[tor-talk] Exit nodes generating HTTPS traffic to HTTP ports
krishna e bera
keb at cyblings.on.ca
Fri Jun 17 23:53:26 UTC 2016
On 06/17/2016 03:39 PM, Florian Weimer wrote:
> Is there a constellation of bugs which recently conspired in such a
> way that a web server might receive a flood of HTTPS requests on port
> 80/TCP instead of 443/TCP?
It is only a convention (common practice) that HTTPS listens on port
443. A webserver with SSL can be configured to listen on any port, such
as 80. Some sites do this on purpose because 443 is blocked by some
clients' outgoing firewalls.
>
> I've seen a report about an alleged DoS attack from originating from
> exit nodes, and I'm wondering if a bug and sudden interest from Tor in
> that website could explain the anomaly.
Don't know anything about that.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 465 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160617/12517c69/attachment.sig>
More information about the tor-talk
mailing list