Hi, David Wolinsky wrote (19 Dec 2013 03:14:39 GMT) : > I want to start working on integrating the of Pseudonymity as > defined by WiNoN into Tails.
I'm very happy to see someone work on this. > To do this I propose the following: > - In the host, we run redsocks (http://darkk.net.ru/redsocks/), this will > pick up traffic from the VMs and redirect it to Tor. I have a few questions here: - Is Tor running on the host system, or inside a dedicated VM? The latter would have the benefit of making it hard for a compromised Tor client to gather information about the local networking setup, hardware identifiers, etc. I guess going with the former is easier to implement as a first iteration, and I'd like to see a working first iteration ASAP, so I guess it totally makes sense to postpone this for now. - How does this play with our stream isolation design [1]? In other words, what kind of SocksPort(s), with what stream isolation options, would the TCP traffic be redirected to? I could probably take "once we segregate each pseudonym into its own VM, we don't care anymore" for an answer, but I've not thought this through yet. [1] https://tails.boum.org/contribute/design/stream_isolation/ > Currently there exists no package for redsocks in Squeeze, should > we check to see if the Wheezy package works or just build our own > Redsocks package? Replied in the dedicated thread you started about it. > - Install the necessary software for both LXC and KVM I understand you decided to go with KVM only for now, and I think it totally makes sense. The state of the LXC userspace doesn't look very good yet, and it's still unclear to me how strong it is nowadays against a root compromise of the guest (enterprisey distros who currently ship solutions based on LXC only dare doing so with additional safeguards such as SELinux and AppArmor). > - Give amnesia the right sudo abilities to start LXC and KVM I bet this will have to be a bit finer grained than this, but I see what you mean :) > - Add start LXC Pseudonym and KVM Pseudonym to the desktop What system would be started by these launchers? Another full-blown Tails, or something else? If Tails, what difficulties do you expect to face, in other words, how should the Pseudonym-Tails differ from a "standard" one? I guess we could brainstorm it a bit to start with. E.g. do we want the user to be shown Tails Greeter? Or do we want to forward (some of) the user's choices into the Pseudonym-Tails, such as language and keyboard layout settings? We can also probably postpone this to when something simple and working is ready to be tested, your call :) > - Upon starting a Pseudonym, we'll add a Tap device and connect it to a > bridge, where redsocks will pick up the traffic. For each pseudonym, we'll > run a unique redsocks instance and start a new Tor proxy socket. > - We can either a pseudonym watcher to clean up state or just run the > pseudonym in a script, blocking on the VM execution. When the VM has been > closed, it is automatically cleaned up. > - Use IP Tables to enforce communication between the pseudonyms and Tor > In this instance, each pseudonym will have a unique IP address, but it will > only be able to talk to Tor running via the bridge and not other pseudonyms. OK. > Call this round 1, and we'll add more details as we discuss. Looks good for round 1 :) Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc _______________________________________________ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev