[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Interestingly enough...
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Interestingly enough...
- From: "David Vennik" <davidvennik@xxxxxxxxxxxxxx>
- Date: Tue, 7 Nov 2006 19:07:35 +1000
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivery-date: Tue, 07 Nov 2006 04:07:52 -0500
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=googlemail.com; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=bUmKfFqbGNlpktADldnztxxfsy7L9OtacdBGVmuLYFF0/oDncappBLW1j5p1HsaofWuHNypKdGc1Hmw72oe16dbCrwBPxEa4ILIwBk7Ivn/PDaQno5WPZHrV1SKAcILUYW8JaF+vBndBxN3z6PQZHIjvdEiWY3+SwvESUbFfJ5g=
- In-reply-to: <email@example.com>
- References: <firstname.lastname@example.org> <email@example.com>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
well, on one hand, using tor is a sign of distrust towards server privacy policies and the local police subpoena and warrant policies. which is probably not unwarranted. the internet server fraternity is new to having users who can cloak their identity, so naturally like most human responses to new stimuli are wary.
i personally think tor is a good thing because it will force the issue of strong authentication, because tor allows you to avoid origin-user mapping, but this sholud never be any sign of authenticity anyway because it can be easily subverted (trojans) and because users may be mobile and frequently change their point of origin.
On 11/7/06, Jan Reister <Jan.Reister@xxxxxxxx> wrote:
On 31/10/2006 03:53, Fergie wrote:
> I found it interesting that Cisco added this their most recent IDS
Bleedingsnort has the following signatures:
2001728 || BLEEDING-EDGE POLICY TOR
1.0 Client Circuit Traffic ||
2002950 || BLEEDING-EDGE POLICY TOR 1.0 Server Key Retrival ||
2002951 || BLEEDING-EDGE POLICY TOR
1.0 Status Update || url,tor.eff.org
2002952 || BLEEDING-EDGE POLICY TOR 1.0 Inbound Circuit Traffic ||
2002953 || BLEEDING-EDGE POLICY TOR
1.0 Outbound Circuit Traffic ||
Enterasys Dragon has a TOR:NEGOTIATION rule in the MISUSE category.
My two eurocent.