Perhaps I can try illustrating this better.
To start with we have website W hosted on internal
private IP P (192.168.1.2) forwarded to the world
by a NATting router with internal IP GW (192.168.1.1)
at external IP E. Anyone on the outside can (and are
supposed to be able to!) get to web
On Nov 10, 2007 1:27 PM, Roger Dingledine [EMAIL PROTECTED] wrote:
On Thu, Nov 08, 2007 at 03:54:52PM -0800, Jacob Appelbaum wrote:
Do you also think Tor should automatically block access to all RFC 1918
address space unless otherwise enabled? Why should Tor be so automatic
about your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Martin Fick escribió:
--- Kyle Williams [EMAIL PROTECTED] wrote:
On Nov 8, 2007 8:53 AM, Martin Fick
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
Fick wrote:
My home router offers an http administration
console on port 80 which for obvious
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Kyle Williams escribió:
On Nov 7, 2007 8:52 AM, Roger Dingledine [EMAIL PROTECTED] wrote:
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin Fick wrote:
My home router offers an http administration console
on port 80 which for obvious security
Kyle Williams wrote:
I don't want to post all the results of my research, for fear that truly
evil Torrorist would go crazy with this. Let's just say that this could be
very, very bad. Trust me, Roger, this isn't something that should be taken
lightly. The moment Tor knows it's own external
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
Fick wrote:
My home router offers an http administration
console on port 80 which for obvious security
reasons is normally only accessible from the
internal facing side of the router. While
many of these home routers typically have an
On Nov 8, 2007 4:00 PM, Jefferson Iblis [EMAIL PROTECTED] wrote:
On Nov 8, 2007 11:29 PM, Kyle Williams [EMAIL PROTECTED] wrote:
If you want to run a hidden server, such as a web site over a .onion
address, then that's fine.
If your router is disallowing people to access the admin
On Nov 8, 2007 8:53 AM, Martin Fick [EMAIL PROTECTED] wrote:
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
Fick wrote:
My home router offers an http administration
console on port 80 which for obvious security
reasons is normally only accessible from the
internal facing side of the
On Nov 8, 2007 3:54 PM, Jacob Appelbaum [EMAIL PROTECTED] wrote:
Kyle Williams wrote:
(This requires some changes to the torrc and tor
source, so I'd like to add it to the feature
request list in case somebody has free time)
That would be a hidden service. Tor already does that.
Kyle Williams wrote:
On Nov 8, 2007 3:54 PM, Jacob Appelbaum [EMAIL PROTECTED] wrote:
Kyle Williams wrote:
(This requires some changes to the torrc and tor
source, so I'd like to add it to the feature
request list in case somebody has free time)
That would be a hidden service. Tor already
--- Kyle Williams [EMAIL PROTECTED] wrote:
On Nov 8, 2007 8:53 AM, Martin Fick
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin
Fick wrote:
My home router offers an http administration
console on port 80 which for obvious security
reasons is normally only accessible from the
Hi,
I have a concern that running a tor may in some cases
provide a security breach allowing unexpected access
to the inside of certain networks that are behind
firewalls. In particular, I am concerned with what I
assume is a fairly common design for home routers.
This scenario may well
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin Fick wrote:
My home router offers an http administration console
on port 80 which for obvious security reasons is
normally only accessible from the internal facing side
of the router. While many of these home routers
typically have an internal
On Nov 7, 2007 8:52 AM, Roger Dingledine [EMAIL PROTECTED] wrote:
On Wed, Nov 07, 2007 at 08:20:37AM -0800, Martin Fick wrote:
My home router offers an http administration console
on port 80 which for obvious security reasons is
normally only accessible from the internal facing side
of
14 matches
Mail list logo