[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
RE: question
- To: or-talk@xxxxxxxxxxxxx
- Subject: RE: question
- From: Sean <sun_lovin_man@xxxxxxxxx>
- Date: Wed, 20 Jul 2005 14:35:44 -0700 (PDT)
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Wed, 20 Jul 2005 17:35:58 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=Biv8T6IZtemGTI4EG2cBTolsOVo8BoBnx8qOpaeBgjLbLaoZQX7iVYQ1zq3C7cT7Yw4JaJAqRHkGKo2Giq3+DzWb7BTc0uWtrKzF0yg0pILIwTAZ4ViJ7I1/4xuNHgnhVL9UJ1Zf7gB6GHAkfoZ9E8MKT1GNIYJVlLjN4yoamEc= ;
- In-reply-to: <20050720185411.E99BD14081CE@moria.seul.org>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Just out of curiousity, how does being only an exit
server help this?
Is it because exit things are plain text and middleman
things are encrypted?
I am fairly certain it has nothing to do with the
ports used, right? Because, unless I misunderstand
the TOR system (which is indeed quite likely) TOR
servers who are middleman are requested to keep open
all exit ports, to be able to contact other TOR
servers on those ports...
--- Bob <tor@xxxxxxxxxxxxxxxxxxxx> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> So far, I've only figured out how to disable the
> logging of the
> traffic. I agree that this is a problem for a tor
> server
> (particularly filter cookies), however benign, as it
> could be used in
> a "non-benignly" way.
>
> So far, I haven't seen a way to disable this
> sniffing, this may
> exclude me from being able to operate an exit
> server.
>
> By the way, I did the test with forcing another box
> to use my tor
> server as the exit server, and it did catch the
> trojan on the server,
> which didn't make it back to the client machine. I
> can see that it
> was never in danger of infecting my server, but my
> av pulled the
> malicious item out of the packets for that
> connection. I guess, if I
> want to continue to use the AV on my pc (which I do)
> I will have to
> operate as only a middle-man server, which is what I
> will do.
>
> - -Bob
>
> > -----Original Message-----
> > From: owner-or-talk@xxxxxxxxxxxxx
> > [mailto:owner-or-talk@xxxxxxxxxxxxx] On Behalf Of
> Echo Nolan
> > Sent: Wednesday, July 20, 2005 3:19 AM
> > To: or-talk@xxxxxxxxxxxxx
> > Subject: Re: question
> >
> > I, as a tor user would prefer if this did not
> happen to my traffic.
> > Is there any way you can exempt tor from this
> policy? I
> > understand this is,
> > or is supposed to be, completely benign, but I'd
> rather protect my
> > own privacy.
> > Regards,
> > Echo Nolan
> >
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.1
>
>
iQA/AwUBQt6dwbjZjQrA9LuCEQKjGwCfe0wBKyr6tTz85abDqaRq8BwwZ94Anjw3
> 4QXyPlS9iLbS/xOG1SJLn04q
> =WEUC
> -----END PGP SIGNATURE-----
>
>
>
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com