[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks

From: ng0
Subject: Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks GNU wget users]
Date: Fri, 3 Mar 2017 16:34:25 +0000

On 17-03-03 20:42:09, Alex Vong wrote:
> ng0 <address@hidden> writes:
> [...]
> >
> > I have a correction to make: after someone else in a conversation told
> > me that it works for them, I tried to reproduce my problem. THe problem
> > is just when I use the ftp:// links, everything else works.
> >
> > Which means, `torify telnet 21' worked as well as
> > accessing the ftp over `' and `',
> > previously I assumed the ftp of is still limited to only ftp
> > port access. So there is a problem with port 21 and maybe 20, but this
> > problem exists only because a majority of tor relays filter those ports.
> >
> > I think the only improvement GNU can make is to have a list of onion
> > services, if GNU wants to. This can be achieved like Debian does with
> > but it can also be achieved with sub domains
> > to just one onion. For an example take a look at
> > and where mentions the
> > onion at the bottom of the page and for the second domain I have
> > forgotten where the anchor for the "Why not HTTPS" is.
> >
> [...]
> I would like to add that there is a software called onionbalance which
> is useful for deloying hidden service[0].
> [0]:

But that wasn't really what I asked for here. The email was just for
reference, you can reply to the original thread if you want to.

reply via email to

[Prev in Thread] Current Thread [Next in Thread]