Re: [tor-talk] ssh over tor

2013-05-02 Thread Zebro kojos
I'd also be interested to hear from anyone who took the time to research this further. I for one arrived at the same conclusion as Lars at least in regards to DNS leaking, and saw no way for anything to be leaked, really. (Also, if netcat fails at some point during the ssh session, the pipe breaks,

Re: [tor-talk] torslap!

2013-05-02 Thread Andreas Krey
On Thu, 02 May 2013 13:19:59 +, Lucia Liljegren wrote: ... > Because these "not attackers" are guessing addresses they tend to hit my 404 > page which is dynamic and does some checks. When I detect an IP doing this > sort of stuff, I use Cloudflare's API and ban the IP 7 days . You mean, w

Re: [tor-talk] torslap!

2013-05-02 Thread Lucia Liljegren
> > Message: 1 > Date: Thu, 02 May 2013 11:03:52 +0200 > From: Moritz Bartl > > [...] > The second and most common type of blocking happens after someone has > been "attacked" once, or twice, via Tor, or an active "attack" is > ongoing. I use quotation marks here because most things that happen

[tor-talk] ssh over tor

2013-05-02 Thread Lars Noodén
I'm looking at using netcat to run ssh over Tor. Does this use of netcat leak information in any way? ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \ -o User=user1 server.example.org Many others must have already looked at this way of connecting since it is fairly obvious. The onl

Re: [tor-talk] HTML5 video and Tor anonymity.

2013-05-02 Thread Andrew F
NoName antispam06, You make some good points. But the reality of the web is simply that flash is dominant right now and will be for the near future. The flash issue should be addressed. I agree 100%, the best way to fix this issue is to build a safe flash player. However, first we should f

Re: [tor-talk] torslap!

2013-05-02 Thread David Vorick
What if you had something like exit nodes that required proof-of-work or bitcoin-to-use in order to be used, as per-choice of the person running the node? You would have a bunch of 'unsafe' exit nodes that behave like exit nodes today, and then a bunch of 'difficult' exit nodes that require user ef

Re: [tor-talk] HTML5 video and Tor anonymity.

2013-05-02 Thread NoName
On 02.05.2013 09:36, Mike Perry wrote: This shouldn't discourage anyone from working on a minimalistic flash sandbox though. Any solution would be better than none, especially since we already allow people to go into the TBB settings and mash the thing on if they really want.. But why a flash s

Re: [tor-talk] torslap!

2013-05-02 Thread Moritz Bartl
On 02.05.2013 05:11, Tom Ritter wrote: > I used to be a big proponent of proof-of-work schemes, but I've scaled > back my preference significantly. There's two problems with them: [...] My thoughts exactly. But, in this case, I have to say from experience that a few websites that use blacklists t

Re: [tor-talk] HTML5 video and Tor anonymity.

2013-05-02 Thread Mike Perry
Thus spake Tom Ritter (t...@ritter.vg): > On 1 May 2013 15:29, David Vorick wrote: > > I don't know what I'm talking about, but here goes: > > > > If you were to put flash in a "sandbox" that had a fake IP address, might > > that make the sandbox incompatible with the tor network? When you are >