anonym:
>> * Allows stronger enforcement of tor-only connections, an attacker must
>> > break out of a virtual machine, in addition to previous steps taken. A VM
>> > can be configured to only be able to send traffic through the tor process
>> > running on the host machine.
> Sure, but to configure the applications in the guest to use the host's
> Tor is non-trivial for most users (and would require us to make Tor's
> ports listen on more than localhost). I'd like a way so a whole VM is
> Torified without additional configuration inside the VM. Here's some an
> article one can find inspiration from:
> 
> <http://www.howtoforge.com/how-to-set-up-a-tor-middlebox-routing-all-virtualbox-virtual-machine-traffic-over-the-tor-network>
> 
> (Added to the todo item)
> 

What about identity corelation since all VM traffic would go through a
single Tor socks port?
(Added to the todo item)
_______________________________________________
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev

Reply via email to