Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TOR config #149

Open
cameronaaron opened this issue May 25, 2018 · 8 comments
Open

TOR config #149

cameronaaron opened this issue May 25, 2018 · 8 comments
Projects

Comments

@cameronaaron
Copy link
Contributor

There may be cases where people need to be anonymous using tor there should be a config in outline server that will allow a user to run traffic through a tor server

@fortuna
Copy link
Collaborator

fortuna commented May 25, 2018

Thanks for the suggestion. We need to investigate this further.

This could potentially happen in two different places:

  1. On the Outline Server: the server would redirect all outgoing traffic via the Tor network.
  2. On the client: a client could potentially connect to a Tor Guard via the connection to the Outline Server (proxy example). The advantage of this is that the client has control of what goes over Tor. But I'm not sure how to implement that on mobile or in a user-friendly way.

@cameronaaron
Copy link
Contributor Author

Thank you for the consideration! I will keep brainstorming a good way to implement option 2 but for now i'm pretty stumped on a good way to implement this. Option 1 does not seem like it would take as much trouble though

@MaXFalstein
Copy link

👋🏼 @fortuna!
I would love to be able to configure certain device sessions or key profiles to use Tor, not the whole server which would require a decent amount of modification of the TOR client.
It would be interesting to daisy chain Outline servers and then go into TOR.

@fortuna fortuna added this to Low priority in Testing Jun 12, 2018
@ghost
Copy link

ghost commented Jun 12, 2018

@ghost
Copy link

ghost commented Jun 12, 2018

You would also need to warn the users about the risks such as attacks by malicious exit nodes and Tor user discrimination by various websites.

@ghost
Copy link

ghost commented Jun 12, 2018

@fortuna 1 would expose the Outline server to plaintext Tor traffic, while we generally try to limit sensitive data that may be stored on the Outline servers.

@MaXFalstein
Copy link

@YegorIevlev Outline could have a dedicated TOR entry node which it would not need to expose the Outline server to plaintext to enter the TOR network.

@ghost
Copy link

ghost commented Jun 18, 2018

@MaXFalstein Even simpler, do Tor proxying completely on client side.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Testing
  
Low priority
Development

No branches or pull requests

3 participants