Policy question
Steven J. Murdoch
tortalk+Steven.Murdoch at cl.cam.ac.uk
Sat Jul 30 16:12:33 UTC 2005
On Sat, Jul 30, 2005 at 02:40:50PM +0200, SK wrote:
> However I want to have my other machines (laptops, home PCs etc.) to
> use this OR of mine as an exit or entry node for paranoid safety
> reasons.
Using a your own node as an entry node seems OK. There is some debate
as to whether this helps or hinders security but it shouldn't be too
bad. Using your own node as an exit node sounds risky. This means that
anyone who sees (non Tor) traffic coming from this node knows that it
is from you. He can't know which of your computers did it, but I don't
see what advantage using Tor gives you over a normal Socks proxy.
> As you rightly pointed out ORs acting as exit nodes can't know the IP
> address of the OP, but the entry node OR should be able to know the IP
> address of the OP. So can I in some way config my OR to act as entry
> point for my list of OPs (identified by IP addresses), but as
> middleman for all the other cases?
A middleman node can be the first OR on the route through Tor, so
setting this as your entry node should work at the moment. From the
perspective of the OR, it cannot (easily) tell whether a connection
coming in is from an OP or from another OR. Setting "reject *.*"
prevents an OR from being the last hop, but it can be in any other
position.
Hope this helps,
Steven.
--
w: http://www.cl.cam.ac.uk/users/sjm217/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050730/64c06d1f/attachment.pgp>
More information about the tor-talk
mailing list