[tor-talk] ssh over tor

Lars Noodén lars.nooden at gmail.com
Thu May 2 17:20:33 UTC 2013


I'm looking at using netcat to run ssh over Tor.

Does this use of netcat leak information in any way?

 ssh -o ProxyCommand="nc -X 5 -x localhost:9050 %h %p" \
     -o User=user1 server.example.org

Many others must have already looked at this way of connecting since it
is fairly obvious.  The only thing I could think of to test was DNS.  I
blocked DNS at the packet filter and set it to log any outgoing DNS
traffic, and nothing was logged when I ran the test.  So it seems that
it is safe in that regard.  Is it safe in general?

I see one vague reference to it in the archives:

https://lists.torproject.org/pipermail/tor-talk/2012-December/026728.html

But there is no follow up indicating whether it's good or not.

Regards,
/Lars



More information about the tor-talk mailing list