[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] corridor, a Tor traffic whitelisting gateway



 > I think the topic Bridge Firewall is also related here:
 >
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall
 >
 > (The topic didn't move there yet, but it's all very similar ideas
 > we're discussing here.)

Isn't corridor exactly what that article is describing? It seems like
it's also vulnerable to the 'Severe issue' in the article -- a
compromised tor host behind corridor can get its public IP address with
the 'getinfo address' Tor control protocol command and deanonymize.

Whonix includes this in its threat model -- you should be able to run
arbitrary/compromised code behind the tor gateway and be safe. Can
corridor do anything about it?

--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk