[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: SSH and Telnet ports
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: SSH and Telnet ports
- From: Christopher Davis <loafier@xxxxxxxxx>
- Date: Sun, 14 Dec 2008 10:36:13 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 14 Dec 2008 13:36:25 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:date:from:to:subject :message-id:references:mime-version:content-type:content-disposition :in-reply-to:user-agent; bh=84ecZUYX3Lt19DeKvXPx2Ue4WIv4WEECh3mP3bVaahY=; b=pjwKsq2dF5g5E8pr/h8YLgtPHXwWYgn5m+k16rhJ1yNyuQG9h7E9K3dEoS6WFU5UL5 FF81iOgvFzSMPgu64qur3Zb+6I+n1oYWrserUQh1RLC6AToRmxt8LkkhmU7uQCmiWdDX nhenZPBM65TsI2gPxfQpAJioNFSIN+1RmazrQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=date:from:to:subject:message-id:references:mime-version :content-type:content-disposition:in-reply-to:user-agent; b=s6GPF1x3k31+mi1+KlbTK6xDXekJNaFMlhgLPQOmyeaFnpkW+XE0duYvIx7h/qYoKM SYSh+Qo1ZZg95oRQAHzFx5aoKXq0180wBLOBhiYufPBTQBqxJ68Son9SV3beHpQ94Fa+ J21hLTi5uoLXES+Qqffzpjz+n7bunNtyoBkt8=
- In-reply-to: <f63c4b2d0812141015q39c22941w856af2853230e165@xxxxxxxxxxxxxx>
- References: <f63c4b2d0812141015q39c22941w856af2853230e165@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mutt/1.4.2.3i
On Sun, Dec 14, 2008 at 07:15:18PM +0100, Mitar wrote:
> Hi!
>
> I am wondering why should I allow SSH and Telnet ports to be open on a
> relay? Is there really a usage case where a Tor user would need them
> (because connecting with SSH to a server does somehow go against
> anonymity)? Because otherwise it could be used for dictionary attacks
> against SSH hosts.
>
>
> Mitar
How practical is SSH password cracking over Tor? Wouldn't the latency
deter attackers?
--
Christopher Davis