33

I've read lot of questions asked on various websites about the pros & cons of using a VPN with Tor. As said on Tails website VPN make the situation worse by introducing a permanent entry guard or permanent exit node.

Let's focus on the permanent entry guard. I feel like saying this is worse implies that my ISP is more trustworthy than the VPN provider. Indeed, one would say my VPN provider can see I'm using Tor and would give me away to authorities if they are forced to. Yes, that is true but my ISP would do the exact same thing and more over in some countries ISP are monitored (France for example).

So I really don't understand why setting up a VPN before Tor is less secure than relying on my ISP ?

EDIT :

Let's assume here the threat is high like a journalist in a non-free press country or one that wants to disclose sensitive informations about states. We could also think about someone doing illegal activities (drugs and arms trafficking..)

He would be using Tails OS from his personal home. (What an idea !)

--> Looking at first answer, does a token-based/BTC VPN would change the answer ?

forest
  • 64,616
  • 20
  • 206
  • 257
Lich4r
  • 650
  • 1
  • 6
  • 11
  • 3
    The ISP can see you're using Tor, but they can't see what you're doing with it. So unless Tor is itself illegal or you feel it's likely to attract more negative attention than a VPN, it's not a problem. – pjc50 Jun 03 '16 at 12:44

1 Answers1

38

Preface: I consider this question to be a false dichotomy and an inversion of the burden of proof. One of the core tenets of building secure systems is that you minimise the attack surface, and resist additional components and features wherever possible to keep in line with this. As such, if one cannot identify a strong reason to include a component in the system, and quantify that reason against the threat model, the additional component should not be included. This question is worded in a way that assumes that the VPN provides some benefit, and that removing it is what should be questioned, when in fact the inverse is true: the correct question should be whether adding a VPN layer to Tor provides any tangible benefit. Only when such a benefit has been affirmed should we entertain including it.

What follows is my original answer to the question before I added this preface.


This depends on your threat model, local laws, OS setup, behaviour, and a number of other factors.

For example, let's assume you're a journalist trying to keep your identity quiet because you're studying a police corruption case. If your country's ISPs are protected by common carrier rules (i.e. the messages sent are legally protected in the same way that physical mail is) then transmitting content via the VPN is risky - the VPN provider isn't a common carrier and therefore doesn't have the same legal protection, but certainly does have information about you (billing information).

You've also got the problem that you're adding an additional point of failure. Your security relies upon both the VPN and Tor being safe - compromising one of the two means you're identifiable. Additionally, by connecting to a VPN you usually have routing rules which send LAN traffic through the VPN. This means that non-Tor data (e.g. NetBIOS, WINS discovery packets, DNS, OS / application update queries, etc.) might get sent through that same VPN channel, resulting in a log of your Tor and non-Tor behaviour occurring at the same time through the same endpoint.

The other problem is that commercial VPNs marketing themselves as privacy tools are obvious targets for threat actors. This means that by using the VPN, you might actually end up in a situation where someone has already compromised the server - it's not like you've got annual pentest reports from the VPN provider to take a look at and check they're running sensible and up to date systems. The benefit of Tor, in this regard, is that the communications are decentralised and distributed, which makes it much more difficult to focus attacks and traffic analysis from a logistics perspective.

I'd argue that the benefits of running Tor over a VPN are tenuous at best. The promise of additional privacy or security isn't backed by anything tangible or measurable, aside from the perception that complexity adds security.


Regarding your edit, if the person is using Tails and safely uses Tor, it makes no difference whether you just use Tor or use a VPN with Tor through it really. Which comes down to the crux of it: what does adding a VPN give you? I can't see any case where it provides any additional anonymity, particularly against a nation state, and then you've got the problem that if you're connected to some open WiFi somewhere (e.g. a cafe) you're then potentially tying your identity (from the VPN billing details) to your location, and the fact that you're using a VPN plus Tor. Not ideal if you're a journalist in an oppressive state, or a drugs trafficker trying to keep himself hidden.

Regarding your comment below as to why the VPN might be an addition point of failure, consider that some states would consider you in violation of a law if you simply used Tor. If you only use Tor, it becomes quite difficult to identify who you are if you're using public infrastructure like open WiFi or municiple networks. Once you add the VPN in, you add a direct purchase record back to your name and address. Not ideal.

At the end of the day, designers of secure systems should be resistant to adding additional components and features, due to the additional complexity and potential for unforeseen problems. This means that you should consider what benefit is added by including a VPN in your chain. I can't really see one, aside from a situation where use of Tor would be illegal but use of a VPN to another country would not be illegal (I'm unaware of such a case existing).

One additional potential issue, which I forgot to mention above, is the increase attack surface against the client-side. By adding in a VPN client on top of the Tor client, you've got another piece of software which may contain bugs (e.g. remote code execution).

As an aside, I'd also like to point out that VPNs are not and never were designed to be privacy or anonymity tools. They are marketed as such by people who sell VPN services, but any anonymity or privacy you gain from them is incidental rather than purposeful. They cover but a fraction of the threat landscape in this space; mostly they're only useful as a tool for avoiding ISPs' blocking of certain sites (e.g. torrents). Nobody who is serious about anonymity and privacy, particularly in a situation where their safety, freedom, or even life is on the line, should ever use a VPN as their privacy solution.


Additional edit: There is one very specific circumstance where adding a VPN does provide additional security, and that's when VPN traffic won't draw attention but Tor traffic would. This is the only case where a VPN offers a benefit, at the potential cost of increased identifiability should someone actually take a look at what was sent through the VPN.

Polynomial
  • 132,208
  • 43
  • 298
  • 379
  • Comments are not for extended discussion; this conversation has been [moved to chat](http://chat.stackexchange.com/rooms/40715/discussion-on-answer-by-polynomial-why-is-home-vpn-tor-worse-than-home). – Rory Alsop Jun 03 '16 at 18:14
  • 1
    Tor traffic is still visible through a VPN because it will be sending data in bursts of 514 bytes. Of course that requires things like netflow logs. – forest Apr 01 '18 at 10:24
  • 2
    "compromising one of the two means you're identifiable." How so? If the adversary can compromise Tor, they will only be able to connect the traffic leaving Tor and the traffic coming in from the VPN's IP. Unless the VPN also folds, that alone cannot be connected to the original person. Similarly if the VPN is compromised, the situation would not be any worse than a hostile, spying ISP, which is one of the scenarios Tor is designed for. They would know that the person is using Tor, but without breaching Tor itself they would not be able to connect the entering and leaving traffic. – Kryomaani Nov 01 '20 at 20:29
  • 1
    Perhas a reason to have both is if there's an error in the encryption implementation in one, the other will probably still stand. So it's like having redundant layers of security encase one fails. Is that reasoning valid? – northerner Jan 30 '21 at 04:47
  • @northerner not so really -> https://matt.traudt.xyz/posts/vpn-tor-not-mRikAa4h/ – CalfCrusher Jul 30 '21 at 07:14