How do we defeat exit node sniffing?

Steve Southam ssoutham at ironkey.com
Fri Jun 6 02:07:35 UTC 2008


You can't be sure that traffic between an exit node and your target URL is
not being sniffed unless you know the complete physical path between the two
which is unlikely right? Sure you could implement some scheme other than TLS
to authenticate the server but that doesn't stop you being sniffed. You
could implement some other kind of encryption between you and the target
server so that sniffing is not a problem, in that case you'd just being
using tor for anonymity, not encryption. 

 

From: owner-or-talk at freehaven.net [mailto:owner-or-talk at freehaven.net] On
Behalf Of defcon
Sent: Thursday, June 05, 2008 6:36 PM
To: or-talk at freehaven.net
Subject: Re: How do we defeat exit node sniffing?

 

so what do you all suggest if I must authenticate to a non ssl connection?
How do I do it anonymously and safely?

On Thu, Jun 5, 2008 at 5:37 PM, Christopher Davis <loafier at gmail.com> wrote:

On Thu, Jun 05, 2008 at 05:01:34PM -0700, defcon wrote:
> What are some good ways to defeat exit node sniffing?  Is there a listing
of
> good exit nodes that do not sniff?
> Thanks,
> defcon

Prefer TLS-enabled services, and mind the authenticity of server certs.
Or use Tor hidden services.

--
Christopher Davis

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080605/ad61493d/attachment.htm>


More information about the tor-talk mailing list