guix-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks


From: Alex Vong
Subject: Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks GNU wget users]
Date: Fri, 03 Mar 2017 20:42:09 +0800
User-agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux)

ng0 <address@hidden> writes:

[...]
>
> I have a correction to make: after someone else in a conversation told
> me that it works for them, I tried to reproduce my problem. THe problem
> is just when I use the ftp:// links, everything else works.
>
> Which means, `torify telnet alpha.gnu.org 21' worked as well as
> accessing the ftp over `http://alpha.gnu.org' and `http://ftp.gnu.org',
> previously I assumed the ftp of gnu.org is still limited to only ftp
> port access. So there is a problem with port 21 and maybe 20, but this
> problem exists only because a majority of tor relays filter those ports.
>
> I think the only improvement GNU can make is to have a list of onion
> services, if GNU wants to. This can be achieved like Debian does with
> https://onion.debian.org/ but it can also be achieved with sub domains
> to just one onion. For an example take a look at http://secushare.org/
> and http://youbroketheinternet.org where secushare.org mentions the
> onion at the bottom of the page and for the second domain I have
> forgotten where the anchor for the "Why not HTTPS" is.
>
[...]

I would like to add that there is a software called onionbalance which
is useful for deloying hidden service[0].

[0]: https://blog.torproject.org/blog/cooking-onions-finding-onionbalance

Attachment: signature.asc
Description: PGP signature


reply via email to

[Prev in Thread] Current Thread [Next in Thread]