-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Yeah k0nsel you got me.. My provider always locks my vps cause I supposed to breach there SLAs running Tor! I tried to explain but they suddenly after years refer to some SLA paragraphs that I disagree with...I terminated my agreement but they won't leave me out before 09/2016 so I always start Tor after unlocking system until locking..looping process😬
Regards
Am 15. April 2016 10:07:42 MESZ, schrieb tor-relays-request@lists.torproject.org:
Send tor-relays mailing list submissions to tor-relays@lists.torproject.org
To subscribe or unsubscribe via the World Wide Web, visit https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays or, via email, send a message with subject or body 'help' to tor-relays-request@lists.torproject.org
You can reach the person managing the list at tor-relays-owner@lists.torproject.org
When replying, please edit your Subject line so it is more specific than "Re: Contents of tor-relays digest..."
Today's Topics:
- Using your own Relay as Entry Node (fr33d0m4all)
- Re: Using your own Relay as Entry Node (Yawning Angel)
- Re: Using your own Relay as Entry Node (Tristan)
- Re: Using your own Relay as Entry Node (starlight.2016q1@binnacle.cx)
- Hiding or masking running tor process.. (rush23@gmx.net)
- Re: Hiding or masking running tor process.. (dawuud)
- Re: Hiding or masking running tor process.. (k0nsl)
Message: 1 Date: Thu, 14 Apr 2016 21:38:15 +0000 From: fr33d0m4all fr33d0m4all@riseup.net To: tor-relays@lists.torproject.org Subject: [tor-relays] Using your own Relay as Entry Node Message-ID: 57100DC7.9080905@riseup.net Content-Type: text/plain; charset=utf-8
Hi, I've seen some time ago a discussion about using your own Tor Relay as an Entry Node, but I'd like to have your opinion in the following two scenarios (if it makes any difference switching from 1 to 2):
- You point at your node when you're in the same network where the
node resides (I mean always by setting EntryNodes in torrc, not by using it as a SOCKS proxy)
- You point at your node from a different network than the one in
which the relay is
I think that if your node is being used by others, you would simply be one of the lots of users passing through it, with the advantage of removing the risk of a bad Entry node, what do you think about that?
And about using it as a SOCKS proxy to enter the Tor network? Do the same considerations apply or is it even worse to use a relay as a SOCKS proxy?
I'm sure that I've read about reasons to avoid using your own node, but I don't remember the considerations about this argument...
Best regards, Fr33d0m4All
--
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4 IRC Nick: fr33d0m4all (OFTC & Freenode) _____________________________________________________________
Message: 2 Date: Thu, 14 Apr 2016 22:24:30 +0000 From: Yawning Angel yawning@schwanenlied.me To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Using your own Relay as Entry Node Message-ID: 20160414222430.78b9255e@schwanenlied.me Content-Type: text/plain; charset="us-ascii"
On Thu, 14 Apr 2016 21:38:15 +0000 fr33d0m4all fr33d0m4all@riseup.net wrote:
And about using it as a SOCKS proxy to enter the Tor network? Do the same considerations apply or is it even worse to use a relay as a SOCKS proxy?
This is horrible and should *NEVER* be done, assuming any network not physically controlled by you is between you and the SOCKS proxy server[0], simply based on the request (and authentication if you chose to use such things) being in the clear.
Regards,
-- Yawning Angel
[0]: So, SOCKS over an internal network to a VM/magical anonymity box may be ok (depending on your threat model). SOCKS to a VPS somewhere is essentially always a bad idea.
tor-relays@lists.torproject.org