[Tor-BSD] Tor daemon as a client and as bridge at the same time

C. L. Martinez carlopmart at gmail.com
Mon Jan 22 06:57:40 EST 2018


On Mon, Jan 22, 2018 at 10:50 AM, teor <teor2345 at gmail.com> wrote:

>
> On 22 Jan 2018, at 18:17, C. L. Martinez <carlopmart at gmail.com> wrote:
>
>
> On Sun, Jan 21, 2018 at 3:57 PM, teor <teor2345 at gmail.com> wrote:
>
>>
>> > On 21 Jan 2018, at 23:29, C. L. Martinez <carlopmart at gmail.com> wrote:
>> >
>> > Hi all,
>> >
>> > Is it possible to configure Tor daemon as a bridge and as a client at
>> the same time? For example:
>> >
>> > SocksPort 0
>> > ORPort 9001
>> > BridgeRelay 1
>> > ExitPolicy reject *:*
>> > Log notice file /tmp/tor_notices.log
>> > VirtualAddrNetwork 10.192.0.0/10
>> > TransPort 9040
>> > DNSPort 1053
>> > AutomapHostsOnResolve 1
>> > AutomapHostsSuffixes .exit,.onion
>> >
>> > On the other side, is it possible to choose exit nodes by nickname
>> instead by country?
>>
>> It is possible to do all sorts of things with Tor.
>>
>> But running a bridge and a client together lowers your anonymity,
>> and possibly the anonymity of the bridge users.
>> (For example, your IP address will be given out to bridge users.)
>>
>> And choosing exit nodes makes it easier to link your exit nodes
>> and your entry nodes, and discover your client.
>>
>> Why do you want to do these things?
>>
>> Thanks Teor. I would like to run a tor bridge but at the same access, I
> would like to access from my laptop to Tor using this bridge without using
> TBB or third party components ... Is this possible?
>
>
> All sorts of Tor configurations are possible.
> But TBB exists for a reason.
> Some Tor configurations don't get you very good security or anonymity.
>
> What do you  need Tor to do for you?
>
> For example:
>
> If you want to send all your traffic via Tor so you can evade censorship,
> your current TransPort configuration can send all your traffic through
> Tor to an exit.
>
> But, if you use the SOCKSPort or TransPort on your bridge, then your
> circuits will look different to the circuits made by the other clients
> using
> your bridge. (They won't use your bridge as a guard, and they will appear
> to have one more hop.)
>
> If you want to be anonymous and blend into the other traffic for your
> bridge,
> then set up one or more Tor clients with SOCKSPorts or TransPorts, and
> configure them to use your bridge.
>
> But this won't stop apps leaking data. Apps can share your local IP address
> (BitTorrent), or tell websites where you've been (browsers). If you care
> about
> data leaks like this, choose apps that protect you, like Tor Browser or
> Tor Messenger.
>
> T
>
>
> Ah ... Ok. Understood. Pretty clear now Teor. Many thanks for your help
another time.

And th second question: is it possible to filter by Nicknames instead of
country in torrc's exitnodes section? Or is it a stupid question?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nycbug.org/pipermail/tor-bsd/attachments/20180122/f5064de0/attachment-0001.html>


More information about the Tor-BSD mailing list