Delivery-Date: Wed, 11 Jun 2014 04:26:38 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by moria.seul.org (Postfix) with ESMTPS id 4E8AA1E094C
	for <archiver@seul.org>; Wed, 11 Jun 2014 04:26:37 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9B7102FA9C;
	Wed, 11 Jun 2014 08:26:31 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B46562FA6E
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 08:23:05 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id C3b1jgl0CXAU for <tor-talk@lists.torproject.org>;
 Wed, 11 Jun 2014 08:23:05 +0000 (UTC)
Received: from mail-ie0-x232.google.com (mail-ie0-x232.google.com
 [IPv6:2607:f8b0:4001:c03::232])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 9B4852FA5B
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 08:23:05 +0000 (UTC)
Received: by mail-ie0-f178.google.com with SMTP id rd18so1357766iec.37
 for <tor-talk@lists.torproject.org>; Wed, 11 Jun 2014 01:23:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=message-id:date:from:user-agent:mime-version:to:subject:references
 :in-reply-to:content-type:content-transfer-encoding;
 bh=knqkoI5fUcw2PavqqT0d/yFkNnS1ZtSwiROl8BdYDhM=;
 b=KoXd1ZHbACt0T+qwDTT8BXcenT8icGKwZa3nR376AIYatjmPwHYA77NnPUY4Y/0dbs
 1iGzf0owRnN2dlkelUz80bCXncozMzmLqVEYsuFKz0cyMqaSKLunZnumOZaRmHpj020y
 dRzYny/4UnGSwJOoZDfyFg+e0kLrGJKA5jFH8OwSiuQWQyEAn6GaG9nLOnPb8c2kE02M
 A4M4UHSeteNQldLzaaaR1bouDXK7+AusXRtORaxV0r4Ln4CG8Q5IwnkqIHBs9TahufUM
 SoyBCs/O6c/XylDOIoAdJ4IEZ4AgXJyp40KEsisIYnm39POCK6yihM4finVIvCUfZV4+
 mTCg==
X-Received: by 10.43.125.199 with SMTP id gt7mr14827199icc.70.1402474983281;
 Wed, 11 Jun 2014 01:23:03 -0700 (PDT)
Received: from ?IPv6:2620:0:e00:400e:b9bf:889e:dfa2:482d?
 ([2620:0:e00:400e:b9bf:889e:dfa2:482d])
 by mx.google.com with ESMTPSA id k20sm106360081igf.5.2014.06.11.01.23.01
 for <tor-talk@lists.torproject.org>
 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
 Wed, 11 Jun 2014 01:23:02 -0700 (PDT)
Message-ID: <539811E4.9040106@gmail.com>
Date: Wed, 11 Jun 2014 03:23:00 -0500
From: Wayland Morgan <dotwayland@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
 rv:24.0) Gecko/20100101 Thunderbird/24.5.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53974AA4.2030302@gmail.com> <539782CD.4000202@cyblings.on.ca>
In-Reply-To: <539782CD.4000202@cyblings.on.ca>
Subject: Re: [tor-talk] Tor Jumphost
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

> 4) you trust the users ?
>
> 5) you trust the websites they will visit ?

Yes. I don't really want or need to know what sites they will be
visiting and nightly rebuilds are a major success factor IMO with
regards to this implementation. If I go the Windows route, I'd like put
some restrictions in place in terms of TBB being the only choice of
browser on the machine as well as restrict administrative activity to
myself.

Have you or anyone else tried something like this?

On 6/10/2014 5:12 PM, krishna e bera wrote:
> On 14-06-10 02:12 PM, Wayland Morgan wrote:
>> I have been considering potentially building some type of remote
>> jumphost for a University research setting that automatically connects
>> its users to the Tor network and am looking for feedback/implementation
>> ideas.
>>
>> A few assumptions:
>>
>> 1) the users of the host trust me as the operator
>> 2) as soon as they log off of the host, all information about their
>> usage is purged.
>> 3) would like to do this with Windows, as it is compatible with RDP and
>> would require less user education.
>>
>> Basically I want to provide an environment for users that requires
>> little or no configuration on their part that they can use to browse the
>> web anonymously. One of the things that is attractive about the jumphost
>> approach is that I can control the patch level of the browser bundle
>> thereby ensuring that it is up to date and also restrict use of any
>> other software that could perhaps compromise the integrity of the user's
>> identity.
>>
>> Thoughts?
> 
> 4) you trust the users ?
> 
> 5) you trust the websites they will visit ?
> 
> Hopefully you will be reloading from a drive-image nightly, and before
> doing any TBB or other updates.
> If one of your RDP users manages to accidentally infect or purposely pwn
> the box, assumptions 1 and 2 would no longer hold.
> 
> Security on Windows or any OS is much harder to maintain once users have
> something like shell access.  Also, TBB flouts one of the potential
> Windows safeguards, that executables shouldnt sit in the user filespace.
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

