[tor-talk] tor using SSH
egf at riskproof.no-ip.org
egf at riskproof.no-ip.org
Tue Mar 22 21:37:44 UTC 2011
> Date: Tue, 22 Mar 2011 15:13:33 -0400
> From: Andrew Lewman <andrew at torproject.org>
>
> How are you detecting ssh activity? actual protocol analysis or tcp
> port 22? There are valid relays on tcp port 22 which your tor client
> may connect to in the normal operation of tor.
>
having <tshark> capturing ALL packets coming/going from every interface,
saving everything to logfiles. Then, using <wireshark>/<tshark> to scan
logs, extracting port 22 sessions.
Since this port 22 traffic is encrypted, all that can be [easily] determined
is that normal tcp handshaking is working based upon tcp flags in headers
(ie: SYN-SYN/ACK-ACK; RST-RST/ACK-ACK) in sequential session packets.
I have tried no further to determine whether that data is some <tor> protocol
or actually <ssh> protocol. I simply assumed <ssh> protocol as one(*) would
expect by seeing port 22.
(*) one who has only used <tor> and hasn't learned the internals (yet)
More information about the tor-talk
mailing list