[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Limiting number of outbound TCP connection from One Circuit
On 11/20/12 5:32 PM, SiNA Rabbani wrote:
> I think nmap is smart enough to adjust the number of packets and delay
> between them automatically.
Yeah but portscanning over Tor with nmap is not the best deal as it does
not have any native socks support and it expect to handle directly
socket operations/errors reporting.
In any case if it start introducing delay, it would be very good,
because it would:
- Avoid triggering IDS alert (that trigger portscan detection that cause
abuse request)
- Switch to another Tor Exit Node after 10 minutes (assuming it take
more than 10 minutes)
So also in that case it would be helpful in fixing the problem
(Receiving abuses for port-scans originating from your nodes).
Fabio
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk