I am currently using a Gl.iNet 6416 with Tor firmware 1.3.
I have some questions, and suggestions for future development:
I am having trouble connecting to the Tor network. Using the OpenWRT SSID works fine, but the Tor SSID or LAN port don’t connect to internet. Even after more than 10 minutes no connection with the Tor network seems to be established. Rebooting the router doesn’t seem to change anything. Yesterday it worked fine. Any ideas?
I was wondering if there were any plans to include an option to use pre- and self-configured Tor bridges and pluggable transports via GUI in future updates. Tor Brower Bundle allows for this. Using naked Tor attracts a lot of unwanted attention. This is a major issue for anyone using Tor to avoid FVEY or consorts from looking all too closely.
If I’m correct the router connects to the Tor network by one permanent circuit for all traffic. This seems to be a serious downgrade of the anonymity level. Using the Tor Browser Bundle and changing tabs frequently limits this damage somewhat (though at the expense of speed because traffic is routed through Tor twice) but this is not possible for all non-browser traffic. Is it at all possible to configure different circuits for different applications for example, and/or to configure the router so that it re-circuits its connection regularly? If not, are there plans to implement these options in future updates?
It would be great if it would be more n00b-friendly to configure the router as a wifi repeater through Tor. I figure most people using this firmware to genuinely stay anonymous do not use a PORTAL device at home, where they can plug in their ethernet cable or configure one main router. You’d rather use it on the move, with a 3G-USB modem or - when it is impossible to acquire 3G cards anonymously - connecting to a lot of different public wifi networks. A GUI option that just requires a few clicks would be a huge advantage.
Is it possible to provide a firmware download with OpenPGP signature for verification, to provide extra security?
I am asking/suggesting all of this because I am testing these routers to possibly serve as part of an easy to use foolproof security&anonymity package for an organisation I’m working for. For this reason it should not only address the above issues out-of-the-box but also be easy to use (basically quick setup to access public wifi through Tor + easy selection of bridges and/or pluggable transports). Your version of PORTAL comes closest to this setup but sadly I’m too much of an amateur to address the remaining issues myself.
In any case, thanks for the great hard- and firmware. Seems to do what it should and very promising for further development.