-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Scott Bennett wrote:
(snip)
>>>     2) Why are there so many exits to the standard socks port?  It
>>>     seems kind of strange to go all the way through the tor network
>>>     fully encrypted, only to exit in the clear to a port somewhere
>>>     else for re-encryption.  Similarly, what about pptp?
>> There are Trojans opening backdoors on that port.
>>
>> http://isc.sans.org/port.html?port=1080
> 
>      Hmm...very interesting.  Maybe I should close that one.
(snip)

Although it's a longshot, another possibility is that someone is
chaining one or more additional, non-Tor open proxies onto the end of
their proxy chain.

They may do this if they want to hide that their proxy is backed by the
Tor network from a destination admin, for example - or if Tor is
blocked, and they know of a one-hop proxy that isn't.

There are plenty of other ports to do this on, though - many of them far
more common than 1080 (and SOCKS) nowadays.

- --
F. Fox
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=IH40
-----END PGP SIGNATURE-----

Reply via email to