I'm looking at using netcat to run ssh over Tor. Does this use of netcat leak information in any way?
ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \ -o User=user1 server.example.org Many others must have already looked at this way of connecting since it is fairly obvious. The only thing I could think of to test was DNS. I blocked DNS at the packet filter and set it to log any outgoing DNS traffic, and nothing was logged when I ran the test. So it seems that it is safe in that regard. Is it safe in general? I see one vague reference to it in the archives: https://lists.torproject.org/pipermail/tor-talk/2012-December/026728.html But there is no follow up indicating whether it's good or not. Regards, /Lars _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk