[tor-bugs] #3374 [Torouter]: Torouter OS and configuration
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Fri Jun 17 08:21:03 UTC 2011
#3374: Torouter OS and configuration
----------------------+-----------------------------------------------------
Reporter: runa | Owner: runa
Type: task | Status: new
Priority: normal | Milestone:
Component: Torouter | Version:
Keywords: | Parent:
Points: | Actualpoints:
----------------------+-----------------------------------------------------
Comment(by ioerror):
Replying to [comment:32 rransom]:
> Replying to [comment:30 cypherpunks]:
> > Replying to [comment:29 runa]:
>
> > > I wonder if we should wait with shipping 0.2.3.x until it can be
considered stable. The purpose of the Torouter is to provide a (cheap)
consumer-level Internet router that is a tor bridge. Shipping with
software that cannot be considered stable and/or hasn't been tested in the
wild may not be a good idea.
> >
> > I think we've waited long enough and testing with 0.2.3.x should be
fine. We're doing releases of it, we should consider it experimental which
is of course the goal of the Torouter; it is an experiment. If we find it
non-functional or that it is breaking, we should fix it. We need a UPnP
and NATPMP client for these devices to work easily.
>
> Why do these devices need UPnP and NAT-PMP ''client'' support? It is
very unlikely that any ISP which does not allow its customers to listen
for TCP connections without a UPnP or NAT-PMP request would allow its
customers to listen for them ''with'' such a request.
>
Huh? Every home router on the planet seems to have either NAT-PMP or UPnP
support. Every Apple device has NAT-PMP on by default and it's the *only*
way to map a port through their NAT devices. This is about punching holes
in a NAT, it's not about binding to a port when you have a public IP
address. I really doubt these boxes will have a public IP very often.
> An UPnP or NAT-PMP ''server'' is more likely to be useful, but would
need to be turned off by default.
Huh? Why?
>
> We might need to deploy Tor 0.2.3.x on these devices anyway, if we go
ahead with the plan in proposal 180 of requiring protocol obfuscators to
interact with Tor, but deploying obfuscators on Torouter would require a
software update anyway -- we currently have no protocol obfuscators that
would remain unblocked for more than a day against a slightly competent
attacker.
>
Indeed.
> (By ‘slightly competent attacker’, I mean someone capable of checking a
single box on the configuration panel of a typical censoring proxy
device.)
Yeah, the bar is really low...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3374#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list