[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] transparent tor routers
On Mon, 2016-01-18 at 15:46 +0100, Aeris wrote:
> > Hardware offering Tor routing is becoming very cheap and I think it's
> > time to reexamine what we can do with it.
> >
> > If you want to play, here is some hardware I recently bought that can
> > run Tor firmware:
> >
> > http://www.amazon.com/GL-AR150-router-150Mbps-OpenWrt-Pre-installed/dp/B015C
> > YDVG8/
>
> Not so simple.
>
> As explain in private, you *need* to avoid Tor inside Tor.
> So you need some smart firewall, based on ipset generated from the consensus,
> to route Tor connection directly and proxify everything else, or multiple
> access point and ESSID to discriminate usage.
>
> And in this case, cheap routers with OpenWRT have nor enough memory nor CPU to
> manage properly those corner cases.
> For example, Tor ipset loading already takes few minutes on a Olimex A20 Lime
> (512MB DDR3 + dual core 1GHz), I canât imagine decent/usable perf on a AR150
> (64MB DDR + 400MHz).
>
> You also need some basic Tor configuration web UI (bridge, firewalled portâ)
> adapted for not-savy users.
> No enough place on tiny routerâ
>
Sorry, I do not understand why things are difficult. The Tor daemon has
support for transparent proxying. See:
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
Besides some extra torrc entries, only a few simple firewall rules are
needed.
I can also assure you that Tor works quite well on the router hardware
mentioned above. I'm only playing with the hardware but I have not
encountered any problems yet. Performance is OK too.
regards,
Rob.
https://hoevenstein.nl
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk