Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Lets consider the following situation:
- you have a Linux (Ubuntu, Mint, Debian) with a Gnome3 desktop with the default Gnome network manager application
- you install tor and restart the machine (by default it start automatically at every startup) 127.0.0.1:9050
- you setup a PPTN VPN using the network manager
- you connect to the VPN using the network manager GUI
- after this you "send a packet through TOR" (e.g. using a TOR browser bundle, using proxychains to route, or writing your own program)
The question is: where the packet goes? Does it go through the VPN and then to the first, second etc TOR node, and then the TOR exit node? I don't know the non-graphical tools like route, etc. to find this out so please help me.
VPN operates on a lower layer, so packets go first through the vpn, then through tor-entry, tor-middle and tor-exit node to the server. The tor entry node does not see your ip, but your vpn-exit's ip.
Is it possible to trace back TOR traffic to the user? (consider the situation mentioned before)
- is it possible to do it when you have "spies" at tor-entry and at tor-exit?
- is it possible to do so "without spying" (eavesdropping) in a normal situation? (consider that you have all the resources needed)
Does the VPN add extra privacy/anonimity or doesn't? (think of an anonymous VPN where there are no user billing informations)
Another "foolish" question: if Alice and Bob are both connected to a VPN (PPTP), how do the "outer world" sees them? Do they have the same IP (like when I have a router at home, I connect to the Internet using that and all my PCs, phones and tables look like they had the same IP on the Internet) or do they have "separate IPs"?
First, thank you for the answer.
I have already studied some forums and other sources.
I know one very "easy" way to trace back Tor: if somebody owns a big amount of exit-relays or somebody is spying at both ends of the network. These kind of things mean (from my point of view) that *top level* criminals or non-criminals can be observed by big player adversaries like NSA.
I will read more Tor project related papers I just wanted to see some examples to those maybe's and sometimes.
"yes, .onion sites are actually EASIER to trace back to YOU" I think you meant that if you visit hidden services in this case it is easier to trace you back. In my question, I thought of a usual case: what if a user visits a legal site and some people want to trace it back (some people can mean someone like my ISP or normal police, but not CIA, NSA, Interpol, Google or Microsoft and not my neighbour/friend)
Thank you.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.