[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks
From: |
Alex Vong |
Subject: |
Re: address@hidden: Re: [security-discuss] gnuradio project DoS attacks GNU wget users] |
Date: |
Fri, 03 Mar 2017 20:42:09 +0800 |
User-agent: |
Gnus/5.13 (Gnus v5.13) Emacs/25.1 (gnu/linux) |
ng0 <address@hidden> writes:
[...]
>
> I have a correction to make: after someone else in a conversation told
> me that it works for them, I tried to reproduce my problem. THe problem
> is just when I use the ftp:// links, everything else works.
>
> Which means, `torify telnet alpha.gnu.org 21' worked as well as
> accessing the ftp over `http://alpha.gnu.org' and `http://ftp.gnu.org',
> previously I assumed the ftp of gnu.org is still limited to only ftp
> port access. So there is a problem with port 21 and maybe 20, but this
> problem exists only because a majority of tor relays filter those ports.
>
> I think the only improvement GNU can make is to have a list of onion
> services, if GNU wants to. This can be achieved like Debian does with
> https://onion.debian.org/ but it can also be achieved with sub domains
> to just one onion. For an example take a look at http://secushare.org/
> and http://youbroketheinternet.org where secushare.org mentions the
> onion at the bottom of the page and for the second domain I have
> forgotten where the anchor for the "Why not HTTPS" is.
>
[...]
I would like to add that there is a software called onionbalance which
is useful for deloying hidden service[0].
[0]: https://blog.torproject.org/blog/cooking-onions-finding-onionbalance
signature.asc
Description: PGP signature