[tor-talk] Exit nodes generating HTTPS traffic to HTTP ports

krishna e bera keb at cyblings.on.ca
Fri Jun 17 23:53:26 UTC 2016


On 06/17/2016 03:39 PM, Florian Weimer wrote:
> Is there a constellation of bugs which recently conspired in such a
> way that a web server might receive a flood of HTTPS requests on port
> 80/TCP instead of 443/TCP?

It is only a convention (common practice) that HTTPS listens on port
443.  A webserver with SSL can be configured to listen on any port, such
as 80.  Some sites do this on purpose because 443 is blocked by some
clients' outgoing firewalls.

>
> I've seen a report about an alleged DoS attack from originating from
> exit nodes, and I'm wondering if a bug and sudden interest from Tor in
> that website could explain the anomaly.

Don't know anything about that.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 465 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160617/12517c69/attachment.sig>


More information about the tor-talk mailing list