Re: [tor-talk] Help me secure my setup

2016-01-12 Thread coderman
On 1/11/16, Oskar Wendel wrote: > ... > I have one more question. What are the drawbacks of not preserving Tor > state directory between reboots? ... > One drawback that I see is that after every reboot, a new entry guard will > be selected and it can make correlation attacks easier. this becomes

Re: [tor-talk] Help me secure my setup

2016-01-11 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Aeris : >> I don't want to >> give out a correlation between time of starting the client and time of my >> Tor activities. > > Event with always connected client, you can be correlated : > online : more Tor traffic (consensus + circuit + d

Re: [tor-talk] Help me secure my setup

2016-01-11 Thread Aeris
> I used a different approach - I used Socks5Proxy option Yep, another solution > I don't want to > give out a correlation between time of starting the client and time of my > Tor activities. Event with always connected client, you can be correlated : online : more Tor traffic (consen

Re: [tor-talk] Help me secure my setup

2016-01-11 Thread Oskar Wendel
Aeris : > Let your network gateway (or each PC) forward all outgoing traffic (or only > traffic to Tor node, with iptables + ipset) through your VPN. I used a different approach - I used Socks5Proxy option in tor and set up a small socks proxy on a server that listens on the VPN end (using ssh

Re: [tor-talk] Help me secure my setup

2016-01-10 Thread Aeris
> So you recommend manually specifying an entry guard, instead of letting > Tor choose? Why? Not at all. Let your network gateway (or each PC) forward all outgoing traffic (or only traffic to Tor node, with iptables + ipset) through your VPN. And use the normal way a normal Tor client per PC, co

Re: [tor-talk] Help me secure my setup

2016-01-10 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 s7r : > Periodic consensus downloads, as well as keeping always some fresh > circuits on the list in order to attach streams to when requested via > the SocksPort. In other words, not much traffic but not 0 traffic as well. And what about a client th

Re: [tor-talk] Help me secure my setup

2016-01-10 Thread Aeris
Why do you absolutely want to route all your traffic through your VPN ? You want to hide to your ISP the fact you use Tor ? From my point of view, « secure » (no security possible without clean specification of your threat model) network will be gateway of your network with strong firewall allow

Re: [tor-talk] Help me secure my setup

2016-01-10 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Periodic consensus downloads, as well as keeping always some fresh circuits on the list in order to attach streams to when requested via the SocksPort. In other words, not much traffic but not 0 traffic as well. Related to your other questio

Re: [tor-talk] Help me secure my setup

2016-01-10 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Oskar Wendel : > 1. Maybe I should run a private (unpublished) bridge on the server and a > tor client on my tor PC, that would be able to connect only to the bridge > (through a VPN)? This way, all unencrypted traffic would never exit a tor > PC.

[tor-talk] Help me secure my setup

2016-01-10 Thread Oskar Wendel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 My current setup is fairly simple. Let me introduce some consistent naming first. - - server - my server (VPS) in the datacentre - - router - a router in my home, it has a private VPN connection to the server - - tor PC - a PC on which I browse tor