[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Ssh MITM attack when using tor
- To: or-talk@xxxxxxxxxxxxx
- Subject: Ssh MITM attack when using tor
- From: Juliusz Chroboczek <jch@xxxxxxxxxxxxxx>
- Date: Fri, 02 Feb 2007 20:31:04 +0100
- Cancel-lock: sha1:Aw4PEl4hsEtHZQ3UVkvaRyPi2X0=
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Fri, 02 Feb 2007 14:32:22 -0500
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Gnus/5.11 (Gnus v5.11) Emacs/22.0.92 (gnu/linux)
What are you supposed to do when you notice a MITM attack? How do you
find out the exit node, and where do you report it to?
I'm running ssh as so:
ssh -A -C -o 'ProxyCommand socat - SOCKS4A:localhost:%h:%p,socksport=9050' "$@"
Juliusz