On Thursday 2 June, 2011 15:45:04 tagnaq wrote:
> > At the end, you will have achieved Bridged networking, so why
> > bother?
> 
> If your Host OS acts as a router your relay running in a VM won't be
> able to perform layer 2 attacks on your LAN as long as the VM can't
> compromise the Host OS.

This has merit.  

And come to think of it, using Shorewall to masquerade the guest through the 
host, I could force all the guest's traffic to the router -only-.

I think with the guest running Debian SELinux it is unlikely to be compromised, 
so this may be a good solution.  

Criticisms?



_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to