Why do you absolutely want to route all your traffic through your VPN ?
You want to hide to your ISP the fact you use Tor ?

From my point of view, « secure » (no security possible without clean 
specification of your threat model) network will be gateway of your network 
with strong firewall allowing only output to known Tor node (with iptables and 
ipset for example), and one Tor client per computer with all your TCP traffic 
forwarded to TransPort, DNS traffic to DNSPort and UDP traffic blocked.

Because you say your VPN connection is not trustable, you can’t send plain 
traffic inside, so you absolutely need Tor client side.
And then, unless you have to hide Tor to your ISP, you don’t need VPN at all.
If you want to hide Tor to your ISP, just forward all Tor connection from your 
gateway through your VPN (I don’t take time to study the security of doing 
this, perhaps other people here will find troubles).

Regards,
-- 
Aeris
Groupe crypto-terroriste individuel auto-radicalisé sur l’Internet digital
https://imirhil.fr/

Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to