@mwlucas for Ariel’s sake I hope not 😉
@ajroach42 Bah, I've done similar, I don't see it as fundamentally different than stunnel, and it neatly handles NAT and firewalls to boot!
@ajroach42 Running the tor service on the same machine? should be golden.. if not I am sure in 0.001 seconds someone else will chime in!
@ajroach42 Well, that changes EVERYTHING.. like completely everything. TECHNICALLY that last hop is still in the open; BUT you 'have' to trust that the person who setup the service (you?) trusts that last node (hidden services use _6_ nodes instead of 3. You're good unless the person setting up the hidden service is an idiot :)
@ajroach42 No, tor is NOT E2E encrypted, it is encrypted until you hit the exit node, and then its raw whatever protocol out (in this case telnet, non encrypted). So, do you trust the Tor exit node you've picked? Do you even know who runs it? (We know for example that wikileaks got a lot of its documents from tor exit nodes; you can bet that every intelligence service runs tor exit nodes.
@lattera I realized too late the correct snarky reply to hardenedstrcasecmp was that it was called strncasecmp.
@lattera wow. That is super awesome
@lattera merging in? Are you keeping your implementation, just resyncing everything around it?
FreeBSD enthusiast and frequent contributor, CommerceHub Staff Software Engineer.
mastodon.crossfamilyweb.com is one server in the network