[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #3374 [Torouter]: Torouter OS and configuration



#3374: Torouter OS and configuration
----------------------+-----------------------------------------------------
 Reporter:  runa      |          Owner:  runa
     Type:  task      |         Status:  new 
 Priority:  normal    |      Milestone:      
Component:  Torouter  |        Version:      
 Keywords:            |         Parent:      
   Points:            |   Actualpoints:      
----------------------+-----------------------------------------------------

Comment(by rransom):

 Replying to [comment:30 cypherpunks]:
 > Replying to [comment:29 runa]:

 > > I wonder if we should wait with shipping 0.2.3.x until it can be
 considered stable. The purpose of the Torouter is to provide a (cheap)
 consumer-level Internet router that is a tor bridge. Shipping with
 software that cannot be considered stable and/or hasn't been tested in the
 wild may not be a good idea.
 >
 > I think we've waited long enough and testing with 0.2.3.x should be
 fine. We're doing releases of it, we should consider it experimental which
 is of course the goal of the Torouter; it is an experiment. If we find it
 non-functional or that it is breaking, we should fix it. We need a UPnP
 and NATPMP client for these devices to work easily.

 Why do these devices need UPnP and NAT-PMP ''client'' support?  It is very
 unlikely that any ISP which does not allow its customers to listen for TCP
 connections without a UPnP or NAT-PMP request would allow its customers to
 listen for them ''with'' such a request.

 An UPnP or NAT-PMP ''server'' is more likely to be useful, but would need
 to be turned off by default.

 We might need to deploy Tor 0.2.3.x on these devices anyway, if we go
 ahead with the plan in proposal 180 of requiring protocol obfuscators to
 interact with Tor, but deploying obfuscators on Torouter would require a
 software update anyway -- we currently have no protocol obfuscators that
 would remain unblocked for more than a day against a slightly competent
 attacker.

 (By âslightly competent attackerâ, I mean someone capable of checking a
 single box on the configuration panel of a typical censoring proxy
 device.)

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3374#comment:32>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs