Delivery-Date: Wed, 18 Feb 2015 09:12:21 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,URIBL_BLOCKED
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id E52361E08C5
	for <archiver@seul.org>; Wed, 18 Feb 2015 09:12:19 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 8BE183251C;
	Wed, 18 Feb 2015 14:12:15 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1A744323F6
 for <tor-talk@lists.torproject.org>; Wed, 18 Feb 2015 14:12:12 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id oK2Tds_C6hNg for <tor-talk@lists.torproject.org>;
 Wed, 18 Feb 2015 14:12:12 +0000 (UTC)
Received: from mail.openmailbox.org (mail.openmailbox.org [62.4.1.34])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id C933731D28
 for <tor-talk@lists.torproject.org>; Wed, 18 Feb 2015 14:12:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by mail.openmailbox.org (Postfix) with ESMTP id 8DDD22E01D7
 for <tor-talk@lists.torproject.org>; Wed, 18 Feb 2015 15:12:07 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=openmailbox.org;
 h=user-agent:message-id:references:in-reply-to:subject:subject
 :from:from:date:date:content-transfer-encoding:content-type
 :content-type:mime-version:received:received; s=openmailbox; t=
 1424268725; bh=E9KiR+QdpnA4OLPYxfuId8Gu+xW53E/DMzKFOAKhgPM=; b=k
 MRAE0omG8oCmsfbTtYpTaBt9WRu5DBsshwKPVbGp8Yqk6IRIU/ObdnCFrF/FRwDA
 m0sMZ88bDv5d3C4fuBvTnC8IMIBJepLFtcgLBthu6QKD6/NyfToscXLKVp+RenXU
 WM62IuD7tJzJjEdbFhdwcgnUCFPp1Qq22+mhMh8Ye8=
X-Virus-Scanned: amavisd-new at openmailbox.org
Received: from mail.openmailbox.org ([62.4.1.34])
 by localhost (mail.openmailbox.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id rped-SWhsFJM for <tor-talk@lists.torproject.org>;
 Wed, 18 Feb 2015 15:12:05 +0100 (CET)
Received: from www.openmailbox.org (localhost [127.0.0.1])
 by mail.openmailbox.org (Postfix) with ESMTP id 14C6E2E01F4
 for <tor-talk@lists.torproject.org>; Wed, 18 Feb 2015 15:12:04 +0100 (CET)
MIME-Version: 1.0
Date: Wed, 18 Feb 2015 14:12:04 +0000
From: blobby@openmailbox.org
To: tor-talk@lists.torproject.org
In-Reply-To: <54E275A2.1000504@hireahit.com>
References: <ff0969f9d2ea5c294f866c4660ebb309@openmailbox.org>
 <54E13B37.8070004@riseup.net> <54E1567A.90709@hireahit.com>
 <c0e17374bc441f241698b7109078ec67@openmailbox.org>
 <54E275A2.1000504@hireahit.com>
Message-ID: <09d5a9b487d27800ec940b29c17da3cc@openmailbox.org>
X-Sender: blobby@openmailbox.org
User-Agent: Roundcube Webmail/1.0.5
Subject: Re: [tor-talk] =?utf-8?b?VG9yIG92ZXIgU1NIICh0b3Jzb2NrcykgKD8p?=
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 2015-02-16 22:56, Dave Warren wrote:
> On 2015-02-16 03:30, blobby@openmailbox.org wrote:
>> On 2015-02-16 02:31, Dave Warren wrote:
>>> On 2015-02-15 16:35, Mirimir wrote:
>>>> On 02/15/2015 02:22 PM, blobby@openmailbox.org wrote:
>>>>> I want to login to my VPS over SSH.
>>>>> 
>>>>> Is torsocks still a safe way to do this? A lot of the documentation
>>>>> (such as it is) is several years old.
>>>> I prefer to run an SSH hidden service on the VPS.
>>> 
>>> I'd tend to agree; if you control the endpoint, set it up as a hidden
>>> service rather than having Tor exit node involved at all.
>>> 
>>> While running hidden services alongside non-hidden services 
>>> introduces
>>> some risks, most of these are less significant when connecting to SSH
>>> on a server that you control.
>> 
>> I don't think I phrased my question very well. I'm not running a 
>> hidden server. I'm just logging in to a shared VPS to ftp. etc, rather 
>> than logging in to a control panel over HTTPS.
>> 
>> I just want a simple way to do "ssh IP port" but with Tor.
> 
> Understood. But the suggestion is that you SHOULD run a hidden server
> to listen for SSH connections over Tor as this will be far more
> reliable and secure than having to rely on an exit node.
> 
> The rest of the server doesn't need to be a hidden server, and SSH can
> still listen as both a Tor hidden server and a regular public server,
> but by making it a hidden server within Tor, you remove one of the
> major risk factors of using Tor: The exit node.


Thanks for the advice. I understand what you are saying. My point is 
that, to me at this moment, setting up a hidden service on my VPS sounds 
somewhat intimidating. I realise that to you and most technical people 
on this list, it's something trivial. I am not a "naturally" technical 
person (if we can divide people up into technical and non-technical 
segments). Hence, to you and your ilk, what is normal and easy, appears 
complicated and demanding to people like me.

At the same time, perhaps I'm wrong and it's easy to set-up a hidden 
server to look for SSH connections? Perhaps I'm assuming that things are 
harder than they are in order to persuade myself not to learn. I'm also 
"time poor" at the moment which doesn't help!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

