Encrypted TCP Tunneler

Mark mark at lochard.com.au
Sat Oct 21 19:33:33 PDT 1995


>I was toying with a limited form of this idea earlier, where outgoing
>connections would be limited to http servers.  These are usually on a
>small number of ports, although there are exceptions.  At least it
>would be possible to filter out telnet and rlogin and such for that
>application.  I don't think there are too many bad things you can do
>just by connecting to httpd ports (probably I would be surprised,
>though...).  But doing that would not make as much sense for the ETT
>application.

A more cypherpunky type of application would be to enable anonymous
httpd's so that your clients could advertise their nice/naughty products
and be safe from location identification. If they had to pack up then
they could move to another ISP and reconnect to the anon.net as normal.
(Didnt I just read this in a spam HOWTO?)

The problem I see is when a LEA gets involved and snoops your wires and
traces you back to your starting point and then traces the client that is
supplying nasty httpd services. You wouldnt necessarily be aware of this
occuring either.

Mark





More information about the cypherpunks-legacy mailing list