<span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; ">Hi,</span></div>
<div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; ">Thank you grarpamp for your reply. Rest assured I am doing my research for legit purposes. I am trying to see if it is possible to determine the identity of an attacker if he uses these applications behind tor. There are a few points I would like to understand. First, by bad performance do you mean throughput, cpu performance or latency( how quickly the replies are coming back). Also a socks proxy would not give the advantages of tor (as in the connections switching every n secs)??. Thank you for all your help.</span></div>
<div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; ">Nikhil</span></div>
<div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br>
</span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br>
</span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br>
</span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br></span></div><div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 13px; "><br>
</span></div>Message: 6<br>Date: Sat, 18 Jun 2011 01:47:46 -0400<br>From: grarpamp <<a href="mailto:grarpamp@gmail.com" style="color: rgb(0, 101, 204); ">grarpamp@gmail.com</a>><br>Subject: Re: [tor-talk] Question regarding torifying applications<br>
To: <a href="mailto:tor-talk@lists.torproject.org" style="color: rgb(0, 101, 204); ">tor-talk@lists.torproject.org</a><br>Message-ID: <BANLkTi=LgdFYTZrnUT-ves0YAGZtVLR=<a href="mailto:gw@mail.gmail.com" style="color: rgb(0, 101, 204); ">gw@mail.gmail.com</a>><br>
Content-Type: text/plain; charset=UTF-8<br><br>> is possible to build an application using TOR for<br>> anonymizing traffic from security applications like NMAP or NESSUS?<br><br>Yes. Use a SOCKS proxy or funnel all your traffic through<br>
Tor with a packet filter. Many OS's deny LD_PRELOAD in<br>various cases, and raw packet generation doesn't apply.<br>Also, your performance will be absymal. Assuming for<br>the moment you're doing authorized/legitimate security<br>
research, you'd be better off renting a commercial VPS.<br>As far as the specifics on how to do any of this, it's<br>pretty much outside the bounds of Tor, so check<br>with google or bing on that aspect</span>