So Unbound looks like nice for this features ;)
Easy to set up in a Linux/Windows box as server, it can be used on
localhost when connecting to unknown wifi... low memory/cpu usage.
It's used everyday for home/work since on long time ago... surf, etc...
teor :
> Using a caching, recursive resol
On 08.08.2017 05:36, teor wrote:
> Distributing changes conveniently is different to deciding whether to
> apply them. Machines are good at the first task, but the second task
> needs multiple people.
Our discussion made me reevaluate my own process of distributing config
data. In particular, I'v
Hi,
on the one of my servers where tor relay is running I would like to configure
openvpn server. In that case IP Forwarding needs to be enabled (ubuntu). Is
there any security risk if this feature will be enabled on the tor-relay host ?
Thanks
Muppet96
Sent with [ProtonMail](https://protonmail.
On 08/07/2017 10:53 PM, Dennis Emory Hannon wrote:
> No attitude or hurt feelings. What’s different from my servers compared
> to others? Probably nothing at all….this is just a hobby of mine. One
> would think if I wanted to collect information I would just run an exit
> node myself since I have t
As a general comment I try and assume the best of everyone on the
mailing list and the worst of everyone in actual practice...
When offering sensitive anonymization services it's best to take the
opposite view of yourself. Operate with the best intentions but
seriously think about what harm you
Hi,
I often run my SSH sessions via Tor using tsocks. But today I see:
@@@
@WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@
IT IS POSSIBLE THAT SOMEONE I
We just did a blog post on obfs4proxy for FreeBSD and OpenBSD on the TDP
blog:
https://torbsd.github.io/blog.html#welcome-obfs4
Feedback welcome, offline or via GitHub.
In the near future, we'll submit to the respective ports systems.
g
--
5F77 765E 40D6 5340 A0F5 3401 4997 FF11 A86F 44E2
> On 9 Aug 2017, at 10:48, Steven Chamberlain wrote:
>
> Hi,
>
> ...
>
> I could be wrong, but I think this "dropbear" service is most likely
> something malicious, running on one or more Tor exit nodes, attempting
> to collect passwords of people logging in this way.
If you can find the exit
On 08/08/2017 01:48 PM, Steven Chamberlain wrote:
> Hi,
>
> I often run my SSH sessions via Tor using tsocks. But today I see:
>
> @@@
> @WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
> @
On Tue, 8 Aug 2017 18:51:51 -1100
Mirimir wrote:
> On 08/08/2017 01:48 PM, Steven Chamberlain wrote:
> > Hi,
> >
> > I often run my SSH sessions via Tor using tsocks. But today I see:
> >
> > @@@
> > @WARNING: REMOTE HOST IDEN
On Wed, Aug 09, 2017 at 10:58:01AM +0500, Roman Mamedov wrote:
> > No, dropbear is an SSH server that 8.8.8.8 seems to be running.
>
> Did you try ssh'ing into 8.8.8.8 (outside of Tor)? It does not run a public
> SSH server at all (obviously).
>
> The point was to demonstrate that the exit node i
On 08/08/2017 01:48 PM, Steven Chamberlain wrote:
> Further investigation shows that this happens for any destination IP
> address, even where there's no SSH service running:
Make a "trap" ssh server (for example on virtualbox machine without any
sensitive data) and log in into it through tsocks.
On 08/08/2017 06:58 PM, Roman Mamedov wrote:
> On Tue, 8 Aug 2017 18:51:51 -1100
> Mirimir wrote:
>
>> On 08/08/2017 01:48 PM, Steven Chamberlain wrote:
>>> Hi,
>>>
>>> I often run my SSH sessions via Tor using tsocks. But today I see:
>>>
>>>
13 matches
Mail list logo