Re: all traffic through a VPN on top of tor, done!

2009-11-17 Thread Ted Smith
On Tue, 2009-11-17 at 13:48 +0100, Marco Bonetti wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Erilenz wrote:
> > One thing you absolutely don't want to do is use a Hidden Service for
> > your VPN as that doubles the number of hops in the circuit.
> but it raises the coolness of the whole project to an exponential level ;-)
> 

It only raises the coolness by a linear level. Coolness increases in
linear relation to number of nodes in the circuit. To get exponential
levels of coolness, you'd need to multiplex over different circuits
somehow.


signature.asc
Description: This is a digitally signed message part


Re: all traffic through a VPN on top of tor, done!

2009-11-17 Thread Paul Syverson
On Tue, Nov 17, 2009 at 06:43:58AM +, John Case wrote:
>
> On Fri, 13 Nov 2009, Paul Syverson wrote:
>
>>> But lets say one sets up X Tor nodes in X different locales and configure
>>> my Tor to use one of those X for my entry, and one of those X for my exit
>>> ... I'm still throttled by my middle hop, but the odds are much higher in
>>> my favor, and I may only need to rebuild my connection once or twice to get
>>> an acceptable speed.
>>
>> Ignoring what the underlying network can observe, the value to having
>> three hops is that the first and last ones don't know about each other
>> directly (so immediately know who to attack to completely deanonymize
>> a connection; they instead need to iterate such an attack). But if you
>> enter and leave the network via nodes you control, the only thing you
>> are getting from adding a "public" hop in the middle is a greater
>> chance of an adversary observing you. The problem with your design is
>> that if anyone discovers the nodes are under your control, then things
>> emerging from/entering them will be suspected of being associated with
>> you. (It was similar considerations that led us to recommend even in
>> the onion routing designs that predated Tor that the network not just
>> be run by/for the DoD.) Worse still, if you add just a middle hop that
>> is not yours, you make things worse, not better. Any time it is you
>> going to a destination observed by your adversary and via a middle hop
>> owned by the adversary, he will be right in guessing the connection is
>> more likely to be yours than are arbitrary connections through the
>> network. He will get this without needing to see your entry connection
>> into the network.
>
>
> Ok, that is perfectly sensible.  My immediate thought, however, is "if all 
> X of my nodes are in different locales (US, Canada, CH, DE, NZ, whatever) 
> wouldn't this correlation be awfully difficult, especially if service is 
> not directly under my name (company front, straw man purchase, fake signup 
> name, etc. ?)"
>
> It's just a thought - I realize your problem is the real-world assurances 
> that people need when they are really under survelliance, and not some rich 
> white guys IT hobby.
>

The more careful analysis still to be done will hopefully say
something more about how difficult such correlation is and whether
things like locale make a difference. (For a related but distinct
example, see my recent paper with Matt Edman "AS-awareness in Tor Path
Selection", available at www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf )

But two related immediate concerns: Irrespective of network analysis
and usage finding relations among/with these relays, this all depends
on your ability to keep hidden exogenous information about those nodes
being related. (I'm talking about the sorts of management things you
just mentioned.) How hard that is probably depends both on how careful
you are (and how you are careful) and who you are trying to hide from.
Relatedly, you may face issues of what makes a good torizen since you
will not have disclosed your ability (or the ability of those who can
coerce/corrupt you) to de-anonymize by yourself their circuits that
start and end with your relays.

-Paul
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-17 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Erilenz wrote:
> One thing you absolutely don't want to do is use a Hidden Service for
> your VPN as that doubles the number of hops in the circuit.
but it raises the coolness of the whole project to an exponential level ;-)

- --
Marco Bonetti
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/

My GnuPG key id: 0x0B60BC5F
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAksCm7AACgkQTYvJ9gtgvF9XfACfZaAM1pBNNZs8dGKrXg6ugENS
O7QAnRNahrEgUiSO302FpUR9KHeP0pbD
=G+Yp
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-17 Thread Erilenz
* on the Fri, Nov 13, 2009 at 04:28:20PM +, John Case wrote:

>> Second, it sounds like you want to protect against a local attacker from
>> seeing your traffic.  If so, go to proxy.org, find an https:// or
>> vpn-based provider and enjoy your encrypted protection against your
>> local ISP seeing your destination.
>>
>> If you actually want anonymity, then use Tor as is, for it's designed to
>> provide anonymity online by default.
>
> Yes, but back to my thread hijack :)
>
> Let's say my protection model does indeed require Tor, but at the same  
> time requires "more" speed.
> 
> Forcing Tor to only use fast nodes probably doesn't work, since those 
> fast nodes are probably inundated just like the slow ones are.  This also 
> suggests that organic growth in the Tor network is not going to solve 
> much of the speed problem in the near term...  existing users will 
> certainly use more and more traffic.

If you're only concerned with hiding where you're connecting to from
your neighbour, you can modify the source code fairly easily to make two
hop circuits instead of three hop circuits (*). You could then limit the
ExitNodes to be fairly local (your own country), and then after a little
trial and error, manually pick a group of EntryNodes which are also in
your own country, and which perform well for you. High bandwidth
University nodes for example. One thing you absolutely don't want to do
is use a Hidden Service for your VPN as that doubles the number of hops
in the circuit.

(*) I can't remember how though. Google it.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-16 Thread John Case


On Fri, 13 Nov 2009, Paul Syverson wrote:


But lets say one sets up X Tor nodes in X different locales and configure
my Tor to use one of those X for my entry, and one of those X for my exit
... I'm still throttled by my middle hop, but the odds are much higher in
my favor, and I may only need to rebuild my connection once or twice to get
an acceptable speed.


Ignoring what the underlying network can observe, the value to having
three hops is that the first and last ones don't know about each other
directly (so immediately know who to attack to completely deanonymize
a connection; they instead need to iterate such an attack). But if you
enter and leave the network via nodes you control, the only thing you
are getting from adding a "public" hop in the middle is a greater
chance of an adversary observing you. The problem with your design is
that if anyone discovers the nodes are under your control, then things
emerging from/entering them will be suspected of being associated with
you. (It was similar considerations that led us to recommend even in
the onion routing designs that predated Tor that the network not just
be run by/for the DoD.) Worse still, if you add just a middle hop that
is not yours, you make things worse, not better. Any time it is you
going to a destination observed by your adversary and via a middle hop
owned by the adversary, he will be right in guessing the connection is
more likely to be yours than are arbitrary connections through the
network. He will get this without needing to see your entry connection
into the network.



Ok, that is perfectly sensible.  My immediate thought, however, is "if all 
X of my nodes are in different locales (US, Canada, CH, DE, NZ, whatever) 
wouldn't this correlation be awfully difficult, especially if service is 
not directly under my name (company front, straw man purchase, fake signup 
name, etc. ?)"


It's just a thought - I realize your problem is the real-world assurances 
that people need when they are really under survelliance, and not some 
rich white guys IT hobby.




The question is, what values of X are required in order for correlation,
etc., to not be laughable ?

(the assumption here is that I put my X Tor nodes on the actual Tor
network, but reserve some percentage of their bandwidth exclusively for my
own use ... so they look and act like actual Tor nodes ...)


These are tricky questions, and we are doing ongoing research about it
now. An initial result we have is not quite to answer this question
but instead to look at how you should do routing to avoid compromised
entry and exit nodes if you trust some nodes more than others and
where the difference in trust and percentage of trusted and untrusted
nodes are input parameters. Published in the IEEE Computer Security
Foundations Symposium, cf.
www.cs.yale.edu/~amj37/publications/trusted_sets-csf09.pdf

I think I will have a better, but not complete answer, to questions
closer to yours within several months. But it will involve some
complicated analysis. For now, I suggest you follow Andrew's
advice---or just take your risk if speed matters more than security
for you. But know then that you are entering uncharted and especially
ill-understood waters and that any guesses you might have for X (or
even that this is the right question) are likely to be wrong, and you
really will have no idea what kind of protection you are getting.



Thanks very much for a very helpful reply - I appreciate it.  It will be 
interesting if you conclude that X is larger than (the current size of the 
public Tor network)  :)

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-15 Thread Andrea Ratto
Il giorno ven, 13/11/2009 alle 16.28 +, John Case ha scritto:
> On Fri, 13 Nov 2009, Andrew Lewman wrote:
> 
> > Second, it sounds like you want to protect against a local attacker from
> > seeing your traffic.  If so, go to proxy.org, find an https:// or
> > vpn-based provider and enjoy your encrypted protection against your
> > local ISP seeing your destination.

You have a point, that is something I could do probably, but so far all
ssl proxy I have seen, are actually websites with a form. I need to use
the proxy from the command line and pipe a ssh connection through it.

> > If you actually want anonymity, then use Tor as is, for it's designed to
> > provide anonymity online by default.

That is why am glad my script has tor support now. Anonymity is there.
It's just really slow. :-)
I added tortunnel support as well, which is probably slower than those
websites but serves the purpose.

I am pretty happy with the result. I'll be posting a link as soon as I
have it online, if someone needs it. It's just a nice script for a vpn
on top of ssh, even if you don't need tor.

> 
> Yes, but back to my thread hijack :)
> 
> Let's say my protection model does indeed require Tor, but at the same 
> time requires "more" speed.
> 
> Forcing Tor to only use fast nodes probably doesn't work, since those fast 
> nodes are probably inundated just like the slow ones are.  This also 
> suggests that organic growth in the Tor network is not going to solve much 
> of the speed problem in the near term...  existing users will certainly 
> use more and more traffic.
> 
> But lets say one sets up X Tor nodes in X different locales and configure 
> my Tor to use one of those X for my entry, and one of those X for my exit 
> ... I'm still throttled by my middle hop, but the odds are much higher in 
> my favor, and I may only need to rebuild my connection once or twice to 
> get an acceptable speed.
> 
> The question is, what values of X are required in order for correlation, 
> etc., to not be laughable ?
> 
> (the assumption here is that I put my X Tor nodes on the actual Tor 
> network, but reserve some percentage of their bandwidth exclusively for my 
> own use ... so they look and act like actual Tor nodes ...)
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-13 Thread Paul Syverson
On Fri, Nov 13, 2009 at 04:28:20PM +, John Case wrote:
>
> On Fri, 13 Nov 2009, Andrew Lewman wrote:
>
>> Second, it sounds like you want to protect against a local attacker from
>> seeing your traffic.  If so, go to proxy.org, find an https:// or
>> vpn-based provider and enjoy your encrypted protection against your
>> local ISP seeing your destination.
>>
>> If you actually want anonymity, then use Tor as is, for it's designed to
>> provide anonymity online by default.
>
>
> Yes, but back to my thread hijack :)
>
> Let's say my protection model does indeed require Tor, but at the same time 
> requires "more" speed.
>
> Forcing Tor to only use fast nodes probably doesn't work, since those fast 
> nodes are probably inundated just like the slow ones are.  This also 
> suggests that organic growth in the Tor network is not going to solve much 
> of the speed problem in the near term...  existing users will certainly use 
> more and more traffic.
>
> But lets say one sets up X Tor nodes in X different locales and configure 
> my Tor to use one of those X for my entry, and one of those X for my exit 
> ... I'm still throttled by my middle hop, but the odds are much higher in 
> my favor, and I may only need to rebuild my connection once or twice to get 
> an acceptable speed.

Ignoring what the underlying network can observe, the value to having
three hops is that the first and last ones don't know about each other
directly (so immediately know who to attack to completely deanonymize
a connection; they instead need to iterate such an attack). But if you
enter and leave the network via nodes you control, the only thing you
are getting from adding a "public" hop in the middle is a greater
chance of an adversary observing you. The problem with your design is
that if anyone discovers the nodes are under your control, then things
emerging from/entering them will be suspected of being associated with
you. (It was similar considerations that led us to recommend even in
the onion routing designs that predated Tor that the network not just
be run by/for the DoD.) Worse still, if you add just a middle hop that
is not yours, you make things worse, not better. Any time it is you
going to a destination observed by your adversary and via a middle hop
owned by the adversary, he will be right in guessing the connection is
more likely to be yours than are arbitrary connections through the
network. He will get this without needing to see your entry connection
into the network.

>
> The question is, what values of X are required in order for correlation, 
> etc., to not be laughable ?
>
> (the assumption here is that I put my X Tor nodes on the actual Tor 
> network, but reserve some percentage of their bandwidth exclusively for my 
> own use ... so they look and act like actual Tor nodes ...)

These are tricky questions, and we are doing ongoing research about it
now. An initial result we have is not quite to answer this question
but instead to look at how you should do routing to avoid compromised
entry and exit nodes if you trust some nodes more than others and
where the difference in trust and percentage of trusted and untrusted
nodes are input parameters. Published in the IEEE Computer Security
Foundations Symposium, cf.
www.cs.yale.edu/~amj37/publications/trusted_sets-csf09.pdf

I think I will have a better, but not complete answer, to questions
closer to yours within several months. But it will involve some
complicated analysis. For now, I suggest you follow Andrew's
advice---or just take your risk if speed matters more than security
for you. But know then that you are entering uncharted and especially
ill-understood waters and that any guesses you might have for X (or
even that this is the right question) are likely to be wrong, and you
really will have no idea what kind of protection you are getting.

HTH,
Paul
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-13 Thread John Case


On Fri, 13 Nov 2009, Andrew Lewman wrote:


Second, it sounds like you want to protect against a local attacker from
seeing your traffic.  If so, go to proxy.org, find an https:// or
vpn-based provider and enjoy your encrypted protection against your
local ISP seeing your destination.

If you actually want anonymity, then use Tor as is, for it's designed to
provide anonymity online by default.



Yes, but back to my thread hijack :)

Let's say my protection model does indeed require Tor, but at the same 
time requires "more" speed.


Forcing Tor to only use fast nodes probably doesn't work, since those fast 
nodes are probably inundated just like the slow ones are.  This also 
suggests that organic growth in the Tor network is not going to solve much 
of the speed problem in the near term...  existing users will certainly 
use more and more traffic.


But lets say one sets up X Tor nodes in X different locales and configure 
my Tor to use one of those X for my entry, and one of those X for my exit 
... I'm still throttled by my middle hop, but the odds are much higher in 
my favor, and I may only need to rebuild my connection once or twice to 
get an acceptable speed.


The question is, what values of X are required in order for correlation, 
etc., to not be laughable ?


(the assumption here is that I put my X Tor nodes on the actual Tor 
network, but reserve some percentage of their bandwidth exclusively for my 
own use ... so they look and act like actual Tor nodes ...)

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-13 Thread Andrew Lewman
On 11/13/2009 02:39 AM, Andrea Ratto wrote:
> I would just like to shorten the circuit, but it seems there is no
> option for doing that. I hope they change their mind and put one, maybe
> limited to 3 hops, so that it can't be used to over saturate the
> network.

First off, read this,
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#VariablePathLength

Second, it sounds like you want to protect against a local attacker from
seeing your traffic.  If so, go to proxy.org, find an https:// or
vpn-based provider and enjoy your encrypted protection against your
local ISP seeing your destination.

If you actually want anonymity, then use Tor as is, for it's designed to
provide anonymity online by default.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B


Website: https://torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-12 Thread Andrea Ratto
I don't really know. I think that you really don't want to be your own
"anonymizer", unless you control computer all over the world. It seems
you are just trying to shorten the circuit.

For this kind of use (VPN) you are connecting to a server you implicitly
trust, since you control it. You don't really need strong anonymity, one
single encrypted hop would be enough. 
Any malicious node has only one way of attacking you: be the man in the
middle and try to get your ssh key. But ssh comes with protections
against it and, with a simple precaution, even a malicious node it's ok,
if it routes your traffic.

I already picked up a "near" and fast entry node but it did not really
help.
I would just like to shorten the circuit, but it seems there is no
option for doing that. I hope they change their mind and put one, maybe
limited to 3 hops, so that it can't be used to over saturate the
network.

Il giorno ven, 13/11/2009 alle 01.17 +, John Case ha scritto:
> and use them as a pool to build at least two out of three hops 
> with ?  That way you're getting high speed, but you "trust" the
> overall 
> circuit because you know that at least 2/3 of your circuit is not 
> malevolant.
> 
> I asked this question a month or so ago and did not see any answers -
> if 
> one _did_ build a small (10 or so nodes) network of tor relays and
> used 
> them as 1/3 or 2 

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-12 Thread John Case


On Thu, 12 Nov 2009, Andrea Ratto wrote:


The only problem I am facing is the lack of speed. Can something be done
about it? I was thinking to reduce the circuit lenght, but it seems
there is no option for that. Any suggestion is welcome.



Can one use a node listing like this:

http://torstatus.kgprog.com/index.php?SR=Bandwidth&SO=Desc

and then alter ones config to only connect, and build circuits with, nodes 
with greater than X bandwidth ?


Looks like there is 50+ nodes with greater than 1 MBps bandwidth ...

I suppose it's reasonable to assume that malevolent/compromised/government 
nodes will be higher in the bandwidth chart ?  So perhaps the top 50 nodes 
represents far less "anonymity" than a randomly chosen 50 nodes ?  Hard to 
say.


Another option would be to build your own co-located network of 10 (or so 
?) nodes, and use them as a pool to build at least two out of three hops 
with ?  That way you're getting high speed, but you "trust" the overall 
circuit because you know that at least 2/3 of your circuit is not 
malevolant.


I asked this question a month or so ago and did not see any answers - if 
one _did_ build a small (10 or so nodes) network of tor relays and used 
them as 1/3 or 2/3 of all circuits built ... perhaps allowing 80% of their 
bandwidth to be used by Tor proper, and (secretly) saving 20% for 
themselves ... is that a medium, low, or laughable amount of "anonymity" ?


If it's laughable, what's a good number ? 20 ? 100 ?


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-12 Thread Andrea Ratto
Thanks for the help. I actually have a VPN running on top of tor now!

The script I use is shaping up nicely and I can share it here, if there
is interest. It also supports direct connections and http proxy instead
of tor. I use it for all my VPN needs.

The use case for tor under the vpn is when you are on a hostile LAN
(your neighbor wireless :-D )
The lan administrator can't see where you are connecting to or what you
are doing there, while the exit node just knows it's ssh.
I use it to create a VPN with my home server so that I can use the
internet as if I was at my house.

The only problem I am facing is the lack of speed. Can something be done
about it? I was thinking to reduce the circuit lenght, but it seems
there is no option for that. Any suggestion is welcome.

PS: I don't know yet if it will work for hours...

Il giorno sab, 07/11/2009 alle 15.08 +, jackwssp q ha scritto:
> 
> 
> 2009/10/30 Andrea Ratto 
> 
> Hello list!
> To run a VPN on top of tor one must be able to separate tor
> traffic from
> the rest and route tor connections to the physical network,
> and
> everything else to the vpn virtual inteface.
> 
> That is theoretically possible by doing something like this:
> 1- bootstrap tor and have it connect to some relays
> 2- get the ip addresses of those relays
> 3- instruct tor not to connect to anyone else
> 4- add routing for those addresses and start the VPN
> 
> I can do point 1 and 4, but I am not sure if point 2 and 3 are
> practically possible with tor. This is where I ask for help.
> 
> If I put it all together I will be happy to share my script
> for a VPN on
> top of SSH on top of tor, for an exotic blend of anonimity,
> confidentiality and authentication. For any clarifications,
> please ask.
> 
> Bye
> 
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org
> with
> unsubscribe or-talkin the body.
> http://archives.seul.org/or/talk/
> 
> Hello!
> 
> To make 2 and 3 points:
> 
> Choose relay_name here: http://trunk.torstatus.kgprog.com/index.php
> 
> And put to "torrc" config file:
> 
> StrictEntryNodes 1
> EntryNodes relay_name
> 
> RTFM: https://www.torproject.org/tor-manual.html
> -- 
> with best re


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/