[tor-relays] Oubound Ports

Greg Moss gmoss82 at gmail.com
Fri Jul 11 05:08:29 UTC 2014


OMG dude - take a downer........


If you are in a time sensitive situation, and (picking a random offtopic
thought here :) wanting to do some leaks, the best thing might be to find
someone you trust (who is reasonably technically literate), and pass the
material to them, ask them to post it to various drop boxes and provide it
(anonymously and/ or without any phone calls etc made) to their own trusted
friends etc, to get the info out there.

Do this with a few different people, if you have trustworthy friends/
contacts


Its shit like that that fucks up the whole program for everybody else.  If
that's what TOR NETWORK is all about then I think I will just sit back and
watch!









-----Original Message-----
From: tor-relays [mailto:tor-relays-bounces at lists.torproject.org] On Behalf
Of Zenaan Harkness
Sent: Thursday, July 10, 2014 8:47 PM
To: tor-relays at lists.torproject.org
Subject: Re: [tor-relays] Oubound Ports

On 7/11/14, Greg Moss <gmoss82 at gmail.com> wrote:
> Thanks for the help. I have my ORport and DIRport defined in torrc and 
> forwarded through the firewall up to the Tor Relay. I was just 
> wondering in regards to outbound traffic from the server itself.

What type of tor server did you decide to run (relay, exit, bridge)?

I feel you are rushing things a little.

Do some more reading.

Personally I suggest an exit relay, but without informing yourself first,
how can you make an informed choice? An exit may be worse, or better, given
your needs/ intentions of what you want to achieve here.


> In the event it gets compromised I really hate to open all ports 
> outbound let alone possible DNS leaks and what not. Appoligize if this 
> doesn't make since I just fired this thing up yesterday and want to 
> make sure it is secure.

You want "secure". OK, so does everyone. So what's your threat model?

If you are worried about a compromised tor server, and consequent
information leaks, perhaps set up whonix?

If you are just impatient, just run TBB.

If security is genuinely important, and you rush things, you are MUCH more
likely to come unstuck.

If you are in a time sensitive situation, and (picking a random offtopic
thought here :) wanting to do some leaks, the best thing might be to find
someone you trust (who is reasonably technically literate), and pass the
material to them, ask them to post it to various drop boxes and provide it
(anonymously and/ or without any phone calls etc made) to their own trusted
friends etc, to get the info out there.

Do this with a few different people, if you have trustworthy friends/
contacts.

Your situation sounds like you are impatient.

Go do some reading, and good luck,
Zenaan



> -----Original Message-----
> From: tor-relays [mailto:tor-relays-bounces at lists.torproject.org] On 
> Behalf Of Zenaan Harkness
> Sent: Thursday, July 10, 2014 6:47 PM
> To: tor-relays at lists.torproject.org
> Subject: Re: [tor-relays] Oubound Ports
>
> On 7/11/14, Greg Moss <gmoss82 at gmail.com> wrote:
>> Newbie to Tor but have a Debian server up and running as a relay.  Do 
>> I need to filter outbound traffic from the tor server on my firewall.
>> If yes what ports would I need to open.  I am also have a good look a 
>> Tails any suggestions would be helpful.
>
> Sounds like you need your config file to read. Try:
> /etc/tor/torrc
>
> That will likely answer your question (hint, the answer is at least 
> one, inbound and outbound).
>
> Do read the material on torproject.org - there's lots of it, and much 
> of it useful to you if you are running a relay, some of it directly so.
>
> You might also check out whonix.org
>
> Enjoy teh awesome tehclonogy :)
_______________________________________________
tor-relays mailing list
tor-relays at lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



More information about the tor-relays mailing list