Hi all,
so, I've been browsing the web using Tor for some time now, and I have to say
that, at least with the cir quid I am currently using, I'm quite impressed with
the performance, especially since I'm only connected through a 3g ap at the
moment! So, I've had a look around the Torproject site and reading up on how it
all works and what safeguarding should be performed in order to stay secure.
So, I was thinking, how could I get all the systems that are part of my own
home network to access the web securely and anonymously? Well, I came up with
the following idea, and since some of you guys may have tried this, was
wondering if this would be practicable:
on my network, all devices are behind a hardware firewall that performs NAT and
packet filtering for viruses and other malicious stuff (UTM). The firewall acts
as the DHCP within the network, and its WAN port is connected to my router
which only handles internet connections. So far for my current network
topology. Now, I was thinking of adding another gateway here. My idea was to
take an embedded PC (e.g. a Soekris box) and installing a distribution such as
Debian on its memory. Then, a DHCP could first be set up on this box. Using
iptables, network interface routing could be configured, so that traffic
arriving at the LAN network interfaces would be routed to one exit point, the
WAN interface. So, at this stage, the DHCP on the Debian machine would assign
IPs to clients connected to the LAN ports, and all traffic arriving at these
ports would be redirected to one port which would be the WAN. Now, this box
could, for example, be connected in between the firewall and the route
r. So, the firewall would receive an IP from the Debian box, and all network
clients would still be behind the firewall. So then, when a client wants to
access the internet, it would first go through the firewall, from the firewall
to the Debian box and from there to the router and the web. Now, the Debian box
would have to route all connections through the Tor network. I guess Polipo
could be set up on the Debian box so that it will route all outgoing
connections through the Tor network. In this case, all traffic passing through
the box would be anonymized on the fly. However, some other steps would have to
be taken. For example, I guess it would be wise to implement functionality such
as offered by the SSL Everywhere Firefox extension, so that SSL would
automatically be enabled on as many sites as possible. Also, it probably would
be better to configure Polipo to reject any Cookies, Java Applets, Flash and
anything else that could compromise security. As such limitations w
ould also limit "comfortable" browsing, I guess various modes could be
designed, such as a safe mode (fully anonymized), a restrictive mode (not
everything is blocked, thus potential security risks exist) and a
non-restrictive mode (all traffic is routed through Tor, however no packet
filtering is performed - most convenient but also most insecure). Also, both
safe and restrictive mode could perform things such as browser-header
obfuscation, geo-data obfuscation, etc. Sure, such concepts would probably take
some time and work in order to make everything work. Therefore, I wondered if
someone might be working on such a task already and if not, if this would be a
project which would make sense, and which would be worth putting some effort
into. I guess my idea probably isn't new to most people dealing with Tor and
secure networking, but I'm wondering if such a platform already exists. I
definitely will be working on this once I get back home, as I think such an
undertake would
be quite useful to me personally!
Robin
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk