The --use-tor option
Kristian Fiskerstrand
kristian.fiskerstrand at sumptuouscapital.com
Wed Oct 21 12:02:05 CEST 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 10/20/2015 07:44 PM, Jacob Appelbaum wrote:
> On 10/20/15, Daniel Kahn Gillmor <dkg at fifthhorseman.net> wrote:
>> On Mon 2015-10-19 10:54:49 -0400, Malte wrote:
>>> On Monday 19 October 2015 15:03 Werner Koch wrote:
>>>
>>>> This is not complete because DNS lookups are leaking. This
>>>> could be fixed […]
>>>
>>> Maybe Kristian Fiskerstrand would be willing to set up an Onion
>>> Service for the SKS-Pool that could be used by default?
>>
>> I don't think this makes much sense -- there are already
>> keyservers that offer hidden services (e.g.
>> qdigse2yzvuglcix.onion), but they are individual keyservers.
>>
>> providing a .onion frontend to the pool would be something very
>> different. how would it work? would it just proxy connections
>> to other members of the pool? if so, it's basically acting as a
>> tor exit node, but a very specialized one. is this a good idea?
>>
>
> It would be possible to use OnionBalance here - someone can run a
> popular .onion and add all of the SKS servers with .onions into
> that instance of Onion balance. Thus - a single .onion name can
> redirect entirely within Tor to every individual SKS server that
> has a .onion name/Hidden Service.
>
Thanks for this pointer, I'm not too familiar with it (and frankly Tor
in general) and busy with real life atm, but will try to read up a bit
and see if it is something that can be of interest later this week
- --
- ----------------------------
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- ----------------------------
Uxor formosa et vinum sunt dulcia venena
Beautiful women and wine are sweet venom
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJWJ2KKAAoJECULev7WN52FEMsH/jFQD9w3MNMd7xZ7Od6ON5AN
c9Yc7jvwN3n6KBf/hWvo3LhJZaGMY6X0b9p4RPxo5ozvvij58r1B0N2iF02Rz3yP
sp/uFqG1J+03nEXfAa1EOraIPfrlWVv00RLbFU6EUtTEU1EVDVLG0icgxUSQNyPv
c+dWPPsrof93wuLdA5Cf9gvBUdN26koOkdlxUy14Quayy2tcnwmoERUxoJZqlbIS
svUJcLht6Jde/nA+Vhx6THEAax1gG2t6GvSg5augCJ4fEtVmuPXBPVAwRlq+QAnI
3+plzXnIBrsrum4svgsRUxCUagG5QUUaHcQ0tQTQuePmBJxKz+L2WQw8tTAF6is=
=w0qy
-----END PGP SIGNATURE-----
More information about the Gnupg-devel
mailing list