corridor, a Tor traffic whitelisting gateway
Not affiliated with the Tor Project.
There are several transparently torifying gateways. They suffer from the same problems:
It's tricky to isolate circuits and issue NEWNYM signals, especially if multiple client computers are involved.
Any garbage software can pump identifiers into "anonymous" circuits, and get itself exploited by malicious exit nodes.
Trust is centralized to the gateway, which is bad enough when used by one person, and just inappropriate when shared with strangers.
corridor takes a different approach. It allows only connections to Tor relays to pass through (no clearnet leaks!), but client computers are themselves responsible for torifying their own traffic. In other words, it is a filtering gateway, not a proxying gateway.
You can think of it as a fail-safe for your vanilla Tor Browser or Tails, for your beautiful scary experimental Qubes proxying schemes, etc. Or invite the hood to use your WiFi without getting into trouble.
https://github.com/rustybird/corridor
GitHub - rustybird/corridor: Tor traffic whitelisting gateway
Tor traffic whitelisting gateway. Contribute to rustybird/corridor development by creating an account on GitHub.GitHub