Security concerning Tor, BitTorrent and Firewall

a a werner12345 at hotmail.com
Mon Feb 19 22:00:50 UTC 2007


Um, as I said, I am not really interested in BitTorrent specifically 
(although using BT (or any other application) behind a firewall without 
having to port forward and creating security exposure is something to 
wish for, but apparently not possible without bad exploitation). About 
the P2P, what I gathered from the HOWTO-torify it was only the 
"tracking" which was torified, not the bits themselves?

But again, how could it be that this allow others to connect to me more 
effectively?

Anyways, due to my father being rather convinced that Tor/Privoxy has 
somehow infected the computer in question, I'll probably be moving it 
out of our LAN to the DMZ, and thus having a firewall which I can 
configure as I se fit. So BitT (and perhaps Tor, although I doubt it) 
will probably be running with standard Port forwarding anyway.

- Arand

Enigma wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>  
> I can't give you a technical answer to that but rest assured you would
> not like the result if all worked the way you want it to be. That's
> because using P2P with anonymous networks such as Tor will be much too
> slow, it will heavily decrease your P2P performance. I recommend using
> some anonymous network that is specifically designed for P2P, I2P is
> one of them. However, it might take years until most private
> connections have enough bandwidth to ensure fast and
> anonymous/encrypted P2P (and only if enough people dedicate their
> bandwidth to these networks). But as said, you would want to prefer a
> network that is intended for P2P usage.
> 
> Sincerely,
> Enigma
> 
> 
> a a schrieb:
>> Oh, excuses. I do not (at least not after the distinct replies)
>> intend to use this either to leech torrents or to leech Tor.
>> Anyways, after testing this for approximately three minutes, my ol'
>> pa went totally nutters on the realisation that this might
>> circumvent the firewall (and yes, he's usually nutters for a reason).
>>
>> A more accurate question on my behalf would therefore be: Can Tor
>> (if you use it without (or with, for that matter) port forwarding
>> the firewall, create "holes" in the firewall by allowing incoming
>> connections through the Tor proxy. The µTorrent case kinda implies
>> this (riiight...?) as the other peers seemed to be able to connect
>> to me at a higher rate...
>>
>> Or am I completely off the rails?
>> Or should this be put to rest because it is simply exploration of
>> exploitation ?
>>
>> Anyways, thanks for your replies so far, I am not particulary
>> experienced in this so I'm sorry for any treaded toes.
>>
>> Arrakis wrote:
>>> Arand,
>>>
>>> I doubt you will find anyone who wants to help you steal bandwidth
>>> from tor so you can abuse it by downloading torrents. You would be
>>> better to stick to a commercial service.
>>>
>>> Regards,
>>> Arrakis
>>>
>>>> USING:
>>>> Tor & Privoxy & Vidalia bundle 0.1.1.26
>>>> Windows XP Home
>>>> µTorrent
>>>> 3com firewall
>>>> HAPPENINGS:
>>>> I am using Tor behind a 3com firewall, in connection with µTorrent.
>>>> Before using Tor I -naturally, having not opened any ports on the
>>>> firewall- experienced low connection (up&down) rates in µTorrent.
>>>> However,
>>>> after installing the Tor bundle and configuring µTorrent for use
>>>> with the
>>>> Tor proxy server (as described at
>>>>
> http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#head-0d047b05e9b
>>>> 93c23cec9198550816a114012bde0), I suddenly experienced connection
>>>> speeds
>>>> which would equal those, had I used a normal port forward on my
>>>> firewall.
>>>> QUESTIONS:
>>>> Firstly, how does this work?
>>>> Secondly -on account of a port forward always being a security
>>>> risk- Is
>>>> this a similar security risk?
>>>> And lastly, if it is indeed a security risk (no matter how small),
>>>> does
>>>> this apply to other programs than BitTorrent clients, using the
>>>> Tor proxy
>>>> server?
>>>> __________
>>>> I first inquired with the Privoxy about this issue (presuming that
>>>> it was related to Privoxy) and I recieved the following response:
>>>>> --- Date: 2007-02-19 13:17 Sender: fabiankeil
>>>>> </users/fabiankeil/> --- Are you sure that your provider doesn't
>>>>> throttle BitTorrent traffic? By using Tor you prevent your ISP
>>>>> from knowing which services (other than Tor itself) you're using
>>>>> and this could explain why using Tor speeds up your BitTorrent
>>>>> traffic (it's no longer rate limited by your ISP). Privoxy itself
>>>>> is unlikely to have anything to do with it and I don't think port
>>>>> forwarding has anything to do with it either, but I'm not
>>>>> familiar with BitTorrent. The short answer to your last questions
>>>>> is "No", but as it has nothing to do with Privoxy you should
>>>>> checkout the Tor documentation for details and ask again on the
>>>>> or-talk mailing list if you have further questions.
>>>> I am fairly certain that my ISP is not the issue here, so I remain
>>>> puzzled... And I've so far not found any answers in the Tor
>>>> documentation.
>>>> Anybody got something on this?
>>>> - Arand
>>
> 
> 
> - --
> German Tor mailing list / surveillance and anonymity:
> http://www.anti1984.com
> 
> New GPG key ID: 4096R/87FF3BA2, old key is revoked.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>  
> iQIVAwUBRdoVKnds87OH/zuiAQJXvQ/+JvxDwec6bWFd3+0Wro/RwY85ndxS1pKk
> OkfOpLlj7TxoTizaI43jsl7K6YyYNYelDVSp/Sbcf0n1NRZ8Ag7akWtPRnstVizh
> TdkAorCxjoFn+a7B6l2Rxlxgn/0Z9oPHLmD2wOb4v+tieinwOR/ftK+FXCGJpz23
> joIOLyqNUt6YmhQbFPCLGtkNO4eut9u5C8JJAodz4RGTBc15x4gBROa6EN/3oB28
> aJq4cUZkxppH2nlJ2w0N4Ti0wbygd0eJKQe9KY4eHkBlRRRcA+PurwoK/AVSwoui
> bJFvkDzy3BAFafqs5J9kq4Mz6Wwjyp0A77mWfa8ni3T53bEEp1F/ePXTmsvVqcHM
> GEx1TK+Iguy42YVu7Q4tsT8jRsYFYymJNpKjxFdgmvzDNerhr364loFuAfDYULB4
> SARt8qR0i52imyyKvEgSkqVSPj8VEuIwJoMQUiYB239DwWtJfFu/mMNL5uuoZoOL
> Jd55/HcW1cFeQ/kf05CYir7JPKagEji5ek5Lld4fA+h2y8U+d0ObMbq2N0FaRNwO
> 1rF3f+nDxvcgqTF/y5K6ZIsTEc6HhBe3P1+cWLWrPNKJVMh9vcG8bpkOirbtJWW8
> yJoEuEqcI6zq12Cg5+VUnuWl4yNxj8so41XxbC+dNnUlhtS7cV4/ZjJF6qctMK9O
> jHSIIi+Ivgs=
> =1kM1
> -----END PGP SIGNATURE-----
> 
> 
> 
> 




More information about the tor-talk mailing list