Re: Set up a webproxy to TOR - tor-proxy.net

2007-10-09 Thread phobos
On Sun, Sep 23, 2007 at 10:20:39PM -0400, [EMAIL PROTECTED] wrote 2.1K bytes in 
44 lines about:

Just a follow up to my own email now that you've obviously been working
on the site.

:   I have a few concerns about your proxy setup and service.  First off,
:   you should disclaim that this site and service isn't an official
:   project of Tor.  People may confuse your url with the real Tor and
:   think they are getting the same anonymity properties.

Thank you for adding the disclaimer sentence and FAQ page QA.

:   Second is a concern over the last bullet point at the bottom 
:   of http://tor-proxy.net/impressum.html.  It appears to say that you are 
:   recording IP address and browser in a log file.  Additionally, the log
:   file is purged when 48 hours old.  Why log at all?  Simply disable all 
:   logging in relation to the proxy service on the server.  The default
:   Tor log settings should be sufficient.

I notice you completely removed this section of the faq.  have you also
stopped logging?

:   Third, can you publish the source code that runs the proxy site?  It
:   appears you are using php and CGI:Proxy code to interface with Tor.
:   Feel free to choose a FSF-approved license, such as the GPL or
:   3-clause BSD, and publish the source for the site, along with any dependent
:   software and licenses as required by their license terms.

Any progress or thoughts on releasing the source?

:   Fourth, in order to be more transparent, you should publish the
:   configuration of the proxy.  A clear description, whether text or
:   graphical, will help increase the trustworthiness of the service.

Any progress or thoughts on detailing the configuration on the site?

:   Fifth, you probably want to publish the fingerprint of your
:   self-signed ssl cert, or look into getting a cert signed by a browser
:   accepted CA.  This is weak, but possibly better than nothing.

I see the FAQ explains why users may be prompted, great.

Also, I like the new look.

-- 
Andrew


Free SSL-Certificates from StartCom Ltd. (Was: Re: Set up a webproxy to TOR - tor-proxy.net)

2007-09-27 Thread BlueStar88
TOR-Admin (gpfTOR1) schrieb:

 or you may try the free SSL-service at
 
 http://cert.startcom.org/
 
 It is accepted by Mozilla browsers by default.

Not anymore, since you have to integrate a so called intermediate
certificates in the servers and clients to fix an CA update issue:

...On the 24th of December we updated our Intermediate CA certificates
and added a few needed extension to the original certificate. The public
key however did not change and all subscriber certificates are perfectly
valid. Please follow the instructions below to update your Intermediate
CA certificate... [1]

They ease of use is not given anymore, not for the server admins (a less
point), nor for the users/visitors (a very bad point).



Greets



[1] http://cert.startcom.org/?app=131

-- 


BlueStar88

PGPID: 0x36150C86
PGPFP: E9AE 667C 4A2E 3F46 9B69 9BB2 FC63 8933 3615 0C86



signature.asc
Description: OpenPGP digital signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread Ricky Fitz
Am Dienstag, den 25.09.2007, 10:08 +0200 schrieb Marco Bonetti:
 On Tue, September 25, 2007 09:54, Ricky Fitz wrote:
  To prevent any DNS-Leaks, I redirect all outgoing traffic to port 53 to
  the dns-proxy of Fabian Keil
 uhmmm another point of trust, why do you do so?
 you can run a torified dns resolver on your local box, see:
 http://p56soo2ibjkx23xo.onion/

Probably a misunderstanding. dns-proxy is a perl-script, which of course
runs only localy. And it is the one, which you can download on the site
you have written above ;-)

Regards,
Ricky.
-- 
Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen. 
- George Orwell, aus dem Nachwort zu Animal Farm, 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread Marco Bonetti
On Tue, September 25, 2007 10:50, Ricky Fitz wrote:
 Probably a misunderstanding. dns-proxy is a perl-script, which of course
 runs only localy.
To sort things out, when you wrote I redirect all outgoing traffic to
port 53 to the dns-proxy of Fabian Keil, what do you mean:
a) traffic on port 53 is redirected to port 53 on F. Keil machine
b) traffic on port 53 is redirected to your local dns proxy, the same
referred by F. Keil blog post.

if (a), you're adding another ring to the trust chain and it's bad, if
(b) it should be ok.

 And it is the one, which you can download on the site
 you have written above ;-)
sorry, I haven't check the link as it was written in a language I don't
understand :-P
(well, I've should at least click on it as some words here and there are
in english)

-- 
Marco Bonetti
Slackintosh Linux Project Developer: http://www.slackintosh.org
Linux-live for powerpc: http://www.slackintosh.org/pub/rsync/mb/linux-live
My webstuff: http://sidbox.homelinux.org

My GnuPG key id: 0x86A91047



Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread TOR-Admin (gpfTOR1)
BlueStar88 schrieb:
 or you may try the free SSL-service at

 http://cert.startcom.org/

 It is accepted by Mozilla browsers by default.
 
 Wow, was my first thought, a free certificate already integrated into
 current browsers, but where is the crux?
 
 What's about the StartCom-side private key generation issue?
 
   http://www.heise.de/english/newsticker/news/56808
 
 Tried yesterday, they're still doing it this way.
 Not the best approach, I think.

You may generate your own server request certificate on a Linux/Unix
system with OpenSSL. They will sign your request (ssl.csr), your privat
key (ssl.key) does not leave your computer.

  # openssl genrsa -des3 -out ssl.key 1024
  # openssl req -new -key ssl.key -out ssl.csr

Use the wizzard without CSR generation:

https://cert.startcom.org/?app=101

Is this way ok for you?


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread Ricky Fitz
Am Dienstag, den 25.09.2007, 11:21 +0200 schrieb Marco Bonetti:
 On Tue, September 25, 2007 10:50, Ricky Fitz wrote:
  Probably a misunderstanding. dns-proxy is a perl-script, which of course
  runs only localy.
 To sort things out, when you wrote I redirect all outgoing traffic to
 port 53 to the dns-proxy of Fabian Keil, what do you mean:
 a) traffic on port 53 is redirected to port 53 on F. Keil machine
 b) traffic on port 53 is redirected to your local dns proxy, the same
 referred by F. Keil blog post.
 
 if (a), you're adding another ring to the trust chain and it's bad, if
 (b) it should be ok.

it is b. With dns-proxy of Fabien Keil i meant: dns-proxy (the
program, running local) which is written by Fabian Keil. Sorry for the
confusion.

  And it is the one, which you can download on the site
  you have written above ;-)
 sorry, I haven't check the link as it was written in a language I don't
 understand :-P
 (well, I've should at least click on it as some words here and there are
 in english)

Sorry, I did not thought about that. ;-)

Ricky.



signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread Fabian Keil
Ricky Fitz [EMAIL PROTECTED] wrote:

 To prevent any DNS-Leaks, I redirect all outgoing traffic to port 53 to
 the dns-proxy of Fabian Keil
 ( 
 http://www.fabiankeil.de/blog-surrogat/2006/06/08/von-kopf-bis-fuss-auf-tor-eingestellt.html
  ) 

I didn't write dns-proxy-tor, I merely created the FreeBSD port.

dns-proxy-tor was written by Tup. And while I don't know who's
behind this pseudonym, I'm quite confident that it isn't me.

Fabian


signature.asc
Description: PGP signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-25 Thread Marco Gruss

Hi,

BlueStar88 wrote:
 What's about the StartCom-side private key generation issue?

http://www.heise.de/english/newsticker/news/56808

 Tried yesterday, they're still doing it this way.
 Not the best approach, I think.
Err... just create your own secret key and a certificate request
(for example using OpenSSL's CA.sh -newreq), choose SSL Server
Certificate (Without CSR generation) on StartCom's web site,
copy/paste your CSR, whee, you get a signed cert without ever
revealing your secret key to StartCom.

Am I missing something?

Marco



Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-24 Thread BlueStar88
[EMAIL PROTECTED] schrieb:
 On Mon, Sep 24, 2007 at 12:42:31AM +0200, [EMAIL PROTECTED] wrote 0.9K bytes 
 in 40 lines about:
 : I just wanted to let you know, that I have set up a Webproxy to the
 : TOR-Network, for letting people get the advantages of TOR who are not
 : able to install TOR for themselves.

[...]

   Fifth, you probably want to publish the fingerprint of your
   self-signed ssl cert, or look into getting a cert signed by a browser
   accepted CA.  This is weak, but possibly better than nothing.

Ricky, you should try

http://www.cacert.org/

They provide *free* certificates by email verification and an optional
trust concept. A root-certificate to include into the clients webbrowser
is available too, which can be offered to the users for download and
installation. On some linux distros this root certificate is already
included, or available as package at least.
As they're working on getting into the Mozilla Firefox by default, it
seems basically to be a good idea to try them...



Greets

-- 


BlueStar88

PGPID: 0x36150C86
PGPFP: E9AE 667C 4A2E 3F46 9B69 9BB2 FC63 8933 3615 0C86



signature.asc
Description: OpenPGP digital signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-24 Thread Ricky Fitz
Hi Andrew,

thanks first four your long answer!

   I have a few concerns about your proxy setup and service.  First off,
   you should disclaim that this site and service isn't an official
   project of Tor.  People may confuse your url with the real Tor and
   think they are getting the same anonymity properties.

Although the Layout is much different, you are right, there could be
some confusion. I will add a hint, that it is no official project of
TOR.

   Second is a concern over the last bullet point at the bottom 
   of http://tor-proxy.net/impressum.html.  It appears to say that you are 
   recording IP address and browser in a log file.  Additionally, the log
   file is purged when 48 hours old.  Why log at all?  Simply disable all 
   logging in relation to the proxy service on the server.  The default
   Tor log settings should be sufficient.

I suppose there is a misunderstanding. I am not logging anything about
the proxy-service (like output of tor, privoxy, etc.). Only logging is
made by a simple counter, included in the frontpage (index.php) for me
to get some informations about how much people are using the service.
There is no possibilty to use the data to find out, which sites users
were accessing through the proxy, and if they were using the proxy at
all. But I suppose it would be possible to change the counter that way,
that it does not collect IP-Adresses at all, or delete it immediatly
after counting the user.

   Third, can you publish the source code that runs the proxy site?  It
   appears you are using php and CGI:Proxy code to interface with Tor.
   Feel free to choose a FSF-approved license, such as the GPL or
   3-clause BSD, and publish the source for the site, along with any dependent
   software and licenses as required by their license terms.

The project works with CGIProxy of James Marshall
( http://jmarshall.com/tools/cgiproxy/ ). Did you mean that with the
source code, that runs the proxy? 
Of course I could mention some more technical details like
configuration-files etc.

   Fourth, in order to be more transparent, you should publish the
   configuration of the proxy.  A clear description, whether text or
   graphical, will help increase the trustworthiness of the service.

Yes, good idea. I will do so.

   Fifth, you probably want to publish the fingerprint of your
   self-signed ssl cert, or look into getting a cert signed by a browser
   accepted CA.  This is weak, but possibly better than nothing.

Thinking about using cacert.org as mentioned by Bluestar.

   Sixth and final, if you decide to put ads on the site or become a
   commercial entity, please contact The Tor Project before doing so.  We
   cannot allow a commercial entity to confuse users about Tor.  As an
   open source project, the disclaimer in the first paragraph may be
   enough to not confuse users. 

Well, first I will never take money for using that service. I also wrote
that in the FAQ. I think it isn't fair to all the other ones who are
running nodes, and which the service relies on. 
Second, at the moment there is no need for me to put ads on the site,
because server-costs are okay for me. If service would get very popular,
and server-costs are getting higher, than probably it will be neccessary
to do so, but thats totaly unclear. I would say, we can think about
that, when the moment comes.

Hopefully I answered some questions,
Regards,
Ricky.
-- 
Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen. 
- George Orwell, aus dem Nachwort zu Animal Farm, 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-24 Thread Robert Hogan
On Monday 24 September 2007 02:22:34 Ricky Fitz wrote:
 Am Sonntag, den 23.09.2007, 20:50 -0400 schrieb [EMAIL PROTECTED]:
  On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
   It is running on the same server my TOR-Server is running (called
   GrossATuin).
 
  Does your proxy use a separate Tor client, do you exclude your node as
  as an entry?

 No, it does not use a seperate Tor-Client. Therefore it doesn't make
 sense to exklude my node. It uses the Tor-Session which runs as a
 tor-node. So if you spy on the traffic of the server, you will not be
 able to see, which traffic is from routing traffic for acting as a
 server, and which from acting as a client. I think that's safer than
 using a second client.


So is your cgi-proxy routing everything to an instance of privoxy/polipo 
running on your machine or directly to the tor socks port? 

If it is routing everything to privoxy/polipo, what configuration are you 
using?

I think it is this sort of detail that phobos has in mind.


  I was wondering recently about the security implications of such a setup.
 
  I was thinking of using a vpn to access my Tor server. From there, all
  vpn traffic would be proxied through another tor instance running in
  client mode with no bw limitations. Would that be more secure because a
  tor server is already running there or less secure because, if in some
  way, the traffic from the two instances could be differenciated and the
  vpn connections would make the whole system less secure because they
  would allow timing and statistical attacks relating vpn traffic to the
  second tor traffic?

 I really don't know, if it will be possible to identify the
 vpn-connection because of the data which is transferred. But it would be
 possible, to see that there is another service running than tor. Also,
 what Bluestar is doubled. If we build a VPN from my server to yours, not
 only me is theoretical able to spy on the traffic, but also you. (Not
 that I want to say I do not trust you, but it kills the advantages of
 onion-system.


I think the answer is 'less secure'. That vpn link to bluestar88 is used only 
by you and it contains all your anonymous traffic on one little pipe over the 
internet. Unless the link is padded to camouflage inactivity that has to make 
things easier for an observer.


-- 

Browse Anonymously Anywhere - http://anonymityanywhere.com
TorK- KDE Anonymity Manager - http://tork.sf.net
KlamAV  - KDE Anti-Virus- http://www.klamav.net



Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Hi Folks,

I just wanted to let you know, that I have set up a Webproxy to the
TOR-Network, for letting people get the advantages of TOR who are not
able to install TOR for themselves.

For example, if they are using a computer, they do not have full access
to, or something else.

It is running on the same server my TOR-Server is running (called
GrossATuin).

You can reach it here:

http://www.tor-proxy.net or
https://www.tor-proxy.net

Let me know what you think about!

Greetings,
Ricky.


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread BlueStar88
Ricky Fitz schrieb:
 Hi Folks,
 
 I just wanted to let you know, that I have set up a Webproxy to the
 TOR-Network, for letting people get the advantages of TOR who are not
 able to install TOR for themselves.

[...]

 
 Let me know what you think about!
 
 Greetings,
 Ricky.

First: Another single-point-of-trust service. Principally a bad idea,
because *you* know all the sites the users are surfing to! Why should I
(as user) trust you?

Second: You are showing your proxy host name to the target web service.
This...

https://www.tor-proxy.net/cgi-bin/nph-proxy.cgi/00A/http/torcheck.xenobite.eu/

...leads to following result:

Your HTTP-VIA1.1 v31663.1blu.de:8080 (squid/2.6.STABLE1)

Like this you are uncovering the the first onion hop (yourself).

You should fix that, at least!



Greets

-- 


BlueStar88

PGPID: 0x36150C86
PGPFP: E9AE 667C 4A2E 3F46 9B69 9BB2 FC63 8933 3615 0C86



signature.asc
Description: OpenPGP digital signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Hi Bluestar,

 First: Another single-point-of-trust service. Principally a bad idea,
 because *you* know all the sites the users are surfing to! Why should I
 (as user) trust you?

Of course, that is true, and I mention it in the FAQ. But you can ask
every anonymizer on the web the same question. Of course it is better to
use TOR by yourself, but as I said, it is not made for people who can
run their own TOR-Session.

 Your HTTP-VIA  1.1 v31663.1blu.de:8080 (squid/2.6.STABLE1)
 
 Like this you are uncovering the the first onion hop (yourself).
 
 You should fix that, at least!

Thanks a lot for that hint, should be fixed now.

Best regards,
Ricky.
-- 
Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen. 
- George Orwell, aus dem Nachwort zu Animal Farm, 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread tor-op
On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
 It is running on the same server my TOR-Server is running (called
 GrossATuin).

Does your proxy use a separate Tor client, do you exclude your node as
as an entry?

I was wondering recently about the security implications of such a setup.

I was thinking of using a vpn to access my Tor server. From there, all vpn
traffic would be proxied through another tor instance running in client mode
with no bw limitations. Would that be more secure because a tor server
is already running there or less secure because, if in some way, the
traffic from the two instances could be differenciated and the vpn
connections would make the whole system less secure because they would
allow timing and statistical attacks relating vpn traffic to the second
tor traffic?

If this is insecure then you could expose your users by using a second
instance.

If it is secure then it is a necessary mesure, I think. Otherwise, you
could be offering access to a lesser secure version of Tor for your
users by circumventing the three nodes by-design circuits of Tor.


pgpXJTOMh7WD2.pgp
Description: PGP signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Am Sonntag, den 23.09.2007, 20:50 -0400 schrieb [EMAIL PROTECTED]:
 On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
  It is running on the same server my TOR-Server is running (called
  GrossATuin).
 
 Does your proxy use a separate Tor client, do you exclude your node as
 as an entry?

No, it does not use a seperate Tor-Client. Therefore it doesn't make
sense to exklude my node. It uses the Tor-Session which runs as a
tor-node. So if you spy on the traffic of the server, you will not be
able to see, which traffic is from routing traffic for acting as a
server, and which from acting as a client. I think that's safer than
using a second client.

 I was wondering recently about the security implications of such a setup.
 
 I was thinking of using a vpn to access my Tor server. From there, all vpn
 traffic would be proxied through another tor instance running in client mode
 with no bw limitations. Would that be more secure because a tor server
 is already running there or less secure because, if in some way, the
 traffic from the two instances could be differenciated and the vpn
 connections would make the whole system less secure because they would
 allow timing and statistical attacks relating vpn traffic to the second
 tor traffic?

I really don't know, if it will be possible to identify the
vpn-connection because of the data which is transferred. But it would be
possible, to see that there is another service running than tor. Also,
what Bluestar is doubled. If we build a VPN from my server to yours, not
only me is theoretical able to spy on the traffic, but also you. (Not
that I want to say I do not trust you, but it kills the advantages of
onion-system.

Regards.
Ricky.
-- 
Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen. 
- George Orwell, aus dem Nachwort zu Animal Farm, 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread phobos
On Mon, Sep 24, 2007 at 12:42:31AM +0200, [EMAIL PROTECTED] wrote 0.9K bytes in 
40 lines about:
: I just wanted to let you know, that I have set up a Webproxy to the
: TOR-Network, for letting people get the advantages of TOR who are not
: able to install TOR for themselves.

Hi,

  I have a few concerns about your proxy setup and service.  First off,
  you should disclaim that this site and service isn't an official
  project of Tor.  People may confuse your url with the real Tor and
  think they are getting the same anonymity properties.

  Second is a concern over the last bullet point at the bottom 
  of http://tor-proxy.net/impressum.html.  It appears to say that you are 
  recording IP address and browser in a log file.  Additionally, the log
  file is purged when 48 hours old.  Why log at all?  Simply disable all 
  logging in relation to the proxy service on the server.  The default
  Tor log settings should be sufficient.

  Third, can you publish the source code that runs the proxy site?  It
  appears you are using php and CGI:Proxy code to interface with Tor.
  Feel free to choose a FSF-approved license, such as the GPL or
  3-clause BSD, and publish the source for the site, along with any dependent
  software and licenses as required by their license terms.

  Fourth, in order to be more transparent, you should publish the
  configuration of the proxy.  A clear description, whether text or
  graphical, will help increase the trustworthiness of the service.

  Fifth, you probably want to publish the fingerprint of your
  self-signed ssl cert, or look into getting a cert signed by a browser
  accepted CA.  This is weak, but possibly better than nothing.

  Sixth and final, if you decide to put ads on the site or become a
  commercial entity, please contact The Tor Project before doing so.  We
  cannot allow a commercial entity to confuse users about Tor.  As an
  open source project, the disclaimer in the first paragraph may be
  enough to not confuse users.  

  Feel free to bring up any questions/concerns with my six requests.
  Thanks.

-- 
Andrew


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread tor-op
On Mon, Sep 24, 2007 at 03:22:34AM +0200, Ricky Fitz wrote:
 Am Sonntag, den 23.09.2007, 20:50 -0400 schrieb [EMAIL PROTECTED]:
  On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
   It is running on the same server my TOR-Server is running (called
   GrossATuin).
  
  Does your proxy use a separate Tor client, do you exclude your node as
  as an entry?
 
 No, it does not use a seperate Tor-Client. Therefore it doesn't make
 sense to exklude my node. It uses the Tor-Session which runs as a
 tor-node. So if you spy on the traffic of the server, you will not be
 able to see, which traffic is from routing traffic for acting as a
 server, and which from acting as a client. I think that's safer than
 using a second client.

I was also wondering how this affects your proxy users anonymity. Even
if you don't disclose your proxy in the headers, there still is a
superior risk due to the fact that an attacker knows that there is a more
than average proportion of your users that are using you as first node.
This proportion is derivable from your proxy trafic (as you mention
there is some risk in having a second, different service that access
tor). Adding a fourth node to your server circuits could plug this hole,
even make it more secure for some users, I guess, but it would also make it 
slower, probably for every users (I'm not sure it would affect trafic for
which you are not the entry node).

  I was wondering recently about the security implications of such a setup.
  
  I was thinking of using a vpn to access my Tor server. From there, all vpn
  traffic would be proxied through another tor instance running in client mode
  with no bw limitations. Would that be more secure because a tor server
  is already running there or less secure because, if in some way, the
  traffic from the two instances could be differenciated and the vpn
  connections would make the whole system less secure because they would
  allow timing and statistical attacks relating vpn traffic to the second
  tor traffic?
 
 I really don't know, if it will be possible to identify the
 vpn-connection because of the data which is transferred.
 But it would be possible, to see that there is another servicei
 running than tor. Also, what Bluestar is doubled. 

I already use the vpn for other things local to that network so it's not
obvious that the trafic coming in is going out through tor or staying
in.

At the network level both tor connections look the same (random local port -
tor server port). I was mostly asking if at Tor's level there would be some
abnormal behavior (like connecting twice to the same node) that could
tell an attacker that there is two tor instances generating those connections 
and, eventually allow him to tell their trafic apart.


 If we build a VPN from my server to yours, not
 only me is theoretical able to spy on the traffic, but also you. (Not
 that I want to say I do not trust you, but it kills the advantages of
 onion-system.

I was talking of a proxied vpn access to tor for tcp protocols. It's a
generalisation of your setup and so has the same implications
security-wise.

I'm not sure what a tunnel between servers could be used for (let alone
a vpn ;) Since you bring it up, I'm not sure but I think it could be considered
as an extension the family concept for tor servers...

Nice work on tor-proxy, anyway.

Regards


pgp1vlcJdOWlq.pgp
Description: PGP signature