1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Tor (Onion network) - shibby

Discussion in 'Tomato Firmware' started by ulyan, Jul 21, 2012.

  1. ulyan

    ulyan Networkin' Nut Member

    Hi everyone,

    I saw that in the latest build of shibby, it added a new feature, the tor client. It seens interesting but I don't know if I should try it or not. I wanted to ask your opinion on this Tor project regarding the advantages vs the risks. I read alot of paranoid posts on the internet about the risks one might be exposed to but I don't really know what to believe.

    If we take an IM chat messenger for example that sends unencrypted traffic over the internet, if I make it go trough Tor, don't I multiply the risk level to be sniffed on the exit node compared to not using Tor but still send unencrypted traffic ?! I don't know If It makes sense what I just asked ... :cool:

  2. maurer

    maurer LI Guru Member

    tor it's not about security of data , it's all about being able to access restricted sites like thepiratebay in the UK and anonimity - no IP tracking
    i think it should only be used to access public content/services restricted by your ISP/country
  3. ulyan

    ulyan Networkin' Nut Member

    Yes but you can't selectively enable tor for some sites/content and some not. It will make you continuosly enable/disable the client. So once enabled it will remain that way. That is why I am asking about the risks on the exit node.
  4. shibby20

    shibby20 Network Guru Member

    no but you can run tor for only one client ip. If you want use tor, just set manually ip.

    I have RT-N66U and 5GHz radio. Tor is enabled for all hosts in 2.4GHz radio. If i want use TOR i simple reconnect my wireless connection to 2,4GHz :)

    I know my client redirect solution is not the best (gargoyle has better) but at the moment i dont know how to make this better.

    I also recomment to use TOR only if really need this. TOR will slow down you internet connection. ie i have 24Mbps d/l and when i use TOR i have 1-2Mbps d/l
  5. Nello

    Nello Reformed Router Member

    I'm interested in having my Asus RT-N16 become a TOR Relay. Unfortunately, I know next to nothing about TOR.

    I'm currently running: Tomato Firmware 1.28.0000 MIPSR2-102 K26 USB AIO

    Can anyone give me a clue how to do this?

    Thank you for your time and attention.
  6. koitsu

    koitsu Network Guru Member

    I'm only going to post here once: I recommend you reconsider your stance, specifically because quote you "know next to nothing about TOR".

    Consider what happened in 2006 when someone running Tor exit nodes had his house raided involving child porn. Key point: nobody knows for sure if the concern was over child porn going through the Tor exit nodes or not, the police just knew child porn was involved with that particular abode. But it doesn't matter which was true. Why not?

    Because any packets going out of your network you are responsible for. If you operate a Tor node, someone looking at child porn through you as an exit node means effectively your WAN IP is going to be in some log somewhere, and you intentionally chose to operate a Tor exit node; it's not like someone hacked into your router/network and made you into a Tor exit node...

    Tor advocates respond to this by saying things like "[if you run an exit node] do not keep logs, this makes you immune to this problem". No it doesn't -- local or federal police are still going to bust down your door at 3am and take all of your equipment + you will be in court for a very, very long time with the only defence of "I have no logs to give you, therefore I am innocent". It doesn't hold up in court; the logs the prosecution will provide will show that your WAN IP made an HTTP GET request for some questionable content. The court doesn't know if it was you personally or someone using your connection -- but it doesn't matter, because you've admitted to running a public Tor exit node, therefore admitted to taking responsibility for the packets coming out of your network.

    TL;DR -- Don't run a Tor exit node and minimise the risk of someone on the Internet using Tor for illegitimate purposes getting you thrown in jail. Do not let other people use your Internet connection unless you know + trust them, and even so, the packets going out of your connection are still your responsibility.
    JoeDirte, Toastman and Marcel Tunks like this.
  7. Orwell

    Orwell Serious Server Member

    There are inherent risks running an EXIT node as this is the last node in a chain where traffic exits the tor network. Exit node traffic is public facing

    Non-exit RELAY nodes are the 2nd node in a typical three node chain that forwards encrypted traffic between entry and exit nodes. Relay nodes only forward traffic to the next node in a chain; as such there is minimal risk.

    To re-iterate, Tor can be configured to act as a relay and not as an exit node.


Share This Page