Re: [tor-talk] Tor VPN Server selfmade

2012-01-13 Thread Fabian Keil
Gijs gpesken...@gmail.com wrote: Why not run something like redsocks (first hit on transparent socks) http://darkk.net.ru/redsocks/ on VM1 ? It is a program that sits in between the proxy and client. You then configure the firewall running on VM1 to redirect traffic only through redsocks and

Re: [tor-talk] Tor VPN Server selfmade

2012-01-11 Thread Kyle Williams
1) You didn't e-mail me or coderman directly and 2) I don't always stay on top of the Tor mailing list so 3) Here's your open source solution the Tor project paid us for. http://janusvm.com/tor_vm/ For whatever reason, ask Roger or someone else, Tor VM isn't hosted on the torproject.org site

Re: [tor-talk] Tor VPN Server selfmade

2012-01-10 Thread grarpamp
https://trac.torproject.org/projects/tor/wiki/doc/TorVPN The VM isn't rewriting your resolv.conf. It's either dhcpd or some other network configuration wizard on the host. Find it and use it's capabilities, or shut it down and do manual. Try to use simpler network addressing instead of random

Re: [tor-talk] Tor VPN Server selfmade

2012-01-10 Thread songso
Thank you for checking! https://trac.torproject.org/projects/tor/wiki/doc/TorVPN The VM isn't rewriting your resolv.conf. It's either dhcpd or some other network configuration wizard on the host. Find it and use it's capabilities, or shut it down and do manual. You were right. The minimal

Re: [tor-talk] Tor VPN Server selfmade

2012-01-09 Thread grarpamp
The goal is to create a bulletproof environment where nothing can leak thought configuration mistakes, dns, java, flash, plugins and even side channel attacks, local infections, trojans... Additionally it's also nice to know that all applications can be torified even if they do not support

Re: [tor-talk] Tor VPN Server selfmade

2012-01-09 Thread hmoh
The goal is to create a bulletproof environment where nothing can leak thought configuration mistakes, dns, java, flash, plugins and even side channel attacks, local infections, trojans... Additionally it's also nice to know that all applications can be torified even if they do not