[Tor-BSD] Tor daemon as a client and as bridge at the same time

teor teor2345 at gmail.com
Mon Jan 22 05:50:08 EST 2018

> On 22 Jan 2018, at 18:17, C. L. Martinez <carlopmart at gmail.com> wrote:
>> On Sun, Jan 21, 2018 at 3:57 PM, teor <teor2345 at gmail.com> wrote:
>> > On 21 Jan 2018, at 23:29, C. L. Martinez <carlopmart at gmail.com> wrote:
>> >
>> > Hi all,
>> >
>> > Is it possible to configure Tor daemon as a bridge and as a client at the same time? For example:
>> >
>> > SocksPort 0
>> > ORPort 9001
>> > BridgeRelay 1
>> > ExitPolicy reject *:*
>> > Log notice file /tmp/tor_notices.log
>> > VirtualAddrNetwork
>> > TransPort 9040
>> > DNSPort 1053
>> > AutomapHostsOnResolve 1
>> > AutomapHostsSuffixes .exit,.onion
>> >
>> > On the other side, is it possible to choose exit nodes by nickname instead by country?
>> It is possible to do all sorts of things with Tor.
>> But running a bridge and a client together lowers your anonymity,
>> and possibly the anonymity of the bridge users.
>> (For example, your IP address will be given out to bridge users.)
>> And choosing exit nodes makes it easier to link your exit nodes
>> and your entry nodes, and discover your client.
>> Why do you want to do these things?
> Thanks Teor. I would like to run a tor bridge but at the same access, I would like to access from my laptop to Tor using this bridge without using TBB or third party components ... Is this possible?

All sorts of Tor configurations are possible.
But TBB exists for a reason.
Some Tor configurations don't get you very good security or anonymity.

What do you  need Tor to do for you?

For example:

If you want to send all your traffic via Tor so you can evade censorship,
your current TransPort configuration can send all your traffic through
Tor to an exit.

But, if you use the SOCKSPort or TransPort on your bridge, then your
circuits will look different to the circuits made by the other clients using
your bridge. (They won't use your bridge as a guard, and they will appear
to have one more hop.)

If you want to be anonymous and blend into the other traffic for your bridge,
then set up one or more Tor clients with SOCKSPorts or TransPorts, and
configure them to use your bridge.

But this won't stop apps leaking data. Apps can share your local IP address
(BitTorrent), or tell websites where you've been (browsers). If you care about
data leaks like this, choose apps that protect you, like Tor Browser or
Tor Messenger.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nycbug.org/pipermail/tor-bsd/attachments/20180122/386e7cdf/attachment.html>

More information about the Tor-BSD mailing list