> > > The use of different [address], dedicated only for incoming tor, > is some workaround, but it has the obvious downside that if somebody > manages to reach it and connect outside of tor, then the target > application will perceive it as an incoming tor connection. >
Hi Vasil! The rest of the document, at length, describes how to prevent someone reaching it and connecting from outside the machine which is running Tor. Unix sockets are also a very good solution. I use them in EOTK, for that reason, and also because it reduces the risk of a port-exhaustion attack. - alec -- http://dropsafe.crypticide.com/aboutalecm
_______________________________________________ tor-onions mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
