[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Can Tor run over Tor?



On Thu, Oct 30, 2014 at 03:48:27PM +0100, Lars Luthman wrote:
> > If so, has anyone ever thought about the pros/cons of this? Obviously, it's
> > exponentially more inefficient. But is it any more secure?
> 
> I have done it accidentally with a misconfigured transparent proxy that
> sent its own Tor traffic to its own transparent proxying port. It
> worked, though a bit slower (as expected).
> 
> I don't think it would be any more secure. The most serious publically
> known attacks against the anonymity of Tor users (browser bugs etc
> notwithstanding) are correlation attacks where the attacker compare
> traffic at the client end with traffic at exit nodes and see if it looks
> similar in timing and data sizes. A six-relay circuit (which is what you
> get when running Tor over Tor) doesn't change that at all.
> 
> An attack where the traffic is actually traced all the way through the
> Tor relays would be harder, but those are probably not the attacks we
> should be worrying about in the first place. And a longer circuit may
> circuit as well.

Right.

Also have a read through
https://trac.torproject.org/projects/tor/ticket/2667
for how we'd like to disable Tor-over-Tor one day to block an
attack (but there are tradeoffs).

--Roger

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk