K
K
kyrtka1232021-07-02 08:54:20
Computer networks
kyrtka123, 2021-07-02 08:54:20

VPN+TOR+VPN, how to make the right chain?

I plan to make a design for transferring traffic over VPN -> TOR -> VPN.
All "links" will be deployed on VDS under Linux.

Do I need to do each link on a separate server?
Scheme:
[VPN1(VDS1)] -> [TOR(VDS2)] -> [VPN2(VDS3)].

Or is it possible to deploy TOR on one of the servers with a deployed VPN?
Scheme:
[VPN1 -> TOR(VDS1)] -> [VPN2(VDS2)].
Or
[VPN1(VDS1)] -> [TOR -> VPN2(VDS2)].

If 1 of the 2 schemes above is correct, which one is correct?

Why are schemes using two VDS worse than a scheme with three VDS?

-----
Optional:
Yes, that's enough TOR, but in my country it is forbidden to use TOR and I can be fined and in general I will be immediately put on the list of suspicious people, so you need to connect VPN1 at the entrance to the TOR network so that the provider does not see the fact of connecting to it, but at the exit from TOR traffic will be suspicious and will be blocked by almost all sites, if not completely, then with the help of captcha. So you need to exit the TOR network from the unsigned IP of the output VPN2.
Why then use TOR between them at all?
And for the fact that the Internet provider that provides the Internet hosting provider VDS, on which VPN2 is located, can keep logs that go from the server (from VPN2) to the open Internet. In this case, they can come to the hosting provider running VPN2 and see which IP connects to it, but if a different IP (TOR network) connects to it every 1 minute, then they will not be able to access VPN1, they will be hindered " layer" TOR.
But if there is no TOR, they will be able to see which IP connects to VPN2, then, in exactly the same way, dig a little deeper and see which IP connects to VPN1 and deanonymize the person whose traffic they detected at the stage of listening to traffic at the exit from VPN2.

The initial configuration of the servers will be done through the TOR network, no one will write down the real IP of the system administrator.
-----

Explanations on the tags (some were removed in the previous version):
TOR and VPN - Everything is clear here, the question directly affects the work with these protocols / networks.
Linux - All VDS servers will work on Linux, the opinion of Linux-oids is just important in this matter, how exactly to deploy such a chain on Linux servers and whether it is possible to run TOR on the same server along with VPN , this is the most important thing, and also, it is very important whether this can worsen anonymity when compared with "each network on a separate VDS"
Anonymity - everything is clear here too, the very idea of ​​​​the question and the goal that must be achieved after solving the issue refers to this concept (tag).
Computer networks -
Quote from Wikipedia:

Computer network (computer network) - a system that provides data exchange between computing devices - computers, servers , routers and other equipment or software. Various media can be used to transfer information.

Doesn't the chain (network) of computers (servers) that must transfer Internet traffic through itself belong to the " Computer network" tag ?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
K
ky0, 2021-07-02
@ky0

I’ll leave you a link to think about whether you really need vpn besides Tor.

D
Drno, 2021-07-02
@Drno

After reading the comments, it seems to me that there should be such logic.
We rent 2 servers from different hosters, preferably in different countries.
Next, we raise the VPN to SRV1, which we redirect to SRV2 - we get a chain.
From a PC we connect to SRV1 (you can also use TOR) traffic goes PC>>srv1>>srv2(+ tor if necessary)
And what kind of country is this where TOR is prohibited? just wondering)

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question