I'm looking at using netcat to run ssh over Tor.

Does this use of netcat leak information in any way?

 ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \
     -o User=user1 server.example.org

Many others must have already looked at this way of connecting since it
is fairly obvious.  The only thing I could think of to test was DNS.  I
blocked DNS at the packet filter and set it to log any outgoing DNS
traffic, and nothing was logged when I ran the test.  So it seems that
it is safe in that regard.  Is it safe in general?

I see one vague reference to it in the archives:

https://lists.torproject.org/pipermail/tor-talk/2012-December/026728.html

But there is no follow up indicating whether it's good or not.

Regards,
/Lars

_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to