Focus on Microsoft
Back to list
Jan 12 2011 05:28PM
im anikin us
Jan 14 2011 02:30AM
Claude Petit (petc webmail us)
With or without firewall, it's the same security issues. With a firewall,
you have to open some ports, and run a service (Tor) on a computer. If you
don't trust a computer program, but you want to run it for any reasons, it's
better to isolate it from your private network and from sensitive data.
Create a DMZ for Tor. Keep your firewall as closed as possible. Don't trust
traffic behind your firewall coming from the computer running Tor. And keep
in mind that you might be in black lists if you are running a proxy server.
This can block you from having access to some servers. Just by exemple,
google might ask you a gotcha for every query.
From: listbounce (at) securityfocus (dot) com [email concealed] [mailto:listbounce (at) securityfocus (dot) com [email concealed]] On
Behalf Of im (at) anikin (dot) us [email concealed]
Sent: Wednesday, January 12, 2011 12:28 PM
To: focus-ms (at) securityfocus (dot) com [email concealed]
What are the security implications of running a Tor relay on a machine
behind a firewall?
Is there a high probability of it being hacked somehow, and what does
one do to prevent that?
Thank you in advance for your time and advice.
mailto:im (at) anikin (dot) us [email concealed]
[ reply ]
Jan 13 2011 03:55AM
MNelson (mnelson nels-sec com)
Jan 13 2011 01:48AM
Thor (Hammer of God) (thor hammerofgod com)
Jan 12 2011 06:43PM
Lee Fisher (blibbet gmail com)
Copyright 2010, SecurityFocus