Hi!
Is there some package for running Tor bridges on OpenWrt supported devices?
But as I understand Tor bridges consumes same amount of CPU power and RAM as Tor itself so they are not really possible for low power devices as WiFi routers where OpenWrt normally runes (with typically around 16 MB RAM and 200 MHz CPU power).
But on the other hand, as we have in operation a lot of WiFi routers around the country, many of them having their own public IP from very diverse IP ranges, this would be quite useful for bridges.
So my question is if somebody has tried to do something like that? Have some experience with it?
And also if maybe bridges support would be possible to extend so that we could make (low overhead) tunnels from this WiFi routers to the central server where there would be running a Tor node connected to the Tor network, having enough CPU power and RAM to run everything. So it would be great if the Tor clients would be able to connect to those VPNed end points, but encryption itself would be done on the server.
Mitar
My experience is that the packages available for OpenWRT have been quite outdated though your mileage may vary
P
On Wed, Mar 9, 2011 at 7:28 PM, Mitar mmitar@gmail.com wrote:
Hi!
Is there some package for running Tor bridges on OpenWrt supported devices?
But as I understand Tor bridges consumes same amount of CPU power and RAM as Tor itself so they are not really possible for low power devices as WiFi routers where OpenWrt normally runes (with typically around 16 MB RAM and 200 MHz CPU power).
But on the other hand, as we have in operation a lot of WiFi routers around the country, many of them having their own public IP from very diverse IP ranges, this would be quite useful for bridges.
So my question is if somebody has tried to do something like that? Have some experience with it?
And also if maybe bridges support would be possible to extend so that we could make (low overhead) tunnels from this WiFi routers to the central server where there would be running a Tor node connected to the Tor network, having enough CPU power and RAM to run everything. So it would be great if the Tor clients would be able to connect to those VPNed end points, but encryption itself would be done on the server.
Mitar _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Wed, Mar 9, 2011 at 7:28 PM, Mitar mmitar@gmail.com wrote:
Hi!
Hi,
Is there some package for running Tor bridges on OpenWrt supported devices?
Yes, we have Tor packages in the OpenWrt repository.
But as I understand Tor bridges consumes same amount of CPU power and RAM as Tor itself so they are not really possible for low power devices as WiFi routers where OpenWrt normally runes (with typically around 16 MB RAM and 200 MHz CPU power).
But on the other hand, as we have in operation a lot of WiFi routers around the country, many of them having their own public IP from very diverse IP ranges, this would be quite useful for bridges.
So my question is if somebody has tried to do something like that? Have some experience with it?
You might want to read more about the Torouter: https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter and https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter_notes. It would be great if you wanted to help out.
Let me know if you have any questions.
Thanks,
Hi!
On Wed, Mar 9, 2011 at 9:34 PM, Runa A. Sandvik runa@torproject.org wrote:
You might want to read more about the Torouter:
Interesting. And what about performance? Does this work? How much throughput can you get through it? Because by our experiments even OpenVPN is limited to around 2 Mbit/s even without any encryption (probably because of context switches between user and kernel space). Is there enough memory? How many connections can those routers handle?
Mitar
On Wed, Mar 9, 2011 at 9:32 PM, Mitar mmitar@gmail.com wrote:
Hi!
On Wed, Mar 9, 2011 at 9:34 PM, Runa A. Sandvik runa@torproject.org wrote:
You might want to read more about the Torouter:
Interesting. And what about performance? Does this work? How much throughput can you get through it? Because by our experiments even OpenVPN is limited to around 2 Mbit/s even without any encryption (probably because of context switches between user and kernel space). Is there enough memory? How many connections can those routers handle?
Performance all depends on the hardware you are using. I had Tor running as a client on an old Linksys router without any problems, and I know others have been able to configure bridges on their routers. As far as I know, we're doing ok for memory, but the bigger issue is disk space (which can easily be solved with a USB stick). Can I ask which project you are working on?
Hi!
On Sat, Mar 12, 2011 at 11:49 PM, Runa A. Sandvik runa@torproject.org wrote:
Performance all depends on the hardware you are using. I had Tor running as a client on an old Linksys router without any problems, and I know others have been able to configure bridges on their routers. As far as I know, we're doing ok for memory, but the bigger issue is disk space (which can easily be solved with a USB stick).
Hm. We have many nodes on fiber links. So 1 Mbit/s+ bridges would be possible. But I doubt Linksys can handle that. Or it can? What is your experience?
Can I ask which project you are working on?
Sure. We are doing an open wireless network in Slovenia. We are also developing some software for it and similar networks. Especially software which helps easier deploying such networks without requiring too much technical knowledge. Our web site is currently in flux as we are just reorganizing things, but:
http://wlan-si.net/ http://dev.wlan-si.net/ http://old.wlan-si.net/ http://dev.wlan-si.net/ticket/927
Our network looks like this:
The later is also a live example of this software which helps building open bottom-up networks, called nodewatcher. It gives you guidance, monitoring, check for errors. And especially an open view into the network, so that everybody can see and understand it.
Mitar
tor-relays@lists.torproject.org