[tor-talk] ssh over tor
Lars Noodén
lars.nooden at gmail.com
Thu May 2 17:20:33 UTC 2013
I'm looking at using netcat to run ssh over Tor.
Does this use of netcat leak information in any way?
ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \
-o User=user1 server.example.org
Many others must have already looked at this way of connecting since it
is fairly obvious. The only thing I could think of to test was DNS. I
blocked DNS at the packet filter and set it to log any outgoing DNS
traffic, and nothing was logged when I ran the test. So it seems that
it is safe in that regard. Is it safe in general?
I see one vague reference to it in the archives:
https://lists.torproject.org/pipermail/tor-talk/2012-December/026728.html
But there is no follow up indicating whether it's good or not.
Regards,
/Lars
More information about the tor-talk
mailing list