On Mon, 2012-08-20 at 22:08 +0300, Lars Noodén wrote:
> On 8/20/12 7:27 PM, lina wrote:
> > On Monday 20,August,2012 11:15 PM, Lars Noodén wrote:
> >> It looks like it is possible to use Tor as a proxy:
> >>
> >> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor
> >>
> >> If this document is correct, it is very easy to set up.  That would
> >> obfuscate the ip number you are connecting from by adding a jump in the
> >> middle.  The target server would only see that last step.
> > 
> > I followed the instruction from link, but during connection it showed me:
> > 
> > [warn] Got SOCKS5 status response '4': host is unreachable
> > /bin/bash: line 0: exec: connect: not found
> > ssh_exchange_identification: Connection closed by remote host
> [snip]
> 
> The package connect-proxy contains the utility connect.  That has to be
> installed.  You might also consider using Vidalia to manage Tor.
> 
> Regards,
> /Lars

I thought using tor was a joke :( or a hint, that too much security at
some point really is too much. I don't have much knowledge about the
Internet, but I'm sure tor in this case (IMO in any case) is idiotic.
Sorry. I used tor myself, around the time of Suse 9.0 or 10.0?! dunno,
just for surfing the web. It's not usable for serious work.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1345490303.1285.78.camel@localhost.localdomain

Reply via email to