lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060317021034.GA39306@redundancy.redundancy.org>
Date: Fri Mar 17 02:36:48 2006
From: lx at redundancy.redundancy.org (David Thiel)
Subject: -ADVISORY- % =Thu Mar 16 13:23:37 EST 2006= %
	Buffer Overflow in Microsoft Access

On Thu, Mar 16, 2006 at 08:49:59PM -0500, Valdis.Kletnieks@...edu wrote:
> > If you have read http://unixgu.ru/?go=tor you would have known, that
> > he's running a Tor Node on this machine.
> 
> And the *visible difference* between a Tor node and an open proxy, is what,
> exactly? Other than it's harder to put a sniffer on the other side and see
> where the traffic inbound to the proxy is coming from?

Well, by default, Tor doesn't allow port 25 out of exit nodes. In
this case however, not only has the operator opened up port 25 out,
effectively making it an open relay, but he's actively sniffing and
publishing exit node traffic - apparently under the misguided belief
that it makes him appear terribly clever.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ