Delivery-Date: Mon, 03 Nov 2014 21:51:52 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1CB9C1E0CF8;
	Mon,  3 Nov 2014 21:51:48 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 591D83169D;
	Tue,  4 Nov 2014 02:51:44 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id D5B613162B
 for <tor-talk@lists.torproject.org>; Tue,  4 Nov 2014 02:51:40 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id XlXF7CMsl7cK for <tor-talk@lists.torproject.org>;
 Tue,  4 Nov 2014 02:51:40 +0000 (UTC)
Received: from s2.netcompartner.com (s2.netcompartner.com [80.86.85.53])
 by eugeni.torproject.org (Postfix) with ESMTP id 9ED8F315BF
 for <tor-talk@lists.torproject.org>; Tue,  4 Nov 2014 02:51:40 +0000 (UTC)
Received: from ncpws04.localnet (ncpws04.netcompartner.com
 [IPv6:2001:470:ec48:0:e2cb:4eff:fe3e:11c6])
 by s2.netcompartner.com (Postfix) with ESMTPSA id C2CC7C05FF
 for <tor-talk@lists.torproject.org>; Tue,  4 Nov 2014 03:51:37 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple;
 d=reclaim-your-privacy.com; s=2014; t=1415069498;
 bh=Kci+uqJi5PWRtvLcuc8Q1UsKZhMjt/LBHaAmoXaDRTw=;
 h=From:To:Subject:Date:In-Reply-To:References:From;
 b=Obx+jxRIES17ReNDzHa1HqoMvVQFKQ/Plue0k2+b4bPeHHnrDBYXhbiR4Fqf9C6T0
 EKfkBU9ovdoxTJ+rVpTTVAIp5GxFmBV5BWX0eR6rS8IFiowmoPtuWYQkR/7/R0xitH
 xa212Xa+ylwX/aKozbDVCeAVZmCW3GhRRt6XfCSMizEnn7B7/CE1YaLZvQQYwKmqAA
 mI5DWsxU6fagkOOonOmRlLMz1lORXQsWvLqb7Z2e9CdtSffjOqR5f7L4xSbl7X/b1g
 e7PlOVh0t4YA/yb2cEUvoSv0D1n0u40FGdSsLN4JYjc+Yb5cmwS2IjqggainEe9Lg/
 WVV6FqVBT+iBg==
From: Lars Boegild Thomsen <lth@reclaim-your-privacy.com>
To: tor-talk@lists.torproject.org
Date: Tue, 04 Nov 2014 10:51:34 +0800
Message-ID: <6076013.AllNDFMgsc@ncpws04>
Organization: Reclaim Your Privacy
User-Agent: KMail/4.14.1 (Linux/3.16-3-amd64; KDE/4.14.1; x86_64; ; )
In-Reply-To: <CAJVRA1QJ26Vtjt57N4Ducw3LV=MxnqaoGj0DY6L2D4-5vq8rxw@mail.gmail.com>
References: <7488606.2oxgLGVBPl@ncpws04>
 <CAJVRA1QJ26Vtjt57N4Ducw3LV=MxnqaoGj0DY6L2D4-5vq8rxw@mail.gmail.com>
MIME-Version: 1.0
Subject: Re: [tor-talk] Cloak Tor Router
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Saturday 01 November 2014 12:42:41 coderman wrote:
> - support robust stream isolation, beyond what may be default. perhaps
> IsolateDestAddr and IsolateByClientAddr on TransPort (this does not
> yet exist, but you could code it to the benefit of all Transparent
> proxy consumers 

I do believe those option exist already on TransPort - I have just tested it and it works.  I currently use:

IsolateClientAddr (which is enabled by default)
IsolateDestAddr
IsolateDestPort

Before these options if I on a device went to 2-3 "what is my IP address" sites they would all show the same IP.  Now they all use different exit nodes.  Brilliant!

It will obviously establish a lot more circuits - even just for loading a simple page, but it did not seem to have a huge impact on Tor memory consumption.  It still hovers around 28-29 % of the device memory (that was with 2 rather chatty android phones and 1 netbook connected).

-- 
Lars Boegild Thomsen
https://reclaim-your-privacy.com
Jabber/XMPP: lth@reclaim-your-privacy.com
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

