research / document impact for tunnel users if Tor [exit] relays hosted at the same tunnel provider

Information

ID: 492
PHID: PHID-TASK-xmjltpeunms4unshpzle
Author: Patrick
Status at Migration Time: resolved
Priority at Migration Time: Normal

Description

It is possible to host Tor relays [any… bridges, entry, middle or exit] behind VPN IPs using VPN port forwarding.


scenario 1)

  • a) User uses VPN IP A on the host, thereby using it as it’s first relay.
  • b) User’s Tor client happens to pick a Tor exit relay running on VPN IP A.
  • Conditions a and b match at the same time. The user is now using the same IP as first and last proxy.

scenario 2)

  • a) User sets up a VPN inside Whonix-Workstation. Thereby that results in user → Tor → VPN → internet. Using VPN IP A.
  • b) A Tor entry guard is being hosted on VPN IP A.
  • Conditions a and b match at the same time. The user is now using the same IP as first and last proxy.

It might result in Tor over Tor. Needs to be through through.


document where:


TODO:

  • think this through
    1. a) Is Tor clever enough to detect and avoid such situations?
  • ask on the tor-talk mailing list

Comments


HulaHoop

2016-04-07 10:51:14 UTC


Patrick

2016-04-07 13:45:58 UTC


HulaHoop

2016-04-07 18:12:14 UTC


Patrick

2016-04-07 18:55:03 UTC


Patrick

2016-07-07 23:04:00 UTC


Patrick

2016-07-08 11:24:02 UTC


Patrick

2016-07-08 11:49:57 UTC


Patrick

2016-07-15 16:14:06 UTC


HulaHoop

2016-07-16 03:22:06 UTC