[tor-talk] Cloak Tor Router

Aymeric Vitte vitteaymeric at gmail.com
Fri Nov 7 16:29:23 UTC 2014


And 5 "do not send anything outside", no? Usually you can restrict with 
your ISP box but can you trust it?

What happens if you connect directly your PC to the Cloak with a cable?

Maybe the concept of several wifis is good but I don't see it very 
usable, not sure what would be the security requirements for this but 
assuming that I am trusting my local network why not a simple web 
interface where you can configure the same for any device connected to 
the box:

- do not allow anything outside
- allow all traffic outside Tor
- force everything through Tor (warning: close your bittorrent clients)
option: the Cloak could detect the bittorrent traffic
- force eveything through Tor except torrents
- force ssl through Tor, non ssl outside
...

Regards,


Le 05/11/2014 05:19, Lars Boegild Thomsen a écrit :
> On Sunday 02 November 2014 00:47:40 coderman wrote:
>> even a simple one time, "You are about to route your traffic over the
>> Tor network. Turn off your torrents and don't upgrade poorly written
>> applications".
>>
>> the zero guidance to unsuspecting is what i am most concerned about;
>> even basic captive portal warning would be a benefit.
> I will definitely look into this one.  This should be quite easy to implement by messing a bit with the firewall tables :)
>
> Only problem I see is that to make it useful I think it would have to time out at some point.  One example I have bought up a few times is my cheap and rather chatty media player.  I have not dug into the details exactly but I _know_ it "phones home" regularly and it is definitely a use case where the Tor browser bundle would be impossible.  Problem is that one is unattended so if I were to do a captive portal kind of page and that would require a positive acceptance, the Cloak would be useless for this scenario.
>
> Number of wireless networks are not an issue so I _am_ beginning to think that more than two is necessary.  For example:
>
> 1. Open - Open network - no Tor
> 2. Transparent proxy - all tcp traffic allowed - forced through Tor - everything on separate circuits  - captive warning
> 3. Transparent proxy as 2 minus captive portal (for gadgets or someone who know what they are doing)
> 4. Isolating proxy - only https allowed - forced through Tor - everything on separate circuits and everything else blocked
>
> It is not really a problem to make more than two so if this makes the Cloak more flexible I'd say it's the way to go.
>

-- 
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms



More information about the tor-talk mailing list