Quick question about TOR and use of SSL

Chris Burge burgechris at gmail.com
Fri May 16 18:28:31 UTC 2008


This has been bouncing around my head for a few weeks but I haven't had the
time to either research or even figure out how to get my definitive answer
without asking.  My question is 2-fold in that it works on the hows of SSL
and in relation to TOR.  If this is answered on the tor-project site then my
thick head isn't processing so my apologies.  First, my understanding of SSL
is that it creates a direct tunnel from your computer to the web server (or
router if the SSL certificate is bound to somthing like a load-balancing
router).  If this is correct, wouldn't this "short circuit" the TOR purpose
of obfuscation?  On that note, isn't the 48,62,128,256 bit SSL encryption
there so that no one can do a packet sniff on the packets at the accepting
routers outside the DMZ (i.e. an example would be a load balancer that
doesn't do SSL but just passes that to a web server on the farm) but not for
regular traffic through the multiple hops on port 80?

Hopefully I'm making my question clear and I can get a definitive answer.

Thanks,
Chris
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20080516/094b82b5/attachment.htm>


More information about the tor-talk mailing list