[tor-talk] Tor transparent proxying over OpenVPN

mirimir mirimir at riseup.net
Mon Jun 17 00:58:28 UTC 2013


On 06/17/2013 12:26 AM, adrelanos wrote:

> ef2k at tormail.org:
>> I am worried about this. It's why I don't want to rely on obfuscated
>> bridges to hide my Tor usage, as they're not private and one day I could
>> get flagged as using Tor if the ISP/military/police is monitoring
>> connections to the bridge that I'm using at the time.
>> VPN seems to be the best solution. Services like Airvpn offer additional
>> services - VPN over SSH and VPN over SSL. VPN over SSL would hide that I'm
>> using a VPN, unless they are monitoring connections to Airvpn servers, but
>> even then they could only see that I'm using a VPN - *not* a big deal
>> compared to Tor.
> 
> Not sure about this, see:
> https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN#VPNSSHFingerprinting

SSH and VPNs are vulnerable to fingerprinting because latency is low,
and they don't pad traffic. But ef2k would be going through Tor after
the VPN, so fingerprinting seems less effective. Also, as I just
mentioned, ef2k could add cover traffic.


More information about the tor-talk mailing list