Aeris <[email protected]>: > Let your network gateway (or each PC) forward all outgoing traffic (or only > traffic to Tor node, with iptables + ipset) through your VPN.
I used a different approach - I used Socks5Proxy option in tor and set up a small socks proxy on a server that listens on the VPN end (using ssh with -D option). So my tor on home router listens on its SocksPort and communicates with the external world using another socks proxy through the VPN. I filtered all other traffic. Seems to work for now... > And use the normal way a normal Tor client per PC, configuring all your > application to use the standard (and local this time) SOCKS5 proxy or do > transparent proxying to (local) Trans/DNSPort. My PC is not turned on 24/7 (router and server are) and as I mentioned before, I prefer to have a client constantly running, as I don't want to give out a correlation between time of starting the client and time of my Tor activities. Thanks, -- Oskar Wendel, [email protected] Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
