Please unsubscribe me -------------------------------------------- On Fri, 4/15/16, tor-relays-request@lists.torproject.org tor-relays-request@lists.torproject.org wrote:
Subject: tor-relays Digest, Vol 63, Issue 26 To: tor-relays@lists.torproject.org Date: Friday, April 15, 2016, 1:07 AM
Send tor-relays mailing list submissions to tor-relays@lists.torproject.org
To subscribe or unsubscribe via the World Wide Web, visit https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays or, via email, send a message with subject or body 'help' to tor-relays-request@lists.torproject.org
You can reach the person managing the list at tor-relays-owner@lists.torproject.org
When replying, please edit your Subject line so it is more specific than "Re: Contents of tor-relays digest..."
Today's Topics:
1. Using your own Relay as Entry Node (fr33d0m4all) 2. Re: Using your own Relay as Entry Node (Yawning Angel) 3. Re: Using your own Relay as Entry Node (Tristan) 4. Re: Using your own Relay as Entry Node (starlight.2016q1@binnacle.cx) 5. Hiding or masking running tor process.. (rush23@gmx.net) 6. Re: Hiding or masking running tor process.. (dawuud) 7. Re: Hiding or masking running tor process.. (k0nsl)
----------------------------------------------------------------------
Message: 1 Date: Thu, 14 Apr 2016 21:38:15 +0000 From: fr33d0m4all fr33d0m4all@riseup.net To: tor-relays@lists.torproject.org Subject: [tor-relays] Using your own Relay as Entry Node Message-ID: 57100DC7.9080905@riseup.net Content-Type: text/plain; charset=utf-8
Hi, I've seen some time ago a discussion about using your own Tor Relay as an Entry Node, but I'd like to have your opinion in the following two scenarios (if it makes any difference switching from 1 to 2):
1) You point at your node when you're in the same network where the node resides (I mean always by setting EntryNodes in torrc, not by using it as a SOCKS proxy)
2) You point at your node from a different network than the one in which the relay is
I think that if your node is being used by others, you would simply be one of the lots of users passing through it, with the advantage of removing the risk of a bad Entry node, what do you think about that?
And about using it as a SOCKS proxy to enter the Tor network? Do the same considerations apply or is it even worse to use a relay as a SOCKS proxy?
I'm sure that I've read about reasons to avoid using your own node, but I don't remember the considerations about this argument...
Best regards, Fr33d0m4All
--
_____________________________________________________________
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4 IRC Nick: fr33d0m4all (OFTC & Freenode) _____________________________________________________________
------------------------------
Message: 2 Date: Thu, 14 Apr 2016 22:24:30 +0000 From: Yawning Angel yawning@schwanenlied.me To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Using your own Relay as Entry Node Message-ID: 20160414222430.78b9255e@schwanenlied.me Content-Type: text/plain; charset="us-ascii"
On Thu, 14 Apr 2016 21:38:15 +0000 fr33d0m4all fr33d0m4all@riseup.net wrote:
And about using it as a SOCKS proxy to enter the Tor
network? Do the
same considerations apply or is it even worse to use a
relay as a
SOCKS proxy?
This is horrible and should *NEVER* be done, assuming any network not physically controlled by you is between you and the SOCKS proxy server[0], simply based on the request (and authentication if you chose to use such things) being in the clear.
Regards,
-- Yawning Angel
[0]: So, SOCKS over an internal network to a VM/magical anonymity box may be ok (depending on your threat model). SOCKS to a VPS somewhere is essentially always a bad idea.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Hi Joshua,
On 15/04/16 18:11, Joshua Norvell wrote:
Please unsubscribe me
You can unsubscribe here: (https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays#subscr ibers)
~Vasilis - -- Fingerprint: 8FD5 CF5F 39FC 03EB B382 7470 5FBF 70B1 D126 0162 Pubkey: https://pgp.mit.edu/pks/lookup?op=get&search=0x5FBF70B1D1260162
tor-relays@lists.torproject.org