your machine spoof through them in rotation. /s
        
             | sillysaurusx wrote:
             | It makes me sad every time I think about it, but Aaron
             | Swartz did this during his saga. Well, sort of: he
             | incremented the MAC address by 1.
             | 
             | Point being, it's not foolproof. If some clever undergrad
             | is thinking about dodging the suits, win by fooling them,
             | not by fighting them.
             | 
             | If you do insist on fighting, though, start at
             | https://www.whonix.org/wiki/Mental_Model and then read the
             | entire Whonix wiki
             | https://www.whonix.org/wiki/Documentation. It's what I used
             | when I was serious about dodging the cartels, and that
             | knowledge will protect you as much as anything will.
             | 
             | (You'll hopefully conclude that the protection is too
             | brittle to risk your life, as I did.)
        
               | nqzero wrote:
               | building a new computer. want to be able to trust it 100%
               | for at least a moment. i can't figure out how to "buy" a
               | trusted copy of any linux and don't have any machines i
               | have 100% trust in (who does), so can't burn it. current
               | plan is to buy a chromebook solely for the purpose of
               | downloading and burning ubuntu. alternatively, buy
               | MSWindows, install on the new machine, burn, and then
               | replace
               | 
               | but this mental exercise has convinced me that security
               | is almost impossible in this day and age
        
               | sillysaurusx wrote:
               | One thing that helps a lot in this situation is to plan
               | based on threat model. There's no such thing as 100%
               | trust, but you can have a computer which is safe for e.g.
               | <thing>. It's pretty crucial to pick one or two specific
               | <thing>s and focus only on those.
               | 
               | If you just want to browse the darknet and see what the
               | markets are like, for example, Tor on your current
               | computers is fine.
               | 
               | If you're wanting to make a purchase and you're worried
               | that your existing computers will narc on you, your plan
               | of buy laptop + use ubuntu is A+.
               | 
               | If you want a computer to store information on, Edward
               | Snowden style, you'll need to take increasingly serious
               | steps. Use tails as a baseline. (Note: I've been out of
               | the game since 2016, so take this with salt.)
               | 
               | If you're literally dodging the NSA, you need to put on a
               | full face mask in winter, plan a route to a store you've
               | recon'd, buy clothes with cash from goodwill, carry them
               | in a trash bag as you walk out of your neighborhood,
               | sneak in between two houses in the dead of night and put
               | the outfit on + mask, walk to a taxi, have it take you
               | near (but not to) the electronics store, buy yourself a
               | burner phone + a few USB wifi dongles + anything else you
               | want completely unlinkable to you (you're on cameras),
               | pay for all of it while getting some strange and worried
               | looks that you're going to rob something, then do the
               | entire process in reverse until you're back at your house
               | with your untraceable electronics.
               | 
               | I did all that, and even then I was likely making some
               | small mistake that would've blown everything.
               | 
               | Yet the city wide surveillance drones (god eye) will
               | still have a nice little record of you that they can ID
               | you with. And you sneaking around in the middle of the
               | night putting on masks will probably get you in serious
               | trouble. It never really occurs to you when you're doing
               | this sort of thing to stop and consider whether you're
               | just doing crazy things. (It's tempting to believe the
               | answer is "no," especially the more you want to believe
               | it.)
               | 
               | Suffice to say, threat modeling is key, and it's worth
               | thinking carefully about what exactly you want to
               | accomplish.
        
               | derefr wrote:
               | > If you're literally dodging the NSA, you need to...
               | 
               | Or just make friends with an developing-world advance-fee
               | scammer, and then pay them to have one of their cash
               | mules buy and send you (that is, an empty house somewhere
               | in your city) a laptop.
        
               | sillysaurusx wrote:
               | That's an interesting idea I hadn't considered. But it
               | involves a lot of the same problems: you need to get from
               | where you are to where the laptop is, and back, without
               | popping up on any sensors.
               | 
               | There are a lot of sensors. Gait detection + god eye is
               | what convinced me this is probably impossible.
               | 
               | In my case, I was using NSA as a threat model for added
               | security against the actual threat (cartels), so I wasn't
               | as paranoid as I needed to be for NSA dodging. But in
               | your case, you have quite a chicken-and-egg problem of
               | getting that laptop to your doorstep in an untraceable
               | way.
               | 
               | One optional step that I took, which is probably useless,
               | is to live close to a wifi source that you can tap into
               | from long range. I used a directional wifi antenna to a
               | local restaurant. That way, if you do screw up and blow
               | your opsec, it's traced to somewhere close but not equal
               | to you.
               | 
               | (It's probably useless because once your physical
               | location is traced, you're basically doomed - all they'd
               | have to do is realize that someone's using the restaurant
               | as a proxy. It's also quite unethical, since you're
               | illegally using someone's equipment in a way that could
               | very well land _them_ in prison, depending on what you
               | 're doing. "Reasons not to fight the cartels" could fill
               | up several notebooks, which is what ultimately persuaded
               | me to stop trying.)
        
               | derefr wrote:
               | > you need to get from where you are to where the laptop
               | is, and back, without popping up on any sensors.
               | 
               | Why? As far as They can tell, you're going to a house
               | you've never been to before with no precedent for why,
               | picking up an unlabelled brown box, and returning home.
               | 
               | The NSA would know you _did that_ -- but they wouldn 't
               | be able to connect it to a laptop in order to
               | intercept/MITM it into being an insecure device (or to
               | note down its MAC address for when you go online with
               | it), since the "logistics chain" would be one entirely
               | disconnected from you right until the moment you showed
               | up at the house. To bug the laptop, they'd have to
               | literally rip it out of your hands. Until the moment you
               | pull into that house's driveway to pick up the parcel,
               | they don't know it's _your_ laptop (or what it is at all,
               | really) so they don 't know they should be _trying_ to
               | intercept it.
               | 
               | (And yes, They would likely have footage showing some
               | other person dropping the unlabelled brown box off in the
               | house's parking lot -- but that would be a person who is
               | _not_ flagged as a Person of Interest in any NSA system,
               | but rather some bright-eyed innocent college kid who had
               | started a  "new job" to "earn money fast" by "delivering
               | parcels" just the day before. Parcels they pick up and
               | re-box at AirBnB single-day rentals, rented just for the
               | purpose of receiving that one parcel by the money-
               | launderer.)
               | 
               | Replace "laptop" with "box full of dirty money" and this
               | exact thing is done hundreds of times every day, with the
               | NSA being able to do roughly zilch about it. "Cash mule"
               | wouldn't exist as a profession if the transactions they
               | facilitate could just be deanonymized+disintermediated in
               | real time.
        
               | alkz wrote:
               | most distributions provide signatures/checksums to verify
               | the download eg. https://ubuntu.com/tutorials/how-to-
               | verify-ubuntu#1-overview
        
           | rattlesnakedave wrote:
           | > you'd get an unpleasant phone call or visit to your office
           | and be warned
           | 
           | sometimes I wonder why IT departments and security in general
           | get a bad wrap, then I see things like this.
        
             | relax88 wrote:
             | When someone just does whatever they feel like and violates
             | policy, what do you think should happen?
             | 
             | Should someone send them a sternly worded email for them to
             | ignore?
             | 
             | Or maybe they should be allowed to do whatever they want
             | regardless of what risk it poses to the organization?
        
               | azalemeth wrote:
               | Why do people break rules? In that situation, I'd argue
               | that education and understanding is the appropriate
               | response -- for people on both sides of the table.
        
           | relax88 wrote:
           | I can confirm as someone who works in netsec that this
           | exactly how it would have gone at my previous employer.
           | 
           | There is a tone of "I know what's best and will do what I
           | want" in this thread.
           | 
           | If you think that the way to get the IT department to
           | implement something for you is to sidestep around policy
           | instead of working with them, you will just piss them off.
        
           | marcodiego wrote:
           | Is tor traffic that easy to detect?
        
             | blendergeek wrote:
             | Yes. It goes to a known tor node.
        
               | rnhmjoj wrote:
               | Not necessarily true. Tor bridges exist precisely for
               | this reason: https://tb-manual.torproject.org/bridges/
        
             | Forbo wrote:
             | Relay and exit node IPs aren't private, so admins will
             | often collect them and just block them en masse. This
             | causes problems, because a lot of that same IP space will
             | often be shared with things like pool.ntp.org nodes.
        
           | azalemeth wrote:
           | The meek pluggable transport together with Azure's domain
           | fronting service explicitly makes it look like it's
           | connecting to an Azure instance over https. [1]
           | 
           | [1]
           | https://gitlab.torproject.org/legacy/trac/-/wikis/doc/meek
        
         | kodablah wrote:
         | Yup, and it's easy to make server and client side tooling use
         | Tor to make this mostly transparent. Latency/bandwidth isn't
         | _that_ bad when communicating with an onion service. And it can
         | be even faster if server anonymity isn't a goal (server set
         | HiddenServiceSingleHopMode and HiddenServiceNonAnonymousMode
         | and create ephemerial onion service with NonAnonymous).
         | 
         | I use Tor plenty to self-host services from my house that are
         | reachable anywhere (and often have a web interface I can access
         | via Orbot). No hole-punching necessary.
        
           | njsubedi wrote:
           | Could you share more about your setup?
        
             | kodablah wrote:
             | Sure. I wrote https://github.com/cretz/bine (though I
             | admittedly don't work on it much these days). I just have a
             | few-line daemon that starts an HTTP (or gRPC or whatever)
             | server on ephemeral onion service. Then I use that onion ID
             | to access it (via TorBrowser or Orbot or a client built
             | with the same library).
        
               | njsubedi wrote:
               | Thank you!
        
         | croutonwagon wrote:
         | Agree. Thats pretty interesting.
         | 
         | I use an SSH session and SOCKS5 proxy on a VPS provider for
         | almost all of those other circumstances. Including checking
         | external access etc.
         | 
         | But the last one is a solid use case.
        
         | fluential wrote:
         | You will like this one as well "SSL/SSH Multiplexer"
         | http://www.rutschle.net/tech/sslh/
        
           | kej wrote:
           | Fixed link: https://www.rutschle.net/tech/sslh/README.html
           | 
           | Note that while this is a handy tool, its use is apparent to
           | anyone observing the connection.
        
         | ISL wrote:
         | Think from the beginning what will be the end: "I thought your
         | security policy was too overbearing, so I used tor."
         | 
         | IT departments make their choices for reasons. The key is to
         | help them understand your use-case, and they'll probably help
         | you through the problem in a way that might limit collateral
         | damage.
         | 
         | Source: have seen firewall bypasses (with a pre-shared key) get
         | leveraged as a way to hack an entire university lab/department.
        
           | azalemeth wrote:
           | I tried doing that, and largely succeeded, but the specific
           | area of the university in question will _not_ have a bastion
           | SSH host _anywhere_ on _their_ network. They will not allow
           | SSH access in _at all_. They _will_ however allow SSH access
           | to other parts of the university, with different people in
           | charge, which explicitly _do_ allow an SSH bastion host to
           | exist (and provide several for that purpose). So, the net
           | result is that they 've effectively out-sourced the control
           | and responsibility of their environment to someone else.
           | 
           | Normally this is fine, but my job involves programming and
           | controlling large, expensive, and strangely fragile lab
           | equipment. There's a resilience problem, and it's got to the
           | point where others have suggested putting a GSM modem on a
           | pci-e card inside some of the boxes in question, as the
           | relevant IT department decides on a whim to block ports with
           | no warning or justification. Some manufacturers of the
           | devices in question do this as standard if you have a support
           | contract. Trying to complain results in responses like "you
           | have been used to doing things one way and this change now
           | prevents you from working as before."
           | 
           | I completely accept that this is a political problem and best
           | solved as one, but ultimately SSH is an industry standard for
           | a reason -- it's secure, and it's flexible. The machines in
           | question are valuable, prone to breaking in the middle of the
           | night, and we are an international bunch who cannot always
           | connect from a well-defined ipv4 address, or from the
           | university's VPN. (The latter is blocked by the IT department
           | automatically, as it has too large a pool of potential
           | users). The thing I find most frustrating is that this sort
           | of political decision creates days worth of work
           | instantaneously, for little benefit. All of the actually
           | confidential or sensitive information is held in a completely
           | separate network at any rate...
        
             | elcritch wrote:
             | You might try Zerotier or Tailscale running either natively
             | or using an RPi as a bridge. Assuming your IT rules don't
             | forbid it, both should be fairly resilient to simple/random
             | port blocking. They're actually used by a lot of
             | enterprises to provide secure p2p networks with automatic
             | port punching and nat traversal.
        
             | unethical_ban wrote:
             | To quote Dr. Manhattan, "Without condemning, or condoning,
             | I understand".
             | 
             | I am in network security. I have stopped shadow IT, and
             | been a part of it.
             | 
             | Your situation seems so ungodly stupid and anathema to the
             | point of IT, that the remaining courses of action _should_
             | be the following.
             | 
             | Thoroughly document via email your attempts at explaining
             | requirements to Netsec, to document in writing their
             | objections, to do your best with what they provide you...
             | and WHEN things catastrophically break, point the finger at
             | them and thoroughly document how if you had the proper,
             | industry-standard tooling, you could have prevented the
             | loss of research/time/money.
        
               | _carbyau_ wrote:
               | This is a diverging motivations issue.
               | 
               | Many people are not in a stable career such that they can
               | hang around and do upper management's job for them by
               | "expensively failing so as to demonstrate IT's failures".
               | 
               | Academics and PHD students in particular live from grant
               | to grant. They can't afford to waste grant money "to make
               | a point that IT doesn't work." Reputations - and by
               | extension careers - can be made and unmade with such
               | stuff.
               | 
               | Aside, I think the academic life being so fragile is ALSO
               | silly but that is another story.
        
               | zaphar wrote:
               | THIS. Don't paper over the issues with shadow IT. Make
               | them painfully obvious to the point where IT has to do
               | something or answer to it. Otherwise it will not change.
               | 
               | I've given teams the option to turn off their pagers when
               | this sort of thing happens with the justification that
               | they can't fix it anyway. And then documented the crap
               | out of why they can't fix it so when someone asks I can
               | point to existing policy. It's very effective if done
               | right.
        
               | dooglius wrote:
               | "What did you accomplish during your time with X research
               | group?"
               | 
               | "Nothing since all our equipment broke, but we documented
               | how it was all IT's fault. You shoulda seen the looks on
               | their faces when we called them out on it to the dean!"
        
               | Spivak wrote:
               | It seems weird to dump on IT when they're a department
               | responding to the incentive structure they're placed
               | under like everyone else. You going to the Dean/someone
               | with actual authority to get top down approval for IT to
               | give you what you want is basically how IT operates in
               | large orgs. I have nigh infinite technical power but in
               | return I am bound politically by polities that I'm
               | explicitly not allowed to have any authority over (i.e. I
               | can't approve my own policy exceptions). I want to give
               | you literally anything you ask for. As long as my ass is
               | covered it literally doesn't matter at all to me. When I
               | worked Uni IT if someone wanted something we couldn't
               | give them because $dumb_reason weren't in a position to
               | have that fight with the higher-ups on their behalf. It
               | doesn't mean much coming from us and since it's not
               | impacting _our_ work it falls on deaf ears.
               | 
               | From your tone you make it seem like you were proud to
               | waste everyone's time and money when one single meeting
               | with the Dean and the CIO/Director of IT when the problem
               | happened would have opened every door for you.
        
           | belorn wrote:
           | The problem in my experience is not that the security policy
           | is too overbearing, but rather that the security policy is
           | too rigid and designed with assumptions that are false. A
           | common policy for example is that port 22 must always be
           | closed. One can use a hardware secured two token
           | authentication over ssh, and still the policy is that the
           | port must be closed and that is that. That the policy allow
           | remote desktop with just a password is completely irrelevant
           | because the policy doesn't forbid that.
           | 
           | I have tried so many times to help people understand security
           | and the purpose of a security policy when it is designed
           | correctly, but it doesn't work. The policy exist so people
           | don't need to think, not to make people understand why it
           | exist and what use-cases should be given exceptions.
        
             | gpapilion wrote:
             | Often times these policies are driven by industry
             | compliance. Exceptions have to be documented, and depend on
             | the compliance regime, may carry liability. Lastly when
             | exceptions are made the user often doesn't know what they
             | signed up for, and it ends up holding the bag for a breech.
             | 
             | It's usually better to not make an exception.
        
           | nephanth wrote:
           | Especially when, since it's Tor, potential attackers cannot
           | be traced
        
           | ryneandal wrote:
           | > IT departments make their choices for reasons.
           | 
           | In a perfect world, yes. But I've worked with/at places where
           | ineptitude is rampant, and any attempts of understanding
           | their reasoning is seen as insubordination.
        
           | novok wrote:
           | IT departments make choices that benefit their own needs and
           | for their own convience, often forgetting that the entire
           | point of their department is to make the rest of the
           | organization more effective. Sadly, it often goes the other
           | way.
           | 
           | Shadow IT is a signal that the IT organization is doing
           | things wrong. People use shadow IT because the IT department
           | is not doing it's job properly, serving it's customer base
           | based on the needs they show via their actions.
           | 
           | For example, if you see someone like azalemeth do the things
           | he does, it shows that the IT department needs to become
           | responsive enough and cooperative enough to not push him to
           | do such things in the first place. You notice he's tried to
           | do thing the IT department standard way first, and spent
           | considerable effort before he started his shadow IT method.
        
             | relax88 wrote:
             | "Policy made my job slightly harder so because I know
             | better than the netsec team who clearly has or should have
             | unlimited time and resources to help me I will do what I
             | want anyways, and put the organization at risk."
             | 
             | Also known as "how to make the netsec team hate you 101"
             | 
             | I agree with you about why shadow IT exists, but most IT
             | departments are spread so thin that expecting them to be
             | super responsive to anything but the most critical business
             | projects is often totally unreasonable.
             | 
             | Then they have to waste even more time hunting down idiots
             | setting up Tor nodes on their internal networks.
        
               | slumdev wrote:
               | > because I know better than the netsec team
               | 
               | For anyone who's been around the block a few times,
               | there's a good chance this is true.
               | 
               | Most organizations' netsec teams are too busy throwing
               | money at vendors to keep up.
        
               | still_grokking wrote:
               | If the IT department can't do its job because of resource
               | constraints likely the whole organization is a failure.
               | 
               | If you find something like that, run...
               | 
               | If you can't run, do whatever makes your live better. The
               | org is doomed anyway.
        
               | relax88 wrote:
               | What you've just described is most post secondary
               | institutions, public utilities, government, etc.
        
               | azalemeth wrote:
               | A recent example from me -- one VPN client of mine
               | suddenly refused to connect one day for no discernible
               | reason when they made a configuration change to their
               | cisco vpn "concentrator" without documenting it or
               | announcing it. Cisco AnyConnect GUI clients were fine and
               | some magic happened behind the scenes to push the
               | configuration change and, in typical Cisco style, avoid
               | saying what exactly it was.
               | 
               | I had some esoteric monitoring machine that couldn't run
               | anyconnect (for reasons I forget but almost certainly
               | relating to it not having a linux arm64 client at that
               | time) and naturally couldn't connect randomly one day
               | with openconnect (which previously had worked perfectly).
               | I asked what the configuration change was to prevent me
               | having to reverse-engineer it. The response was "if you
               | want to use unsupported clients we cannot offer any
               | assistance [...] we are currently operating two heads
               | down and we simply do not have the resources [...]." It
               | took me about four or five hours to work out what change
               | they had made, change the (122 line long) configuration
               | file for openconnect, and then, boom, everything good
               | again. A friendly "Hey, sorry about that -- we just
               | $FLICKED_THIS_SWITCH because $REASON" would have been
               | _massively_ helpful and arguably take less words than
               | their original response. (Edit: For context,
               | approximately 10-20k people use that specific VPN. And
               | their team is such that losing two members of staff
               | temporarily is a major inconvenience.)
               | 
               | I totally understand it from the other side. IT
               | departments have everything from state-sponsored
               | ransomware attacks to important people loudly going "why
               | doesn't the printer work any more". It's a different set
               | of skills to being a C-junkie, a programming wizard, or,
               | in my case, a young academic with one big grant and three
               | PhD students trying to both do work, publish work, and
               | get money to do more work where "work" is poorly defined
               | and highly flexible. Over time I've noticed universities
               | get far more corporate and many academics _absolutely
               | hate this_ , of which I am one. The "we control the
               | network, bug off" may be technically true but at times it
               | _does_ feel a bit like an imposition of some sort of
               | academic freedom, to be honest. At the very least, it 's
               | a nice little "dog egg" to find added to the pile of
               | administrative crap to do for that day.
        
               | Aloha wrote:
               | I'm working in an organization where we have one laptop
               | from work, and another laptop to do work on. Because the
               | one sized fits all IT policy doesn't work for our org,
               | but it's forced on us because of the IP security needs of
               | another parallel org.
               | 
               | We went from an organization moving towards BYOD, to, now
               | the exact opposite.
        
           | pope_meat wrote:
           | A simulated conversation with IT:
           | 
           | "Hey, IT department...I was wondering..."
           | 
           | "No."
        
             | eitland wrote:
             | Lucky me.
             | 
             | Our IT department goes out the of their way to help us stay
             | sane and productive
             | 
             | - they're making sure most of us can continue to use our
             | favourite Linux distro (I think most Debian/Ubuntu, Fedora
             | and Arch is supported)
             | 
             | - make sure VPN etc works on Linux even if it is not
             | officially supported
             | 
             | - taking time to sit down and debug hard problems (weird
             | issues with WSL2 on one particular Windows laptop) instead
             | of just blaming us engineers
        
       | api wrote:
       | Not sure why you'd use this instead of something like ZeroTier or
       | a bounce box, but I can think of one reason: you want to hide the
       | location of something in your infrastructure to make side channel
       | attacks on the cloud provider or physical location a lot harder.
        
         | alisonkisk wrote:
         | Part of the point is to generate non-criminal usage of Tor to
         | legitimize it.
        
       | [deleted]
        
       | lifeisstillgood wrote:
       | Being a small cog, but using clever tricks to get your job done
       | is not solving the problem.
       | 
       | An organisation that prevents itself from acting rationally is an
       | organisation that should die Schumpter-style. Please don't
       | prevent it.
        
         | croutonwagon wrote:
         | I use similar "clever tricks", albeit with SSH and socks to do
         | the same type of testing.
         | 
         | DNS can be funky, its useful to test resolution externally and
         | internally.
         | 
         | Traffic can be funky when routed, its useful to t-shoot sites
         | through a proxy here and there as there have been times it
         | works internally and is broken externally (often security
         | appliances are inline that may need debugging).
         | 
         | Working in IT infra/ops means its our jobs to use some of these
         | tools to troubleshoot these methods.
        
         | throwaway09223 wrote:
         | I'm not seeing where this relates to organizational
         | dysfunction. Using an external point to test a system is a
         | standard practice.
         | 
         | I'm also a little confused because preventing someone from
         | using their abilities to problem solve would be a _cause_ of
         | dysfunction -- a seemingly avoidable one.
        
         | sumtechguy wrote:
         | Also circumventing this sort of thing in many orgs is a first
         | class ticket to finding a new job. Friend of mine did that,
         | they walked him to the curb with his cardboard box that day.
         | His sin? Turned off virus scanning because it was taking 4
         | hours to do a 20 min build.
        
           | novok wrote:
           | The organization did him a favor. Many other, far more well
           | paying companies response to doing that is working with the
           | developer to figure out a system to make them both happy, or
           | just silently ignoring it until they figure out a better
           | solution. Or just talking to the person and asking them to
           | stop, vs firing.
        
           | azalemeth wrote:
           | To be honest, if I were in that situation I'd be thinking
           | something along the lines of "well, that was a dodged
           | bullet".
        
       | asddubs wrote:
       | I like using tor when testing DNS resolution related stuff, to
       | circumvent some part of my system having a cached entry already.
        
       | trey-jones wrote:
       | Several years ago I used a Tor Hidden Service in a professional
       | capacity to expose an application from a Wireless network with
       | properties that we wouldn't know ahead of time.
       | 
       | Worked like a charm, and no regrets. My favorite part was telling
       | my employer "We're using TOR for this" _eyebrows_.
        
       | menduza23 wrote:
       | Tor is a great tool for freedom. People tend to bash it and say
       | people use it for child porn. But the reality with freedom and
       | free choice is that you can also use that freedom to do bad. We
       | are seeing censorship in the west on the same scale as china
       | right now. I won't be surprised if Tor gets taken out of action
       | in the west soon.
        
       | tempfs wrote:
       | Using Tor for anything in a corporate network will rightfully get
       | you into serious shit with IT security.
       | 
       | I see a lot of people also advocating ngrok, wireguard, etc. You
       | all may not realize that actual threat actors use all of these
       | same techniques and making yourself look like them could very
       | well lead to your termination as this kind of circumvention of
       | security controls is absolutely a threat to the org and a
       | violation of security policy.
       | 
       | TLDR; If you need remote access, use the proper
       | channels....pretty please. For everyone's sake.
        
         | sockpuppet_12 wrote:
         | This is the correct answer, and also the hardest answer because
         | it's going to require you to have to swallow your pride.
         | 
         | Security will already be monitoring your traffic as a basic
         | first step, which they will pipe straight into a SIEM or SOAR
         | system. Doing this stuff will likely get you flagged for an
         | audit.
        
       | eximius wrote:
       | So the big message is proxies are useful? I mean, sure. I'm not
       | sure why Tor makes a better choice than anything else?
        
       | jstrieb wrote:
       | I can confirm that Tor is very useful for exposing services when
       | you cannot port forward!
       | 
       | Specifically, I've used Tor for connecting to GitHub Actions
       | virtual machines over SSH. This is great for debugging Actions
       | without running them over and over again. I also used this for a
       | project that sets up an ephemeral, collaborative environment in
       | one of the GitHub Actions VMs.
       | 
       | https://github.com/jstrieb/ctf-collab
        
       | segfaultbuserr wrote:
       | The article didn't mention another nice trick: Tor is also a
       | great tool for accessing IPv4 sites in a IPv6-only network and
       | vice versa.
        
       | suyash wrote:
       | For some reason IT dept hates as I get notification when I try to
       | use it. I think coz it jumps over so many IP addresses.
        
       | dijit wrote:
       | I actually use tailscale for exactly this reason.
       | 
       | NAT is the devil.
       | 
       | The latency of tor might be a bit too much though.
        
       | INTPenis wrote:
       | I recently had to do some basic sysadmin stuff over tor and I
       | disagree with OP.
       | 
       | Two things that failed mieserably, fetching a file that was just
       | shy of 5M, and a reverse SSH tunnel.
       | 
       | The SSH tunnel was unusable, it would only last for minutes at
       | the most. I wish I could use mosh but that requires UDP.
       | 
       | The file transfer was actually done with curl and the file was
       | often incomplete.
       | 
       | This was all done within Europe where we have the highest
       | concentration of tor nodes.
       | 
       | So no, I don't think tor is appropriate for sysadmin tasks.
        
         | aarchi wrote:
         | > This was all done within Europe where we have the highest
         | concentration of tor nodes.
         | 
         | So Tor nodes take locality into account? Although, that would
         | improve speeds, it seems like an information leak.
        
           | INTPenis wrote:
           | Not sure, just an educated guess but peering is best in that
           | region so there is a large selection of nodes with very good
           | peering. No need to use a node outside of europe.
        
         | eloeffler wrote:
         | Out of curiosity: Have yout set up your onion service in
         | single-hop/Non-Anonymous mode as suggested in the article?
         | 
         | I've been using tor for shell access only and it worked
         | reasonably well for me, but I havent't tried this mode and
         | wonder if your issues persist if it is used.
        
           | INTPenis wrote:
           | No I didn't know you could do that. But also in my use case
           | anonymity was a requisite.
        
       | 5faulker wrote:
       | Interesting use of a security tool
        
       | posterboy wrote:
       | why did I read sadism instead of sysadmin?
        
       | jedberg wrote:
       | Heh, most of these use cases I solved by having a personal
       | jumphost in a cabinet in a datacenter. But this is very clever! I
       | like the idea of using Tor because you'll get much better tests.
        
       | chaostheory wrote:
       | "However, to take a literal view, X is just a Y tool, and it can
       | be used in any way that you want."
       | 
       | Society would be better if people took this view with all tools.
       | They're just tools. Unlike people they don't have intent.
        
       ___________________________________________________________________
       (page generated 2021-09-01 10:00 UTC)