On Wed, 17 Oct 2012 09:25:46 +0000, Daniel Dennis wrote: ... > But I didn't think about accessing a computer via ssh using hidden > services. Having ssh access can ruin security but is there a reason the > server/computer must be hidden? I'd understand why you or your connect > should be hidden but why the server?
Because it shall not be known *that* there is a server. Because I would not like the eternal & futile login attempts that sweep the open net. (Seriously annoying; trying lots of passwords against a public-key-auth-only server.) Because the computer in question does not have a public IP address, and can reach the internet/tor network only via a proxy. (Ok, that's actually using the tor implementation for a side effect, namely extended connectivity, not anonymity per se.) > I'm pretty sure if using encrypted > end to end (https, ssh) your exit node wont have any idea whats going on > except you connected to some ipaddress and i guess knowing i you used > https or ssh (or something else?). Do you actually have that as a > service or did you make that example up? Yes, a few. Although they only double as a fallback, should the regular tunnel not work (most predominantly due to failure of my home DSL). I don't have actual use for a http hidden service. Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800 _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk