[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
FreeCap and a Tor server – good combination?
- To: or-talk@xxxxxxxx
- Subject: FreeCap and a Tor server – good combination?
- From: Tor User <toruser256@xxxxxxxxx>
- Date: Thu, 27 Apr 2006 15:19:55 -0700 (PDT)
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivery-date: Thu, 27 Apr 2006 18:20:00 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding; b=Bjl/P2s/u9U/VYZ0Lglvi7IAzzLAuXeZzBbyvA3I1JvRYJWHhBPEJZnEuqnD2VOMvaxM4QcfHOV1q6MsoMTD+Iva93cMP1R18uekokG1Eaasc5CRC3xSNrIIU9h3L6mk0g+pgdk8bvpZQE59aoIMcdOIHE0y3LHGvKXmkMKh+1o= ;
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
I?ve been running an Tor server (middleman only) for a while and I?ve been wondering about using FreeCap and an account on an SSH server that has a SOCKS proxy to tunnel my Tor server?s connections over an SSH tunnel to the SOCKS proxy running on that SSH server. Hopefully I explained that clearly, if not maybe this will help to visualize it:
TOR Server ? FreeCap ? SSH Tunnel ? SOCKS proxy ? [Out to internet]
I have tried testing this and it works. Clients are able to connect to my TOR server, and in trying it myself there is no noticeable increase in latency (ping time to the SSH server is < 15ms, and the server has a fast CPU and faster network connection). As far as I can tell, based on netstat and the like, when I client connects to my server, their circuit is built
through the SSH tunnel and then to the SOCKS proxy server, and then out on the internet to the next Tor server in the circuit. When data comes back to my Tor server, it first comes through the SOCKS proxy on to the SSH tunnel, and then to my Tor server, then to the client or other Tor server in the chain.
I get the feeling that this should be more secure because:
My ISP can?t monitor my Tor server?s outgoing connections.
Even of the SSH/SOCKS server?s connection was monitored, other peoples Tor circuits should be mixed in with my Tor server?s connections.
Any thoughts on this?
Also, just so there is no confusion, I am an authorized user of the SSH/SOCKS server, and I am not under any bandwidth or CPU usage
constraints. My access to the server is very fast and the tiny bit of latency seems trivial. I?m only interested in the security implications of this approach. Thanks!
Love cheap thrills? Enjoy PC-to-Phone calls to 30+ countries for just 2¢/min with Yahoo! Messenger with Voice.