[tor-bugs] #3453 [Torouter]: Torouter desires and features

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Sep 26 22:18:17 UTC 2012


#3453: Torouter desires and features
-------------------------------------------------------+--------------------
 Reporter:  ioerror                                    |          Owner:  ioerror         
     Type:  task                                       |         Status:  new             
 Priority:  normal                                     |      Milestone:                  
Component:  Torouter                                   |        Version:  Tor: unspecified
 Keywords:  torouter tor-fw-helper upnp natpmp debian  |         Parent:                  
   Points:                                             |   Actualpoints:                  
-------------------------------------------------------+--------------------
Changes (by ficus):

 * cc: ficus@… (added)


Comment:

 I updated the wiki page to the following; any comments?

 == Goals ==

 In general: demonstrate, document, and streamline mechanisms for
 individuals
 with always-on internet connections to participate in and support both the
 Tor
 onion routing network and Tor Project initiatives.

 Specifically:

 1. Provide an accessible mechanism for friendly non-expert "general
 internet users" to opt-in and participate in the Tor network as a bridge
 with minimal effort.

 2. Provide an accessible mechanism to *informed and committed* individuals
 to opt-in and and participate as a middle relay or an exit relay.

 3. Provide a generic mechanism for publishing HTTP content via a Tor
 hidden service.

 4. Provide a platform from which to potentially run OONI (Open Observatory
 of Network Interference) node software.

 Additionally, implement a transparently Tor-ifying always-on network
 gateway to
 experimentally provide (limited) onion routing benefits to downstream
 devices.
 This last goal is controversial, and the serious scenarios where this
 would be
 useful seem very limited (devices
 must highly trust the gateway, the local network could be malicious and/or
 monitored, etc). Some speculative use cases:

  - Creating demonstration/outreach networks
  - Accessing hidden services with no concern for client-end anonymity
  - Publicly sharing wireless internet access with less chance of being
    accountable for the actions of guests (perhaps not legally advisable)
  - For a single operator in control of the entire local network, and
 having
    properly "anonymized" all downstream software to not leak identifying
    information, could have usability improvements for mobile devices which
    would not need to re-initialize connectivity to the onion network.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3453#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list