gee this just hit slashdot a while ago...
yet another reason sniffing is a GOOD thing for tor operators...
*Schneier on Attack Trends: More Complex Worms* Worms <http://slashdot.org/search.pl?topic=220>
tor wrote:
Gee... if it can be exposed by sniffing then it isnt much of a privacy network. Tor operators/developers should Always sniff their servers traffic at least occasionally to see if holes or information is being exposed.
A tor/patcher who always sniffs his server traffic
a tor user
ps not only is it NOT rude it is completely legal in the US at least to monitor the traffic to/from a given server if you own that server, this is completely a legal action under ECPA.
Robert Mischke wrote:
--- "Jonathan D. Proulx" <jon@xxxxxxxxxxxxx> schrieb:
On Wed, Jun 08, 2005 at 06:48:24PM +0100, Adam Langley wrote:
:You could port sniff outbound 6667 ports with tcpdump or ethereal.
that's a bit rude,
Not only rude, but illegal in several countries. Of course, this can be done in secrecy, but I think advocating sniffing in the context of a privacy network is Not A Good Idea (tm).
Regards, Robert
___________________________________________________________ Gesendet von Yahoo! Mail - Jetzt mit 1GB Speicher kostenlos - Hier anmelden: http://mail.yahoo.de