guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks


From: ng0
Subject: Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks GNU wget users]
Date: Fri, 3 Mar 2017 16:34:25 +0000

On 17-03-03 20:42:09, Alex Vong wrote:
> ng0 <address@hidden> writes:
> 
> [...]
> >
> > I have a correction to make: after someone else in a conversation told
> > me that it works for them, I tried to reproduce my problem. THe problem
> > is just when I use the ftp:// links, everything else works.
> >
> > Which means, `torify telnet alpha.gnu.org 21' worked as well as
> > accessing the ftp over `http://alpha.gnu.org' and `http://ftp.gnu.org',
> > previously I assumed the ftp of gnu.org is still limited to only ftp
> > port access. So there is a problem with port 21 and maybe 20, but this
> > problem exists only because a majority of tor relays filter those ports.
> >
> > I think the only improvement GNU can make is to have a list of onion
> > services, if GNU wants to. This can be achieved like Debian does with
> > https://onion.debian.org/ but it can also be achieved with sub domains
> > to just one onion. For an example take a look at http://secushare.org/
> > and http://youbroketheinternet.org where secushare.org mentions the
> > onion at the bottom of the page and for the second domain I have
> > forgotten where the anchor for the "Why not HTTPS" is.
> >
> [...]
> 
> I would like to add that there is a software called onionbalance which
> is useful for deloying hidden service[0].
> 
> [0]: https://blog.torproject.org/blog/cooking-onions-finding-onionbalance


But that wasn't really what I asked for here. The email was just for
reference, you can reply to the original thread if you want to.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]