With or without firewall, it's the same security issues. With a firewall, you have to open some ports, and run a service (Tor) on a computer. If you don't trust a computer program, but you want to run it for any reasons, it's better to isolate it from your private network and from sensitive data. Create a DMZ for Tor. Keep your firewall as closed as possible. Don't trust traffic behind your firewall coming from the computer running Tor. And keep in mind that you might be in black lists if you are running a proxy server. This can block you from having access to some servers. Just by exemple, google might ask you a gotcha for every query.
-----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of [email protected] Sent: Wednesday, January 12, 2011 12:28 PM To: [email protected] Subject: Tor Hello Everyone, What are the security implications of running a Tor relay on a machine behind a firewall? Is there a high probability of it being hacked somehow, and what does one do to prevent that? Thank you in advance for your time and advice. mailto:[email protected]
