Re: funneling a wireless net's outbound connections through tor

2007-10-05 Thread Scott Bennett
 Once again, the Internet has patched around a failure, and information
resumes its flow.  Thank you, tup!
 On Tue, 2 Oct 2007 03:54:56 + tup [EMAIL PROTECTED] wrote:
On 9/28/07, Scott Bennett [EMAIL PROTECTED] wrote:
  I'm trying to set up a free wireless service for those of my neighbors
 within range of a little wireless router I have.  To keep things safe for
 me and at least somewhat safer for them, I want to route all the outbound
 connections from that router through tor using pf under FreeBSD 6.2-STABLE
 (i386).  In order to keep such traffic distinguishable from my own local
 traffic, I intend to route it to tor on a second loopback interface (lo1).
 I've looked at instructions for doing something like this at

 http://wiki.noreply.org/noreply/TheOnionRouter/TransparentProxy

The second loopback interface is simply a kludge I found that allows
pf to apply rdr rules to locally-originated traffic. You don't need it if
you're only trying to redirect others' traffic; see section 3.2 in that
wiki page.

 Yeah, that much I had gotten.  I only wanted it on a separate interface,
so that I could see traffic volume for the wireless router at a glance with
systat(1).  If it went via lo0, I would have no way to distinguish the wireless
traffic volume from all other loopback traffic.

  dns-proxy-tor apparently uses the MAPADDRESS command via the tor
 control port, so it is also necessary to specify a VirtualAddrNetwork in
 torrc for dns-proxy-tor's use, so those instructions include an example of
 VirtualAddrNetwork.
  However, I had been hoping to use DNSPort in torrc instead of running
 dns-proxy-tor.  Am I correct in thinking that I will not neet to specify a
 VirtualAddrNetwork?

You'll still want to set VirtualAddrNetwork to an unused, private
address space so that .onion and .exit names will resolve to routable
addresses when you specify 'AutomapHostsOnResolve 1'.

 Ah.  Another undocumented command for use in torrc.  Thanks for the info!

  A second question for someone who uses or has used pf under FreeBSD
 or OpenBSD involves the use of rdr commands to redirect the TCP connections
 from the interface connected to the wireless router's WAN port.  If the
 rdr changes the TCP or UDP packets' destination addresses to lo1's address
 (127.0.0.2), how does tor know what the original destination is supposed
 to be?  I didn't find anything in the tor documentation or elsewhere to
 explain this.

This is a platform-specific implementation detail, which explains why
it's not documented. What happens is that the route-to rule routes
traffic to lo1, where the rdr rule actually rewrites the destination
address and port to 127.0.0.1:9040. The original destination is kept
around in the connection state table, so it can be looked up by Tor
with the right ioctl(2) command on /dev/pf; see pf(4).

 *Oh*.  Okay.  That makes it much clearer.  Thank you once more.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Scott Bennett
 On Mon, 01 Oct 2007 03:33:46 +0200 Juliusz Chroboczek
[EMAIL PROTECTED] wrote:
  [I, Scott Bennett, wrote:]
  I'm trying to set up a free wireless service for those of my neighbors
 within range of a little wireless router I have.  To keep things safe for
 me and at least somewhat safer for them, I want to route all the outbound
 connections from that router through tor using pf under FreeBSD 6.2-STABLE
 (i386).

Do not do that.

 I am going to do that and as soon as I can figure out how to do it
correctly.

You should not make traffic go transparently through tor, unless the
people using your network fully understand what tor is about, and what
are the associated security risks (such as exit nodes performing MITM
attacks on SSL certificates).

 Thank you for your opinion, but it was not particularly relevant to
what I posted.
 First, please reread what I wrote.  I will be providing a *free
wireless access* service to my neighbors.  Even if I tell them *nothing*,
they will be better off than without the service.  They do not even have
to know that it is going through any sort of anonymizing process.  Just
the fact that they will have a free, if rather pokey, service available
will be an enhancement to my neighborhood.
 Second, tor 0.1.2.2 and up are designed to do this.  See the torrc
line called TransPort.  tor 0.2.0.1 and up are designed to do this without
the earlier necessity of providing a name service proxy.  See the torrc
line called DNSPort.
 Third, you didn't even ask whether I might have already given some
thought to the matter of educating/informing my neighbors about how their
TCP connections and name server queries will be reaching the Internet and
how responses will be returned from the Internet.  I have been planning
this service for quite some time.
 Fourth, my primary motivation for running my neighbors' connections
through tor is to protect *me* from whatever *they* are doing.  The fact
that routing their connections through tor should also give *them* some
protection is a purely secondary benefit.
 I am now in the process of trying to get it to work.  If anyone knows
the answers to the questions I posted, I would still appreciate your
information.

Instead, put a simple stateless firewall on your network, and redirect
port 80 traffic to a web server that explains how to set up their web
browser to go through tor.

 That would defeat the purpose of providing free wireless TCP access
to the Internet.

Please make sure that your HTTP proxy allows CONNECT to TCP ports 22,
80, 109-110, 143, 443, 873, 993 and 995.  22 is especially important
if there are any geeks in your neighbourhood.

 My HTTP proxy is privoxy and will continue to provide service only
to me.  It is quite possible that I will never have any direct
communication with many of my neighbors, so requiring them to reconfigure
their applications, which may include more than mere web browsers, to use
an HTTP proxy is out of the question.  It also would not be of any use
to network applications that do not use HTTP.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell

Scott Bennett wrote:


I'm trying to set up a free wireless service for those of my neighbors
within range of a little wireless router I have.  To keep things safe for
me and at least somewhat safer for them, I want to route all the outbound
connections from that router through tor using pf under FreeBSD 6.2-STABLE
(i386).

Do not do that.

I am going to do that and as soon as I can figure out how to do it
correctly.

You should not make traffic go transparently through tor, unless the
people using your network fully understand what tor is about, and what
are the associated security risks (such as exit nodes performing MITM
attacks on SSL certificates).


Thank you for your opinion, but it was not particularly relevant to
what I posted. First, please reread what I wrote.  I will be providing a *free
wireless access* service to my neighbors.  Even if I tell them *nothing*,
they will be better off than without the service.  They do not even have
to know that it is going through any sort of anonymizing process.  Just
the fact that they will have a free, if rather pokey, service available
will be an enhancement to my neighborhood.


If you set up something like that you're opening up all sorts of attacks 
against the people who use your service. If they don't know that all of 
their plain text traffic can be read and modified by, dodgy, exit 
nodes, and almost certainly *will* be at some point...


Mike


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Scott Bennett
 On Mon, 01 Oct 2007 10:06:50 +0100 Mike Cardwell [EMAIL PROTECTED]
wrote:
Scott Bennett wrote:

 I'm trying to set up a free wireless service for those of my neighbors
 within range of a little wireless router I have.  To keep things safe for
 me and at least somewhat safer for them, I want to route all the outbound
 connections from that router through tor using pf under FreeBSD 6.2-STABLE
 (i386).
 Do not do that.
 I am going to do that and as soon as I can figure out how to do it
 correctly.
 You should not make traffic go transparently through tor, unless the
 people using your network fully understand what tor is about, and what
 are the associated security risks (such as exit nodes performing MITM
 attacks on SSL certificates).
 
 Thank you for your opinion, but it was not particularly relevant to
 what I posted. First, please reread what I wrote.  I will be providing a 
 *free
 wireless access* service to my neighbors.  Even if I tell them *nothing*,
 they will be better off than without the service.  They do not even have
 to know that it is going through any sort of anonymizing process.  Just
 the fact that they will have a free, if rather pokey, service available
 will be an enhancement to my neighborhood.

If you set up something like that you're opening up all sorts of attacks 
against the people who use your service. If they don't know that all of 
their plain text traffic can be read and modified by, dodgy, exit 
nodes, and almost certainly *will* be at some point...

 How will they be subject to any greater number of possible attacks
if their connections are funneled through tor than if they are not?  They
can go to any of several coffee shops in the area and use unencrypted,
completely unprotected, free or paid wireless services.  They just can't
do that at home.  If you see some way by which anonymizing their TCP
source addresses and their UDP port 53 (name service) packets' source
addresses when they access the Internet at home will cause them to suffer
more attacks than they will in any public location or, for that matter,
from a direct connection in their own dwelling if they had one, please
enlighten me.
 Aside from that, the only IP addresses that could conceivably be
discovered would either be the one temporarily assigned to my connection
or the one assigned on a private network by my wireless router via DHCP.
 In any case, I still would appreciate helpful information, so I'll
repeat my questions here, quoting from my original query:

- dns-proxy-tor apparently uses the MAPADDRESS command via the tor
-control port, so it is also necessary to specify a VirtualAddrNetwork in
-torrc for dns-proxy-tor's use, so those instructions include an example of
-VirtualAddrNetwork.
- However, I had been hoping to use DNSPort in torrc instead of running
-dns-proxy-tor.  Am I correct in thinking that I will not neet to specify a
-VirtualAddrNetwork?
- A second question for someone who uses or has used pf under FreeBSD
-or OpenBSD involves the use of rdr commands to redirect the TCP connections
-from the interface connected to the wireless router's WAN port.  If the
-rdr changes the TCP or UDP packets' destination addresses to lo1's address
-(127.0.0.2), how does tor know what the original destination is supposed
-to be?  I didn't find anything in the tor documentation or elsewhere to
-explain this.

 Thanks!


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell

Scott Bennett wrote:

If you set up something like that you're opening up all sorts of attacks 
against the people who use your service. If they don't know that all of 
their plain text traffic can be read and modified by, dodgy, exit 
nodes, and almost certainly *will* be at some point...

 How will they be subject to any greater number of possible attacks
if their connections are funneled through tor than if they are not?  They
can go to any of several coffee shops in the area and use unencrypted,
completely unprotected, free or paid wireless services.  They just can't
do that at home.  If you see some way by which anonymizing their TCP
source addresses and their UDP port 53 (name service) packets' source
addresses when they access the Internet at home will cause them to suffer
more attacks than they will in any public location or, for that matter,
from a direct connection in their own dwelling if they had one, please
enlighten me.


If they use an Internet cafe, their traffic is subject to being 
monitored. If they use Tor it is *also* subject to being modified.


Example 1:

Your user goes to http://www.hotmail.com/ and enters their login 
details. The Tor exit node controller has written something to modify 
the html on that page so the form posts to a http url instead of a https 
url. Their login details are now compromised.


Example 2:

Your user goes to http://www.msn.co.uk/livemessenger to download msn 
messenger. They click the download it now link. The tor exit node 
controller intercepts that request and returns a modified exe containing 
a trojan instead of the original.


Scary huh?

Of course, you could argue that the person running the Internet cafe or 
the ISP could do that, but I am inclined to believe it's much more 
likely to occur on the Tor network than in those cases.



 Aside from that, the only IP addresses that could conceivably be
discovered would either be the one temporarily assigned to my connection
or the one assigned on a private network by my wireless router via DHCP.
 In any case, I still would appreciate helpful information, so I'll
repeat my questions here, quoting from my original query:


The anonymity of the IP address is not at issue here. The issue is, by 
using Tor, you allow the possibility of exit nodes monitoring and 
modifying traffic, so you should only use Tor if you truly understand 
these issues and how to deal with them.


IMHO. There's no need to use Tor for general web browsing, and at the 
end of the day it probably makes your online experience more dangerous 
rather than less dangerous.


Mike


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Scott Bennett
 On Mon, 01 Oct 2007 15:19:26 +0100 Mike Cardwell [EMAIL PROTECTED]
wrote:
Scott Bennett wrote:

 If you set up something like that you're opening up all sorts of attacks 
 against the people who use your service. If they don't know that all of 
 their plain text traffic can be read and modified by, dodgy, exit 
 nodes, and almost certainly *will* be at some point...
  How will they be subject to any greater number of possible attacks
 if their connections are funneled through tor than if they are not?  They
 can go to any of several coffee shops in the area and use unencrypted,
 completely unprotected, free or paid wireless services.  They just can't
 do that at home.  If you see some way by which anonymizing their TCP
 source addresses and their UDP port 53 (name service) packets' source
 addresses when they access the Internet at home will cause them to suffer
 more attacks than they will in any public location or, for that matter,
 from a direct connection in their own dwelling if they had one, please
 enlighten me.

If they use an Internet cafe, their traffic is subject to being 
monitored. If they use Tor it is *also* subject to being modified.

 If they go to a coffee shop or other location with free wireless
access, their traffic is also subject to being modified, but at *any
and every* hop between their computer and the destination, unless they
use end-to-end encryption anyway.

Example 1:

  [deleted as not unique to the tor environment  --SB]

Example 2:

  [deleted as not unique to the tor environment  --SB]

Scary huh?

 Of course.  But in my intended setup, the only places that could
happen would be in my equipment, the exit node, the destination, or the
hops between the exit node and the destination.  It's not going to happen
in my equipment because I don't do that sort of thing and wouldn't have
the time or energy to devote to it even if I did do that kind of thing.
That leaves the exit node, the destination, and the hops between them.
 If the traffic does not go through tor, then those things could
happen at any of the up to 32 hops normally allowed for a TCP connection.
I do not see how reducing the number of potential points of attack
increases the risk.

Of course, you could argue that the person running the Internet cafe or 
the ISP could do that, but I am inclined to believe it's much more 
likely to occur on the Tor network than in those cases.

 So could anyone along the path of an ordinary, unencrypted TCP link.
Some governments apparently do this sort of thing already, most likely
including the U.S. government.

  Aside from that, the only IP addresses that could conceivably be
 discovered would either be the one temporarily assigned to my connection
 or the one assigned on a private network by my wireless router via DHCP.
  In any case, I still would appreciate helpful information, so I'll
 repeat my questions here, quoting from my original query:

The anonymity of the IP address is not at issue here. The issue is, by 
using Tor, you allow the possibility of exit nodes monitoring and 
modifying traffic, so you should only use Tor if you truly understand 
these issues and how to deal with them.

 I see.  The elitist approach to limiting use of damned good software.
Reminds me of David Sternlight claiming that there was no reason for anyone
to use PGP and therefore people shouldn't bother with it.  It was ridiculous
on its face, yet he persisted in trolling the PGP news groups with it for
years.  Do you work for the NSA by any chance?  (Like you would really say
so if you did.  Right.)

IMHO. There's no need to use Tor for general web browsing, and at the 
end of the day it probably makes your online experience more dangerous 
rather than less dangerous.

 Then perhaps you should get permission to update the tor web pages and
documentation.  After all, we wouldn't want all that general web browsing
traffic to help hide traffic that certain governments really don't want
hidden.  And I'm sure that Roger Dingledine et al. really don't want to
promote widespread use of all their hard work for something so mundane as
general web browsing.  Feh.
 Again, if someone knows the answers to the questions I've now
posted twice, please advise.  I know I can probably figure it out by
trial and error, but it would be messy, and I don't have a spare
computer at present to do that properly.  Testing it from the same computer
runs into problems with routing tables, arp responses from the wrong
interfaces, etc.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army. 

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell

Scott Bennett wrote:

If they use an Internet cafe, their traffic is subject to being 
monitored. If they use Tor it is *also* subject to being modified.


 If they go to a coffee shop or other location with free wireless
access, their traffic is also subject to being modified, but at *any
and every* hop between their computer and the destination, unless they
use end-to-end encryption anyway.

Example 1:

 [deleted as not unique to the tor environment  --SB]

Example 2:

 [deleted as not unique to the tor environment  --SB]

Scary huh?


 Of course.  But in my intended setup, the only places that could
happen would be in my equipment, the exit node, the destination, or the
hops between the exit node and the destination.  It's not going to happen
in my equipment because I don't do that sort of thing and wouldn't have
the time or energy to devote to it even if I did do that kind of thing.
That leaves the exit node, the destination, and the hops between them.
 If the traffic does not go through tor, then those things could
happen at any of the up to 32 hops normally allowed for a TCP connection.
I do not see how reducing the number of potential points of attack
increases the risk.
Of course, you could argue that the person running the Internet cafe or 
the ISP could do that, but I am inclined to believe it's much more 
likely to occur on the Tor network than in those cases.


 So could anyone along the path of an ordinary, unencrypted TCP link.
Some governments apparently do this sort of thing already, most likely
including the U.S. government.


1.) People that can perform these attacks if you just use a normal 
Internet connection: Governments, people working for ISPs


2.) People that can perform these attacks if you use Tor: Governments, 
people working for ISPs and anyone who know how to install Tor. 
Including some wannabe hacker 13 year old kid living on the other side 
of the World.


If you use Tor, you considerably increase the number and range of people 
that could potentially attack you. You also make yourself a tastier target.


This is not a bad thing if you know how to deal with it. It *is* a bad 
thing if you don't. For example, I have only ever had attempted MITM 
attacks against my ssh sessions when using them over Tor.



 Aside from that, the only IP addresses that could conceivably be
discovered would either be the one temporarily assigned to my connection
or the one assigned on a private network by my wireless router via DHCP.
 In any case, I still would appreciate helpful information, so I'll
repeat my questions here, quoting from my original query:
The anonymity of the IP address is not at issue here. The issue is, by 
using Tor, you allow the possibility of exit nodes monitoring and 
modifying traffic, so you should only use Tor if you truly understand 
these issues and how to deal with them.


 I see.  The elitist approach to limiting use of damned good software.
Reminds me of David Sternlight claiming that there was no reason for anyone
to use PGP and therefore people shouldn't bother with it.  It was ridiculous
on its face, yet he persisted in trolling the PGP news groups with it for
years.  Do you work for the NSA by any chance?  (Like you would really say
so if you did.  Right.)


Your interpretation of what I said is quite hilarious.

Hopefully nobody will help you use Tor for something that is dangerous 
and that you clearly don't understand. For your users sake.


Mike


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Scott Bennett
 On Mon, 01 Oct 2007 16:35:29 +0100 Mike Cardwell [EMAIL PROTECTED]
wrote:

Scott Bennett wrote:

 If they use an Internet cafe, their traffic is subject to being 
 monitored. If they use Tor it is *also* subject to being modified.
 
  If they go to a coffee shop or other location with free wireless
 access, their traffic is also subject to being modified, but at *any
 and every* hop between their computer and the destination, unless they
 use end-to-end encryption anyway.
 Example 1:

  [deleted as not unique to the tor environment  --SB]

 Example 2:

  [deleted as not unique to the tor environment  --SB]

 Scary huh?
 
  Of course.  But in my intended setup, the only places that could
 happen would be in my equipment, the exit node, the destination, or the
 hops between the exit node and the destination.  It's not going to happen
 in my equipment because I don't do that sort of thing and wouldn't have
 the time or energy to devote to it even if I did do that kind of thing.
 That leaves the exit node, the destination, and the hops between them.
  If the traffic does not go through tor, then those things could
 happen at any of the up to 32 hops normally allowed for a TCP connection.
 I do not see how reducing the number of potential points of attack
 increases the risk.
 Of course, you could argue that the person running the Internet cafe or 
 the ISP could do that, but I am inclined to believe it's much more 
 likely to occur on the Tor network than in those cases.
 
  So could anyone along the path of an ordinary, unencrypted TCP link.
 Some governments apparently do this sort of thing already, most likely
 including the U.S. government.

1.) People that can perform these attacks if you just use a normal 
Internet connection: Governments, people working for ISPs

 ...and anyone running a destination site being accessed with or
without tor, and anyone with a wireless card in a laptop in the same
public location, etc.

2.) People that can perform these attacks if you use Tor: Governments, 
people working for ISPs and anyone who know how to install Tor. 
Including some wannabe hacker 13 year old kid living on the other side 
of the World.

 Governments are incomparably more dangerous than any 13-year-old or
even ISPs.  Also, given the number of teenagers who have cracked well
funded web servers, I'd say that said teenager is still not out of the loop
without tor.

If you use Tor, you considerably increase the number and range of people 
that could potentially attack you. You also make yourself a tastier target.

This is not a bad thing if you know how to deal with it. It *is* a bad 
thing if you don't. For example, I have only ever had attempted MITM 
attacks against my ssh sessions when using them over Tor.

  Aside from that, the only IP addresses that could conceivably be
 discovered would either be the one temporarily assigned to my connection
 or the one assigned on a private network by my wireless router via DHCP.
  In any case, I still would appreciate helpful information, so I'll
 repeat my questions here, quoting from my original query:
 The anonymity of the IP address is not at issue here. The issue is, by 
 using Tor, you allow the possibility of exit nodes monitoring and 
 modifying traffic, so you should only use Tor if you truly understand 
 these issues and how to deal with them.
 
  I see.  The elitist approach to limiting use of damned good software.
 Reminds me of David Sternlight claiming that there was no reason for anyone
 to use PGP and therefore people shouldn't bother with it.  It was ridiculous
 on its face, yet he persisted in trolling the PGP news groups with it for
 years.  Do you work for the NSA by any chance?  (Like you would really say
 so if you did.  Right.)

Your interpretation of what I said is quite hilarious.

  That line would certainly be in character for Sternlight.

Hopefully nobody will help you use Tor for something that is dangerous 
and that you clearly don't understand. For your users sake.

 I understand it fine.  I just evaluate the dangers differently from
you.  Not using tor at all is far more dangerous in my view.
 If it worries you so much, then I guess you need to convince the tor
development team to remove the support for TransPort and DNSPort.  Maybe
you should also get them to stop making tor freely downloadable from the
tor.eff.org web site, perhaps limiting downloads only to people who have
passed a course on subjects you deem pertinent, so that the great unwashed
will be protected.
 Yet again, I'd appreciate any *helpful* information regarding my two
questions.  It would save me a lot of headaches getting to it by trial and
error.
 BTW, I didn't come up with the idea to provide wireless service to
neighbors via tor.  I first read about it on this list, IIRC, where the
person posting the start of that thread had an old 802.11b router that he
wanted to put to use rather than add to his 

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Arjan
Scott Bennett wrote:
[...]
  Governments are incomparably more dangerous than any 13-year-old or
 even ISPs.  Also, given the number of teenagers who have cracked well
 funded web servers, I'd say that said teenager is still not out of the loop
 without tor.
[...]
 Not using tor at all is far more dangerous in my view.

In this case, using TOR will make things less secure / anonymous for the
people using your wireless AP.

People using an open, unencrypted, AP can have their traffic sniffed by:
- other people nearby
- AP owner
- ISP of the AP owner
- government
- ... (depends on the destination)
When sending the traffic over TOR, (part of) it can also be watched by:
- all exit node operators (some owned by crackers / government agencies)
- their ISPs
- their governments

Since the AP user doesn't know he's using TOR, he will probably transmit
information that shows his identity. He may end up on a government watch
list, because they know that all TOR users are child pornographers /
terrorists.

Take a look at this too (it was mentioned on this list before):
http://www.derangedsecurity.com/time-to-reveal%e2%80%a6/


You should inform the users about TOR, before letting them use it. It's
less convenient, but it's much more secure for them. Not using TOR at
all would be even more secure for them, but then your IP would show up
when your users do bad things.

Some ideas:

Manual proxy setup
- redirect non-proxy http / https traffic to a page with setup
  information for your proxy
- allow traffic to your proxy
- block all other traffic

VPN, using PPTP or something like that
- redirect non-VPN http / https traffic to a page with setup information
- redirect all VPN traffic through TOR
- block all other traffic

I prefer a VPN solution, because of the wireless link encryption. It
should also work for any application that doesn't know about proxies.



Arjan


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Robert Hogan
On Monday 01 October 2007 16:35:29 Mike Cardwell wrote:

 If you use Tor, you considerably increase the number and range of people
 that could potentially attack you. You also make yourself a tastier target.

 This is not a bad thing if you know how to deal with it. It *is* a bad
 thing if you don't. For example, I have only ever had attempted MITM
 attacks against my ssh sessions when using them over Tor.


I think torifying a user's traffic without informing him of it is a very bad 
idea. Pop3 is the best example. I don't think anyone with all the facts to 
hand would ever use a pop3 session over Tor. Whatever the merits of the 
well-you-go-over-x-hops-anyway argument (and it generally does not apply to 
pop3), tor is always x-hops + 1, and that '+ 1' could be anyone from Aunt 
Nellie to the NSA, no special privileges required.

This is one of the main challenges faced by Live CDs and other Torified 
environments - is it better to anonymize everything in the session or always 
prevent the likes of pop3 from being anonymized, ever?


signature.asc
Description: This is a digitally signed message part.


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Juliusz Chroboczek
You should not make traffic go transparently through tor, unless the
people using your network fully understand what tor is about, and what
are the associated security risks (such as exit nodes performing MITM
attacks on SSL certificates).

  Thank you for your opinion, but it was not particularly relevant to
 what I posted.

Perhaps this tone is not absolutely necessary?

  First, please reread what I wrote.  I will be providing a *free
 wireless access* service to my neighbors.  Even if I tell them *nothing*,
 they will be better off than without the service.

No, they won't.  Non-technical people often assume that DNS and
routing are secure.  We know they aren't, but they don't.

By routing their traffic transparently through tor, you increase their
chance of exposure to MITM attacks.  Unless you warn them, you'd
actually be doing them a disservice.

  Third, you didn't even ask whether I might have already given some
 thought to the matter of educating/informing my neighbors about how their
 TCP connections and name server queries will be reaching the Internet and
 how responses will be returned from the Internet.
[...]
 It is quite possible that I will never have any direct communication
 with many of my neighbors, so requiring them to reconfigure their
 applications, which may include more than mere web browsers, to use
 an HTTP proxy is out of the question.

So are you or aren't you in touch with them?

  Fourth, my primary motivation for running my neighbors' connections
 through tor is to protect *me* from whatever *they* are doing.  The fact
 that routing their connections through tor should also give *them* some
 protection is a purely secondary benefit.

You will have the same amount of protection if you put a stateless
firewall (with no interception) that forces them to go through the
proxy.  Please re-read the following:

Instead, put a simple stateless firewall on your network, and redirect
port 80 traffic to a web server that explains how to set up their web
browser to go through tor.

 It also would not be of any use to network applications that do not
 use HTTP.

Please re-read the following:

 Please make sure that your HTTP proxy allows CONNECT to TCP ports 22,
 80, 109-110, 143, 443, 873, 993 and 995.  22 is especially important
 if there are any geeks in your neighbourhood.

CONNECT is a sub-protocol of HTTP that is used to tunnel non-HTTP
protocols through an HTTP proxy.  It's sort of like SOCKS, but cleaner.

Juliusz


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Michael_google gmail_Gersten
I think this discussion brings up an interesting point, again.

Tor [b] changes [/b] the risks you are opened to.

It removes the risk of ISP's, search engines, and advertisers from
tracking your click stream, and being the receipt of a government
request for your online history. (Most people don't need tor because
of the anonymity. The more people using tor, the better hidden those
that do need it are hidden.)

It exposes serious MITM attacks for anything that is not HTTPS: unless
you use exit guards.

We have entry guards specifically because otherwise evil node group X
will at some point grab your entry node and exit node, and correlate
who you are.

We need exit guards specifically because otherwise evil exit node X
will at some point grab your authentication cookies.

Previously, someone said that having both entry guards and exit guards
together was self defeating. Do we need exit guards more than we need
entry guards?


funneling a wireless net's outbound connections through tor

2007-09-28 Thread Scott Bennett
 I'm trying to set up a free wireless service for those of my neighbors
within range of a little wireless router I have.  To keep things safe for
me and at least somewhat safer for them, I want to route all the outbound
connections from that router through tor using pf under FreeBSD 6.2-STABLE
(i386).  In order to keep such traffic distinguishable from my own local
traffic, I intend to route it to tor on a second loopback interface (lo1).
I've looked at instructions for doing something like this at

http://wiki.noreply.org/noreply/TheOnionRouter/TransparentProxy

 dns-proxy-tor apparently uses the MAPADDRESS command via the tor
control port, so it is also necessary to specify a VirtualAddrNetwork in
torrc for dns-proxy-tor's use, so those instructions include an example of
VirtualAddrNetwork.
 However, I had been hoping to use DNSPort in torrc instead of running
dns-proxy-tor.  Am I correct in thinking that I will not neet to specify a
VirtualAddrNetwork?
 A second question for someone who uses or has used pf under FreeBSD
or OpenBSD involves the use of rdr commands to redirect the TCP connections
from the interface connected to the wireless router's WAN port.  If the
rdr changes the TCP or UDP packets' destination addresses to lo1's address
(127.0.0.2), how does tor know what the original destination is supposed
to be?  I didn't find anything in the tor documentation or elsewhere to
explain this.
 Thanks in advance!


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**