[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tor-talk
Subject:    [tor-talk] Bridges that can't be discovered by their own clients
From:       distractedtokyo () elude ! in
Date:       2017-08-25 20:06:11
Message-ID: 7831a655ba46584f2e822f459290d42b.squirrel () webclient ! eludemaillhqfkh5 ! onion
[Download RAW message or body]

Hi,

Say you have a LAN and provide connectivity into Tor via a bridge. You
don't want users to identify where your bridge is, but you want to provide
them direct access into the Tor network. You disable fingerprint
publishing and they use a fixed LAN IP to provide connectivity out of.

Can they then take the fingerprint they see when talking to the bridge and
compare it to a relay that they own and find the bridge's public and
"real" IP?

If this doesn't work, is there any known way to provide connectivity where
the clients cannot figure out where the connectivity is coming from? Like
in the case of hidden hosting?

Preferably in a way where you torify all traffic but they can host their
own hidden services without a double-Tor penalty (hence the bridge idea).

Thank you!

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic