[tor-talk] Run Multiple Mac Vidalia/Tor Bundle Apps?

2011-05-26 Thread Chris Armstrong
Is it possible to run multiple Vidalia/Tor bundles on Mac OS? I've been trying to figure this out, and the biggest obstacle I'm running into is that Vidalia always seems to look for it's configuration file at: ~/Library/Vidalia It seems like this would work as long as I can give each instance the

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Martin Fick
--- On Thu, 5/26/11, cac...@quantum-sci.com wrote: > > So you're worrying about a compromised vserver guest > > compromising the host, which is then used to attack > > your LAN segment? > > Doesn't even have to compromise the host.  With the > guest in the same class C it can monitor traffic. T

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Martin Fick
--- On Thu, 5/26/11, cac...@quantum-sci.com wrote: > Martin Fick wrote: > > I run mine in a linux vserver, it should run in lxc > also, > > Problem is you need to patch the kernel, and it must share > network setup with the host. lxc does not require any patching. With lxc, you can setup the

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Marsh Ray
On 05/26/2011 11:12 AM, cac...@quantum-sci.com wrote: On Thursday 26 May, 2011 07:31:42 Eugen Leitl wrote: So you're worrying about a compromised vserver guest compromising the host, which is then used to attack your LAN segment? Doesn't even have to compromise the host. With the guest in the

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread CACook
On Thursday 26 May, 2011 07:31:42 Eugen Leitl wrote: > You don't have another NIC to bind it to? Isolate the > traffic via VLANs? No the way out to The Internets is the only way out. There is one router out. > So you're worrying about a compromised vserver guest > compromising the host, which

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Eugen Leitl
On Thu, May 26, 2011 at 06:44:19AM -0700, cac...@quantum-sci.com wrote: > On Thursday 26 May, 2011 05:37:06 Eugen Leitl wrote: > > Why don't you like Linux vserver? My relay did some 350 GByte/day, > > in a vserver guest on a low-end Atom box. > > It must necessarily share the network setup with t

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread CACook
On Thursday 26 May, 2011 05:37:06 Eugen Leitl wrote: > Why don't you like Linux vserver? My relay did some 350 GByte/day, > in a vserver guest on a low-end Atom box. It must necessarily share the network setup with the host, and so the LAN class C since I can't set up the router downstream with m

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Eugen Leitl
On Thu, May 26, 2011 at 04:59:39AM -0700, cac...@quantum-sci.com wrote: > On Wednesday 25 May, 2011 13:53:03 Martin Fick wrote: > > I run mine in a linux vserver, it should run in lxc also, > > Problem is you need to patch the kernel, and it must share network setup with > the host. > > So no on

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread CACook
On Wednesday 25 May, 2011 13:53:03 Martin Fick wrote: > I run mine in a linux vserver, it should run in lxc also, Problem is you need to patch the kernel, and it must share network setup with the host. So no one else has given any thought to running a relay securely? ___

Re: [tor-talk] OneSwarm

2011-05-26 Thread Jan Reister
OneSwarm is ap2p application and protocol designed with anonimity, privacy, adoption (it is also a vanilla BT client) and user control in mind. The protocol paper (pdf) has a great amount of detail, it also explicitly compares OneSwarm performance to BT over Tor. I think the relevance for Tor and