Date: Thu, 14 Apr 2016 22:24:30 +0000
From: Yawning Angel <[email protected]>
To: [email protected]
Subject: Re: [tor-relays] Using your own Relay as Entry Node
Message-ID: <[email protected]>
Content-Type: text/plain; charset="us-ascii"
On Thu, 14 Apr 2016 21:38:15 +0000
fr33d0m4all <[email protected]> wrote:
And about using it as a SOCKS proxy to enter the Tor network? Do the
same considerations apply or is it even worse to use a relay as a
SOCKS proxy?
This is horrible and should *NEVER* be done, assuming any network not
physically controlled by you is between you and the SOCKS proxy
server[0], simply based on the request (and authentication if you
chose to use such things) being in the clear.
Regards,
--
Yawning Angel
[0]: So, SOCKS over an internal network to a VM/magical anonymity box
may be ok (depending on your threat model). SOCKS to a VPS somewhere
is essentially always a bad idea.
Hi Yawning,
I perfectly understand your point... I'm using it as a SOCSK proxy only
within my own LAN, which is only used by me. If I ever need to reach it
from the outside I would do it by tunnelink the SOCKS connection within
an SSH connection to my LAN. But I'm far more interested in what you
think about using your own Tor relay as Entry Node, which I think should
decrease the risks because it is for sure a not-bad Entry Node.
What do you think about this point?
Thank you for the answers.
Fr33d0m4All
--
_____________________________________________________________
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4
IRC Nick: fr33d0m4all (OFTC & Freenode)
_____________________________________________________________
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays