[tor-talk] corridor, a Tor traffic whitelisting gateway
Sebastian G. <bastik.tor>
bastik.tor at googlemail.com
Fri Feb 14 19:58:16 UTC 2014
14.02.2014 18:29, Rusty Bird:
> Sebastian G. <bastik.tor>:
>> 14.02.2014 15:12, Rusty Bird:
>>> 2. That data gets sent to corridor-helper-update, which atomically
>>> updates a Linux ipset (a list of IP-address:TCP-port entries accessible
>>> in constant time) named tor_relays.
>>
>> Atomically is anatomically acceptable, but automatically appear to be
>> adequate.
>
> :) It really is "atomically" though: tor_relays contains either the
> complete old consensus or the complete new consensus, never an
> in-between state.
>
>>> **To be secure, your new gateway needs two separate network
>>> interfaces**, like two Ethernet NICs, or one WiFi radio and one DSL
>>> modem. One is to receive incoming traffic from client computers, the
>>> other one is to pass the filtered traffic towards the global internet,
>>> **and they need to be on different networks**: Clients must not be able
>>> to take a shortcut via DHCP, DNS, ICMP Redirect requests, and who knows
>>> what else.
>>
>> Isn't this the most limiting factor?
>>
>> How many systems have two separate networks?
>
> Private network address spaces are fine. I think I may be using
> nonstandard networking terminology?
I'm an end user, not familiar what's standard terminology.
> For example, my corridor box has a builtin Ethernet port (10.0.0.254)
> where the protected client computers connect to, and another cheapo
> Ethernet adapter (192.168.1.2) plugged into the USB port, talking to my
> regular modem/router (192.168.1.254). The two networks are 10.0.0.0/8
> and 192.168.1.0/24.
I just misunderstood how it was supposed to be.
> How should I rephrase the documentation?
This should not be based on my feedback, alone. I think it was just a
mistake on my side.
> Rusty
Sebastian
More information about the tor-talk
mailing list