[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] ssh over tor
I'm looking at using netcat to run ssh over Tor.
Does this use of netcat leak information in any way?
ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \
-o User=user1 server.example.org
Many others must have already looked at this way of connecting since it
is fairly obvious. The only thing I could think of to test was DNS. I
blocked DNS at the packet filter and set it to log any outgoing DNS
traffic, and nothing was logged when I ran the test. So it seems that
it is safe in that regard. Is it safe in general?
I see one vague reference to it in the archives:
https://lists.torproject.org/pipermail/tor-talk/2012-December/026728.html
But there is no follow up indicating whether it's good or not.
Regards,
/Lars
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk