[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] tor using SSH
> Date: Tue, 22 Mar 2011 15:13:33 -0400
> From: Andrew Lewman <andrew@xxxxxxxxxxxxxx>
>
> How are you detecting ssh activity? actual protocol analysis or tcp
> port 22? There are valid relays on tcp port 22 which your tor client
> may connect to in the normal operation of tor.
>
having <tshark> capturing ALL packets coming/going from every interface,
saving everything to logfiles. Then, using <wireshark>/<tshark> to scan
logs, extracting port 22 sessions.
Since this port 22 traffic is encrypted, all that can be [easily] determined
is that normal tcp handshaking is working based upon tcp flags in headers
(ie: SYN-SYN/ACK-ACK; RST-RST/ACK-ACK) in sequential session packets.
I have tried no further to determine whether that data is some <tor> protocol
or actually <ssh> protocol. I simply assumed <ssh> protocol as one(*) would
expect by seeing port 22.
(*) one who has only used <tor> and hasn't learned the internals (yet)
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk