Originally published at: News - Whonix Forum
Using a VPN, proxy or SSH can can negatively affect anonymity under some circumstances. [1] [2] To explain why that is, some background information is required so you can draw conclusions and take actions to avoid this risk. See below. |
- Tor avoids using more than one relay belonging to the same operator in the circuits it is building. Legitimate Tor relay operators adhere to Tor's relay operator practices of announcing which relays belong to them by declaring this in the Tor relay family setting. Tor also avoids using Tor relays that are within the same network by not using relays within the same /16 subnet. [3] Tor however does not take into account your real external IP nor destination IP addresses. [4] In essence, you must avoid using the same network/operator as your first and last Tor relays since this would open up end-to-end correlation attacks.
- Many tunnel providers use shared IP addresses which means that many users share the same external IP address. On one hand this is good since that is similar to Tor, where many users share the same Tor exit relays. On the other hand, this can in some situations lead to actually making you less safe.
- It is possible to host Tor relays [any... bridges, entry, middle or exit] behind VPNs or tunnel-links. For example, there are VPN providers that support VPN port forwarding. This is an interesting way to contribute to Tor while not exposing oneself to too much legal risk. Therefore, there can be situation, where a VPN or other tunnel-link and a Tor relays could be hosted by the same operator, in the same network or even on the same IP.
- In an economy with a deep labor division, ones are providing the service to host servers (VPS etc.). Others provide VPN and other tunnel-link services and rent such servers. It is common, that diverse customers run share the same IP address. This is another situation where a VPN or other tunnel-link and a Tor relays could be hosted by the same operator, in the same network or even on the same IP.
- By adding arbitrary tunnel-links to your connection chain, you could unknowingly use the same operator/network twice in your connection chain.
- scenario 1)
- a) User uses VPN IP A on the host, thereby using it as it's first relay.
- b) User's Tor client happens to pick a Tor exit relay running on VPN IP A.
- Conditions a and b match at the same time. The user is now using the same IP as first and last proxy.
- --> By using the VPN the user did not get more, but less secure.
- a) User uses VPN IP A on the host, thereby using it as it's first relay.
- different scenario 2)
- a) User sets up a VPN inside Whonix-Workstation. Thereby that results in user -> Tor -> VPN -> internet. Using VPN IP A.
- b) A Tor entry guard is being hosted on VPN IP A.
- Conditions a and b match at the same time. The user is now using the same IP as first and last proxy.
- --> By using the VPN the user did not get more, but less secure.
- scenario 1)
- Choose your tunnel providers wisely.
- Find out in which physical and legal jurisdiction and network their servers are located.
- Perhaps avoid using VPN or SSH providers that support port forwarding.
- Perhaps use only tunnel-link providers that are assigning private - as in not shared with others - unique - IP addresses, however it is not clear if this does more harm than gain as noted above.
- Perhaps use tunnel-link providers that run their own servers rather than relying on shared infrastructure.
- Perhaps manually pick your Tor relay[s]. Specifically your entry guard[s] or bridge[s]).
- Tor documentation generally discourages tampering with Tor's routing algorithm by manually choosing your relays, but since you are trying to be more clever by extending your Tor chain despite all information about the difficulty of this endeavor, perhaps it would make sense to pick your entry guard manually.
- Using Bridges might be an alternative, but note the following quote. "Bridges are less reliable and tend to have lower performance than other entry points. If you live in a uncensored area, they are not necessarily more secure than entry guards. Source: bridge vs non-bridge users anonymity."