OnionCat -- An IP-Transparent TOR Hidden Service Connector

F. Fox kitsune.or at gmail.com
Thu Jun 26 06:56:11 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

scar wrote:
> F. Fox @ 2008/06/26 02:39:
>> 7v5w7go9ub0o wrote:
>> (snip)
>>> This actually creates another question (not to be argumentative :-) ).
>>> Given that there is no exit node, would an OnionCat to OnionCat
>>> connection over TOR need to be encrypted? Is it plain-text anywhere
>>> along the line?
>> (snip)
> 
>> No, it wouldn't need extra encryption - a hidden-service connection has
>> end-to-end encryption by its very nature.
> 
> 
> unless the nodes in the circuit were all using compromised ssh keys due
> to that recent debian bug, or other unknown future bugs.  in this case,
> extra encryption might be the saving grace.
> 
> 

True enough - the only downside to extra layers of encryption, is the
computational burden; with modern machines, it can't help to provide
"your own" layer. =:oD

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=Edtq
-----END PGP SIGNATURE-----



More information about the tor-talk mailing list