onionscan icon indicating copy to clipboard operation
onionscan copied to clipboard

Design 3rd Party Database Lookups

Open PeterTonoli opened this issue 8 years ago • 3 comments

There have been discussions and suggestions in #3 and #6 for using external services such as Tineye and Shodan for comparing fingerprints collected. As hidden services may be scanned by onionscan, possibly even by the owners of hidden services, to prevent the chances of correlation between scanners and sites, all IP accesses using onionscan should have the option of being accessed through an anonymising service.

PeterTonoli avatar Apr 25 '16 11:04 PeterTonoli

Great Idea. Given the nature of the tool, the default should be any network connections use the Tor Proxy. Not sure where to capture these kind of things yet, probably in a CONTRIBUTORS.md file for designing new features.

s-rah avatar Apr 27 '16 01:04 s-rah

As hidden services may be scanned by onionscan, possibly even by the owners of hidden services

Good point. I think it would be wise to put any access to centralized external services behind an option that is disabled by default, and otherwise access them over Tor. Even when querying over Tor, e.g. Shodan her host*, as well as possibly routers along the way, would learn that certain key fingerprints are being queried, which is an information leak. Not as bad as a query from a direct IP of course but it's something to mind.

(* I've heard that at least some of the bitcoin block explorers, that allow for querying addresses and transaction IDs, keep track of what is requested and by whom)

laanwj avatar Oct 03 '16 13:10 laanwj

+1 disable by default.

s-rah avatar Oct 03 '16 15:10 s-rah