[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor over SSH (torsocks) (?)
On 2015-02-16 03:30, blobby@xxxxxxxxxxxxxxx wrote:
On 2015-02-16 02:31, Dave Warren wrote:
On 2015-02-15 16:35, Mirimir wrote:
On 02/15/2015 02:22 PM, blobby@xxxxxxxxxxxxxxx wrote:
I want to login to my VPS over SSH.
Is torsocks still a safe way to do this? A lot of the documentation
(such as it is) is several years old.
I prefer to run an SSH hidden service on the VPS.
I'd tend to agree; if you control the endpoint, set it up as a hidden
service rather than having Tor exit node involved at all.
While running hidden services alongside non-hidden services introduces
some risks, most of these are less significant when connecting to SSH
on a server that you control.
I don't think I phrased my question very well. I'm not running a
hidden server. I'm just logging in to a shared VPS to ftp. etc, rather
than logging in to a control panel over HTTPS.
I just want a simple way to do "ssh IP port" but with Tor.
Understood. But the suggestion is that you SHOULD run a hidden server to
listen for SSH connections over Tor as this will be far more reliable
and secure than having to rely on an exit node.
The rest of the server doesn't need to be a hidden server, and SSH can
still listen as both a Tor hidden server and a regular public server,
but by making it a hidden server within Tor, you remove one of the major
risk factors of using Tor: The exit node.
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to