[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Faking a local connection to services running on exit node
- To: or-talk@xxxxxxxx
- Subject: Faking a local connection to services running on exit node
- From: Brian Mearns <bmearns@xxxxxxxx>
- Date: Thu, 10 Sep 2009 20:57:33 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 10 Sep 2009 21:05:58 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:sender:received:from:date :x-google-sender-auth:message-id:subject:to:content-type; bh=u9BbQnAIdD6M+E0qTi4EHQ84ykB/koYB5mMg5h0ZlIU=; b=QG8xmaAwBR4seyOXuqp3zKwbxkouhZTfSY+n6wOurN3gRmtCcuPgufm9M+oCBMcmhB c80mw1AXHlSgZbhvG21Vh1XOAm2UXE6MzTy+e8PMfgjJ0f1Orx7JdNbJtTAfXnpbA+Nx l/JUMozJSqoaTr3shOSSt1Vy5Be8Rc4sura4k=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:from:date:x-google-sender-auth:message-id :subject:to:content-type; b=pV0jmlEjpuv9f3YUSzQ/534z93IrjTbLjGpQr5qwW5J/fbCn7hMArbUKKX0MWF/diC XFmu5JtQmPBUYHtQziFBYfq/n611h6mPJX3230Orr9kAjYG1XUn0iXRiNWmi7AmLvplL Jlp5Ow46fsbUODXM/3cSoVC/mqv/9qcUB5qN8=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
I have a relay running on the same system as several other services.
Some of these services only accept connections from the localhost (or
otherwise give special privileges to localhost) . If I allow my relay
to be an exit node, someone attempting to connect to these services
through Tor will appear to be coming from localhost, right?
Is there anyway to prevent this while still allowing my relay to exit
to these services?
Thanks,
Brian
--
Feel free to contact me using PGP Encryption:
Key Id: 0x3AA70848
Available from: http://keys.gnupg.net