TOR implementation in DD-WRT? [Feature request]

Post new topic   Reply to topic    DD-WRT Forum Index -> General Questions
Goto page 1, 2, 3  Next

You want an TOR implementation?
Yes, i need it!
79%
 79%  [ 106 ]
Nice to have, but why?
9%
 9%  [ 13 ]
No thanks.
10%
 10%  [ 14 ]
Total Votes : 133

Author Message
Spontex
DD-WRT User


Joined: 01 Nov 2006
Posts: 60
Location: North Germany

PostPosted: Wed Nov 01, 2006 9:53    Post subject: TOR implementation in DD-WRT? [Feature request] Reply with quote
Hy folks,

sometimes its better to browse a littel bite anonym through the net. And TOR is a very good Proxy service that provides you this anonymity. So it would be great if the TOR client should be integrated to DD-WRT.

Quote:
Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol.


See: http://tor.eff.org/index.html.en
And: http://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

And now the poll to see how many people are interessted in a TOR integration. That can be done by Brainsalyer directly oder someone of the superusers can create a package inluding a webinterface compatible to DD-WRT

Regards,
Spontex

_________________
WHR-HP-G300N


Last edited by Spontex on Wed Nov 01, 2006 12:08; edited 2 times in total
Sponsor
cms22
DD-WRT User


Joined: 25 Aug 2006
Posts: 76

PostPosted: Wed Nov 01, 2006 9:56    Post subject: Reply with quote
i dont know TOR - but how anonymous can it be?

wont the trace always end up with your router?
Spontex
DD-WRT User


Joined: 01 Nov 2006
Posts: 60
Location: North Germany

PostPosted: Wed Nov 01, 2006 10:03    Post subject: Reply with quote
cms22 wrote:
i dont know TOR - but how anonymous can it be?

Very anonymous ;)

cms22 wrote:

wont the trace always end up with your router?


No, the trace ends up with the exit node of the TOR network.

For detailed information see: http://tor.eff.org/overview.html.en


_________________
WHR-HP-G300N


Last edited by Spontex on Wed Nov 01, 2006 12:10; edited 1 time in total
interruptor
DD-WRT Novice


Joined: 01 Nov 2006
Posts: 2

PostPosted: Wed Nov 01, 2006 10:03    Post subject: Reply with quote
Great idea Spontex!

It would be nice if TOR is integrated in the DD-WRT.

It's not as fast as you're using a direct connection, cause your traffic bounces around the world Cool but it's a good way to anonymity!
cms22
DD-WRT User


Joined: 25 Aug 2006
Posts: 76

PostPosted: Wed Nov 01, 2006 10:20    Post subject: Reply with quote
Spontex wrote:
cms22 wrote:
i dont know TOR - but how anonymous can it be?

Very anonymous ;)

No, the trace ends up with the exit node of the TOR network.


never mind the bouncing - doesnt this introduce bottlenecks at the "tor" nodes??
Blackraven
DD-WRT User


Joined: 10 Jul 2006
Posts: 402
Location: NL

PostPosted: Wed Nov 01, 2006 10:23    Post subject: Reply with quote
I have TOR installed on my desktop, and I can see the advantages of anonymous browsing, but I don't want it on all the time, because of the decrease in speed. And going into my router every time to switch it on and off, no thanks. Now I can just click on my tor-button in FF whenever I feel I need it Wink or don't
olmari
DD-WRT Guru


Joined: 24 Oct 2006
Posts: 1447
Location: Finland

PostPosted: Wed Nov 01, 2006 10:40    Post subject: Reply with quote
Now I'll throw you the most extreme case in theory:

Someone downloads child porn or other very illegal stuff trough TOR. As TOR implies, only exit node of TOR is seen to the 'internet', thus it makes that exit node to seem downloading that sick stuff from inet and then government or so wants to hang that person owning that particular exit-node.

While TOR does provide anonymity for the person requesting an data trough the network, there are allways one "end-node" that will actually download the data. While we can argue about dots and perioids here, we still can throw in the question is end-node then responsible about it or not, or is it the start-node?
Spontex
DD-WRT User


Joined: 01 Nov 2006
Posts: 60
Location: North Germany

PostPosted: Wed Nov 01, 2006 11:05    Post subject: Reply with quote
Blackraven wrote:
I have TOR installed on my desktop, and I can see the advantages of anonymous browsing, but I don't want it on all the time, because of the decrease in speed. And going into my router every time to switch it on and off, no thanks. Now I can just click on my tor-button in FF whenever I feel I need it Wink or don't


Hum? When the TOR proxy runs on your Router there is no difference if its running on your desktop.

Yes, i use the foxyproxy plugin for Firefox too. And so its the same... when you want to use TOR you activate the proxy over the plugin or its done automatic by your rules. When the TOR proxy runs on your Router the advantage is that any client in your network can use it.

Foxyproxy at mosdev: http://foxyproxy.mozdev.org/

_________________
WHR-HP-G300N


Last edited by Spontex on Wed Nov 01, 2006 12:12; edited 2 times in total
Spontex
DD-WRT User


Joined: 01 Nov 2006
Posts: 60
Location: North Germany

PostPosted: Wed Nov 01, 2006 11:19    Post subject: Reply with quote
olmari wrote:
Now I'll throw you the most extreme case in theory:

Someone downloads child porn or other very illegal stuff trough TOR. As TOR implies, only exit node of TOR is seen to the 'internet', thus it makes that exit node to seem downloading that sick stuff from inet and then government or so wants to hang that person owning that particular exit-node.


Yes, i know these objections and that are my too. But everything a user does inside the TOR network is logged by the TOR servers. In Germany we had such a case last month and the server operators can show these logs and nothing happened to them.

TOR provides anonymity but its no black box for doing criminal things like downloading child porn or other very illegal stuff.

_________________
WHR-HP-G300N


Last edited by Spontex on Wed Nov 01, 2006 12:10; edited 2 times in total
olmari
DD-WRT Guru


Joined: 24 Oct 2006
Posts: 1447
Location: Finland

PostPosted: Wed Nov 01, 2006 11:25    Post subject: Reply with quote
Spontex wrote:
But everything a user does inside the TOR network is logged by the TOR servers. In Germany we had such a case last month and the server operators can show these logs and nothing happened to them.

TOR provides anonimity but its no black box for doing criminal things like downloading child porn or other very illegal stuff.


Okay so what would then be the point of TOR anymore if it ultimately is not anonym? Wink
Spontex
DD-WRT User


Joined: 01 Nov 2006
Posts: 60
Location: North Germany

PostPosted: Wed Nov 01, 2006 11:44    Post subject: Reply with quote
olmari wrote:


Okay so what would then be the point of TOR anymore if it ultimately is not anonym? Wink


100% anonymity is technically not possible, everytime you need a man in the middel you can trust. But that is not the goal of TOR ...

Just inform yourself Wink http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ

Quote:
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) are supporting Tor's development as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

_________________
WHR-HP-G300N


Last edited by Spontex on Wed Nov 01, 2006 12:11; edited 1 time in total
Blackraven
DD-WRT User


Joined: 10 Jul 2006
Posts: 402
Location: NL

PostPosted: Wed Nov 01, 2006 11:57    Post subject: Reply with quote
Quote:
Hum? When the TOR proxy runs on your Router there is no difference if its running in your desktop. ...
When the TOR proxy runs on your Router the advantage is that any client in your network can use it.


I don't know if the linux version uses the same amount of memory, but on my XP Tor uses 12,6 MB and Privoxy 3,5 MB of memory, the memory on my WRT is already filled to the brim, so I'm really interested to see if your request will make it. It is indeed a nifty feature if you could let all your clients to use it w/o installing it on the desktops itself.
interruptor
DD-WRT Novice


Joined: 01 Nov 2006
Posts: 2

PostPosted: Thu Nov 02, 2006 6:52    Post subject: Reply with quote
Maybe it could be a special version of DD-WRT made with the implementation of TOR like the VPN or VOIP editions.
Patrick82
DD-WRT Novice


Joined: 02 Nov 2006
Posts: 7

PostPosted: Thu Nov 02, 2006 9:35    Post subject: Reply with quote
Spontex wrote:


Yes, i know these objections and that are my too. But everything a user does inside the TOR network is logged by the TOR servers. In Germany we had such a case last month and the server operators can show these logs and nothing happened to them.



As far as i know this is not fully true. Of course the tor-application and the tor-servers generate logfiles. But in these logfiles no information is stored about where a "request" came from. So German authorities where only able to see that the traffic came from the TOR Network and that the Server Operator is not the "bad guy".

Is there a backdoor in TOR
Tracing Users


Please tell me if I see things wrong.


Patrick
es1013
DD-WRT Novice


Joined: 08 Oct 2008
Posts: 17

PostPosted: Thu Oct 30, 2008 2:13    Post subject: Reply with quote
I see its been a while since the last post, but I did a google search for 'tor dd-wrt' and this was one of the first 10 hits.
That said, I'm sure there are plenty of people who would want to contribute to tor by running a server but, for whatever reason, don't.

There's an Optware package over at: http://www.dd-wrt.com/wiki/index.php/Quick_list_of_Optware_packages
but the tor version there is quite outdated (v0.1.2.17-1).

There was a small discussion about this at the OpenWRT forums last year
http://forum.openwrt.org/viewtopic.php?id=12097

It would be great if someone with the know-how could sacrifice some time for this.

EDIT: Found a more current ipkg package of tor (v0.2.0.31) here:
http://ipkg.nslu2-linux.org/feeds/unslung/cross/
Goto page 1, 2, 3  Next Display posts from previous:    Page 1 of 3
Post new topic   Reply to topic    DD-WRT Forum Index -> General Questions All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum