On 11/20/12 5:32 PM, SiNA Rabbani wrote: > I think nmap is smart enough to adjust the number of packets and delay > between them automatically.
Yeah but portscanning over Tor with nmap is not the best deal as it does not have any native socks support and it expect to handle directly socket operations/errors reporting. In any case if it start introducing delay, it would be very good, because it would: - Avoid triggering IDS alert (that trigger portscan detection that cause abuse request) - Switch to another Tor Exit Node after 10 minutes (assuming it take more than 10 minutes) So also in that case it would be helpful in fixing the problem (Receiving abuses for port-scans originating from your nodes). Fabio _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
