[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Relay security, re: local network



On Thu, Sep 26, 2013 at 02:08:13PM +0300, Joe wrote:
> I'll have to reconsider, then. I assume middle relays see less
> traffic than exits?

I don't think that's true, currently it seems we need more middle nodes
than exit nodes based on my reading of the network statistics.

> I also keep reading exits are desperately needed

Generally true, but non-exit (middle) nodes are also needed.

> and i do have bandwidth to spare for an exit, about 10 mbit. I would
> also be running the exit through a VPN, so my own IP would not be
> published,

If you do this, I hope you can keep us updated here on the list with how
well it's working!  In theory a VPN should have some problems with Tor,
but I'm very curious to see how well it actually works.

> and GUFW would block all outgoing traffic to LAN from the
> computer running the exit. All other ports would be blocked as well,
> and since it's routed through a VPN, i wouldn't even need to open
> any ports in my own hardware firewall, but at the VPN provider's end
> instead. I do have permission from the provider to run an exit.
> 
> Still, i'm now hesitant. Thanks for the replies.

Given that you have permission from the provider, I don't see any reason
not to run a middle or even an exit node.  The network firewalling
you've described should mitigate any risk internal to your network.

-andy
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays