to list, not me.

---------- Forwarded message ----------
From: Mirimir <miri...@riseup.net>
Date: Wed, May 14, 2014 at 11:58 PM
Subject: Re: [tor-talk] Fwd: [tor-relays] Ops request: Deploy OpenVPN
terminators

On 05/14/2014 09:07 PM, grarpamp wrote:
>> On Tue, May 13, 2014 at 5:48 PM, Jeroen Massar <jer...@massar.ch> wrote:

<SNIP>

>> <user - ovpn - torcli> -- <exit torrelay or_ip - localhost - ovpn_ip> -- 
>> world
>
>> That "ovpn" part on the left is easily detected by any party in the
>> middle doing
>
> No. Understand the diagram. It is not detectable by anyone
> between torcli and torrelay, because that is just normal
> tor.
>
>> Note that you are running IP over TCP over Tor (which is over TCP).
>
> Of course. Unless of course, as suggested before, some operators
> choose the method of binding/routing their exit over an ip different
> from their OR_IP, then it would just be native tor and native TCP.
>
>> The performance of that will be very bad. Tor network is already
>> overloaded enough as it is.
>
> No it won't, I've tested it, it works just fine. The only issue is the
> exit ip may change. So the exit operator is expected to block
> access to ovpn_ip from anything other than their associated or_ip,
> and the user is expected to config their client to use only the
> associated exit per whatever 'world' usage session they have in
> mind. It's not supposed to be point-click easy, only possible.

That's a very cool idea :) Using $5/mo VPS, there could be a large pool
of exit IPs for each Tor exit.

<SNIP>
----------
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to