Andrew Lewman commited on 2013-01-21 02:44:17
Zeige 1 geänderte Dateien mit 667 Einfügungen und 344 Löschungen.
| ... | ... |
@@ -17,7 +17,8 @@ |
| 17 | 17 |
<p>General questions:</p> |
| 18 | 18 |
<ul> |
| 19 | 19 |
<li><a href="#WhatIsTor">What is Tor?</a></li> |
| 20 |
- <li><a href="#Torisdifferent">How is Tor different from other proxies?</a></li> |
|
| 20 |
+ <li><a href="#Torisdifferent">How is Tor different from other |
|
| 21 |
+proxies?</a></li> |
|
| 21 | 22 |
<li><a href="#CompatibleApplications">What programs can I use with |
| 22 | 23 |
Tor?</a></li> |
| 23 | 24 |
<li><a href="#WhyCalledTor">Why is it called Tor?</a></li> |
| ... | ... |
@@ -41,10 +42,13 @@ |
| 41 | 42 |
page?</a></li> |
| 42 | 43 |
<li><a href="#GetTor">Your website is blocked in my country. How |
| 43 | 44 |
do I download Tor?</a></li> |
| 44 |
- <li><a href="#CompileTorWindows">How do I compile Tor under Windows?</a></li> |
|
| 45 |
- <li><a href="#VirusFalsePositives">Why does my Tor executable appear to |
|
| 45 |
+ <li><a href="#CompileTorWindows">How do I compile Tor under |
|
| 46 |
+Windows?</a></li> |
|
| 47 |
+ <li><a href="#VirusFalsePositives">Why does my Tor executable appear |
|
| 48 |
+to |
|
| 46 | 49 |
have a virus or spyware?</a></li> |
| 47 |
- <li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li> |
|
| 50 |
+ <li><a href="#LiveCD">Is there a LiveCD or other bundle that |
|
| 51 |
+includes Tor?</a></li> |
|
| 48 | 52 |
</ul> |
| 49 | 53 |
|
| 50 | 54 |
<p>Tor Browser Bundle:</p> |
| ... | ... |
@@ -59,14 +63,18 @@ |
| 59 | 63 |
go?</a></li> |
| 60 | 64 |
<li><a href="#TBBOtherExtensions">Can I install other Firefox |
| 61 | 65 |
extensions?</a></li> |
| 62 |
- <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle? Isn't that unsafe?</a></li> |
|
| 63 |
- <li><a href="#TBBCanIBlockJS">I'm an expert! (No, really!) Can I configure NoScript to block JavaScript by default?</a></li> |
|
| 66 |
+ <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to |
|
| 67 |
+allow JavaScript by default in the Tor Browser Bundle? Isn't that |
|
| 68 |
+unsafe?</a></li> |
|
| 69 |
+ <li><a href="#TBBCanIBlockJS">I'm an expert! (No, really!) Can I |
|
| 70 |
+configure NoScript to block JavaScript by default?</a></li> |
|
| 64 | 71 |
<li><a href="#TBBOtherBrowser">I want to use Chrome/IE/Opera/etc |
| 65 | 72 |
with Tor.</a></li> |
| 66 | 73 |
<li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle |
| 67 | 74 |
running but close the browser.</a></li> |
| 68 | 75 |
|
| 69 |
- <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
| 76 |
+ <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or |
|
| 77 |
+tells |
|
| 70 | 78 |
me I have spyware installed.</a></li> |
| 71 | 79 |
<li><a href="#GmailWarning">Gmail warns me that my account may have |
| 72 | 80 |
been compromised.</a></li> |
| ... | ... |
@@ -82,7 +90,8 @@ |
| 82 | 90 |
correctly.</a></li> |
| 83 | 91 |
<li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at |
| 84 | 92 |
start.</a></li> |
| 85 |
- <li><a href="#ChooseEntryExit">Can I control which nodes (or country) |
|
| 93 |
+ <li><a href="#ChooseEntryExit">Can I control which nodes (or |
|
| 94 |
+country) |
|
| 86 | 95 |
are used for entry/exit?</a></li> |
| 87 | 96 |
<li><a href="#FirewallPorts">My firewall only allows a few outgoing |
| 88 | 97 |
ports.</a></li> |
| ... | ... |
@@ -90,13 +99,17 @@ |
| 90 | 99 |
|
| 91 | 100 |
<p>Running a Tor relay:</p> |
| 92 | 101 |
<ul> |
| 93 |
- <li><a href="#RelayFlexible">How stable does my relay need to be?</a></li> |
|
| 94 |
- <li><a href="#ExitPolicies">I'd run a relay, but I don't want to deal |
|
| 102 |
+ <li><a href="#RelayFlexible">How stable does my relay need to |
|
| 103 |
+be?</a></li> |
|
| 104 |
+ <li><a href="#ExitPolicies">I'd run a relay, but I don't want to |
|
| 105 |
+deal |
|
| 95 | 106 |
with abuse issues.</a></li> |
| 96 | 107 |
<li><a href="#RelayOrBridge">Should I be a normal relay or bridge |
| 97 | 108 |
relay?</a></li> |
| 98 |
- <li><a href="#MultipleRelays">I want to run more than one relay.</a></li> |
|
| 99 |
- <li><a href="#RelayMemory">Why is my Tor relay using so much memory?</a></li> |
|
| 109 |
+ <li><a href="#MultipleRelays">I want to run more than one |
|
| 110 |
+relay.</a></li> |
|
| 111 |
+ <li><a href="#RelayMemory">Why is my Tor relay using so much |
|
| 112 |
+memory?</a></li> |
|
| 100 | 113 |
<li><a href="#WhyNotNamed">Why is my Tor relay not named?</a></li> |
| 101 | 114 |
<li><a href="#RelayDonations">Can I donate for a relay rather than |
| 102 | 115 |
run my own?</a></li> |
| ... | ... |
@@ -106,7 +119,8 @@ |
| 106 | 119 |
|
| 107 | 120 |
<p>Anonymity and Security:</p> |
| 108 | 121 |
<ul> |
| 109 |
- <li><a href="#KeyManagement">Tell me about all the keys Tor uses.</a></li> |
|
| 122 |
+ <li><a href="#KeyManagement">Tell me about all the keys Tor |
|
| 123 |
+uses.</a></li> |
|
| 110 | 124 |
<li><a href="#EntryGuards">What are Entry Guards?</a></li> |
| 111 | 125 |
</ul> |
| 112 | 126 |
|
| ... | ... |
@@ -114,7 +128,8 @@ |
| 114 | 128 |
<ul> |
| 115 | 129 |
<li><a href="#EverybodyARelay">You should make every Tor user be a |
| 116 | 130 |
relay.</a></li> |
| 117 |
- <li><a href="#TransportIPnotTCP">You should transport all IP packets, |
|
| 131 |
+ <li><a href="#TransportIPnotTCP">You should transport all IP |
|
| 132 |
+packets, |
|
| 118 | 133 |
not just TCP packets.</a></li> |
| 119 | 134 |
<li><a href="#HideExits">You should hide the list of Tor relays, |
| 120 | 135 |
so people can't block the exits.</a></li> |
| ... | ... |
@@ -122,12 +137,14 @@ |
| 122 | 137 |
|
| 123 | 138 |
<p>Abuse:</p> |
| 124 | 139 |
<ul> |
| 125 |
- <li><a href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></li> |
|
| 140 |
+ <li><a href="#Criminals">Doesn't Tor enable criminals to do bad |
|
| 141 |
+things?</a></li> |
|
| 126 | 142 |
<li><a href="#RespondISP">How do I respond to my ISP about my exit |
| 127 | 143 |
relay?</a></li> |
| 128 | 144 |
</ul> |
| 129 | 145 |
|
| 130 |
- <p>For other questions not yet on this version of the FAQ, see the <a |
|
| 146 |
+ <p>For other questions not yet on this version of the FAQ, see the |
|
| 147 |
+<a |
|
| 131 | 148 |
href="<wikifaq>">wiki FAQ</a> for now.</p> |
| 132 | 149 |
|
| 133 | 150 |
<hr> |
| ... | ... |
@@ -142,71 +159,110 @@ |
| 142 | 159 |
</p> |
| 143 | 160 |
|
| 144 | 161 |
<p> |
| 145 |
- The Tor software is a program you can run on your computer that helps keep |
|
| 146 |
- you safe on the Internet. Tor protects you by bouncing your communications |
|
| 162 |
+ The Tor software is a program you can run on your computer that |
|
| 163 |
+helps keep |
|
| 164 |
+ you safe on the Internet. Tor protects you by bouncing your |
|
| 165 |
+communications |
|
| 147 | 166 |
around a distributed network of relays run by volunteers all around |
| 148 |
- the world: it prevents somebody watching your Internet connection from |
|
| 167 |
+ the world: it prevents somebody watching your Internet connection |
|
| 168 |
+from |
|
| 149 | 169 |
learning what sites you visit, and it prevents the sites you visit |
| 150 |
- from learning your physical location. This set of volunteer relays is |
|
| 151 |
- called the Tor network. You can read more about how Tor works on the <a |
|
| 170 |
+ from learning your physical location. This set of volunteer relays |
|
| 171 |
+is |
|
| 172 |
+ called the Tor network. You can read more about how Tor works on the |
|
| 173 |
+<a |
|
| 152 | 174 |
href="<page about/overview>">overview page</a>. |
| 153 | 175 |
</p> |
| 154 | 176 |
|
| 155 | 177 |
<p> |
| 156 |
- The Tor Project is a non-profit (charity) organization that maintains |
|
| 178 |
+ The Tor Project is a non-profit (charity) organization that |
|
| 179 |
+maintains |
|
| 157 | 180 |
and develops the Tor software. |
| 158 | 181 |
</p> |
| 159 | 182 |
|
| 160 | 183 |
<hr> |
| 161 | 184 |
|
| 162 | 185 |
<a id="Torisdifferent"></a> |
| 163 |
- <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3> |
|
| 164 |
- <p> |
|
| 165 |
- A typical proxy provider sets up a server somewhere on the Internet and |
|
| 166 |
-allows you to use it to relay your traffic. This creates a simple, easy to |
|
| 167 |
-maintain architecture. The users all enter and leave through the same server. |
|
| 168 |
-The provider may charge for use of the proxy, or fund their costs through |
|
| 169 |
-advertisements on the server. In the simplest configuration, you don't have to |
|
| 170 |
-install anything. You just have to point your browser at their proxy server. |
|
| 171 |
-Simple proxy providers are fine solutions if you do not want protections for |
|
| 172 |
-your privacy and anonymity online and you trust the provider from doing bad |
|
| 173 |
-things. Some simple proxy providers use SSL to secure your connection to them. |
|
| 174 |
-This may protect you against local eavesdroppers, such as those at a cafe with |
|
| 186 |
+ <h3><a class="anchor" href="#Torisdifferent">How is Tor different |
|
| 187 |
+from other proxies?</a></h3> |
|
| 188 |
+ <p> |
|
| 189 |
+ A typical proxy provider sets up a server somewhere on the Internet |
|
| 190 |
+and |
|
| 191 |
+allows you to use it to relay your traffic. This creates a simple, easy |
|
| 192 |
+to |
|
| 193 |
+maintain architecture. The users all enter and leave through the same |
|
| 194 |
+server. |
|
| 195 |
+The provider may charge for use of the proxy, or fund their costs |
|
| 196 |
+through |
|
| 197 |
+advertisements on the server. In the simplest configuration, you don't |
|
| 198 |
+have to |
|
| 199 |
+install anything. You just have to point your browser at their proxy |
|
| 200 |
+server. |
|
| 201 |
+Simple proxy providers are fine solutions if you do not want protections |
|
| 202 |
+for |
|
| 203 |
+your privacy and anonymity online and you trust the provider from doing |
|
| 204 |
+bad |
|
| 205 |
+things. Some simple proxy providers use SSL to secure your connection |
|
| 206 |
+to them. |
|
| 207 |
+This may protect you against local eavesdroppers, such as those at a |
|
| 208 |
+cafe with |
|
| 175 | 209 |
free wifi Internet. |
| 176 | 210 |
</p> |
| 177 | 211 |
<p> |
| 178 |
- Simple proxy providers also create a single point of failure. The provider |
|
| 179 |
-knows who you are and where you browse on the Internet. They can see your |
|
| 180 |
-traffic as it passes through their server. In some cases, they can even see |
|
| 212 |
+ Simple proxy providers also create a single point of failure. The |
|
| 213 |
+provider |
|
| 214 |
+knows who you are and where you browse on the Internet. They can see |
|
| 215 |
+your |
|
| 216 |
+traffic as it passes through their server. In some cases, they can even |
|
| 217 |
+see |
|
| 181 | 218 |
inside your |
| 182 |
-encrypted traffic as they relay it to your banking site or to ecommerce stores. |
|
| 219 |
+encrypted traffic as they relay it to your banking site or to ecommerce |
|
| 220 |
+stores. |
|
| 183 | 221 |
You have to trust the provider isn't doing any number of things, such as |
| 184 |
-watching your traffic, injecting their own advertisements into your traffic |
|
| 222 |
+watching your traffic, injecting their own advertisements into your |
|
| 223 |
+traffic |
|
| 185 | 224 |
stream, and recording your personal details. |
| 186 | 225 |
</p> |
| 187 | 226 |
<p> |
| 188 |
- Tor passes your traffic through at least 3 different servers before sending |
|
| 189 |
-it on to the destination. Because there's a separate layer of encryption for |
|
| 190 |
-each of the three relays, Tor does not modify, or even know, what you are |
|
| 191 |
-sending into it. It merely relays your traffic, completely encrypted through |
|
| 192 |
-the Tor network and has it pop out somewhere else in the world, completely |
|
| 193 |
-intact. The Tor client is required because we assume you trust your local |
|
| 194 |
-computer. The Tor client manages the encryption and the path chosen through |
|
| 195 |
-the network. The relays located all over the world merely pass encrypted |
|
| 227 |
+ Tor passes your traffic through at least 3 different servers before |
|
| 228 |
+sending |
|
| 229 |
+it on to the destination. Because there's a separate layer of encryption |
|
| 230 |
+for |
|
| 231 |
+each of the three relays, Tor does not modify, or even know, what you |
|
| 232 |
+are |
|
| 233 |
+sending into it. It merely relays your traffic, completely encrypted |
|
| 234 |
+through |
|
| 235 |
+the Tor network and has it pop out somewhere else in the world, |
|
| 236 |
+completely |
|
| 237 |
+intact. The Tor client is required because we assume you trust your |
|
| 238 |
+local |
|
| 239 |
+computer. The Tor client manages the encryption and the path chosen |
|
| 240 |
+through |
|
| 241 |
+the network. The relays located all over the world merely pass |
|
| 242 |
+encrypted |
|
| 196 | 243 |
packets between themselves.</p> |
| 197 | 244 |
<p> |
| 198 | 245 |
<dl> |
| 199 |
- <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of |
|
| 200 |
-three servers can see encrypted Tor traffic coming from your computer. It |
|
| 201 |
-still doesn't know who you are and what you are doing over Tor. It merely sees |
|
| 202 |
-"This IP address is using Tor". Tor is not illegal anywhere in the world, so |
|
| 203 |
-using Tor by itself is fine. You are still protected from this node figuring |
|
| 246 |
+ <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad |
|
| 247 |
+first of |
|
| 248 |
+three servers can see encrypted Tor traffic coming from your computer. |
|
| 249 |
+It |
|
| 250 |
+still doesn't know who you are and what you are doing over Tor. It |
|
| 251 |
+merely sees |
|
| 252 |
+"This IP address is using Tor". Tor is not illegal anywhere in the |
|
| 253 |
+world, so |
|
| 254 |
+using Tor by itself is fine. You are still protected from this node |
|
| 255 |
+figuring |
|
| 204 | 256 |
out who you are and where you are going on the Internet.</dd> |
| 205 |
- <dt>Can't the third server see my traffic?</dt><dd>Possibly. A bad third |
|
| 206 |
-of three servers can see the traffic you sent into Tor. It won't know who sent |
|
| 257 |
+ <dt>Can't the third server see my traffic?</dt><dd>Possibly. A bad |
|
| 258 |
+third |
|
| 259 |
+of three servers can see the traffic you sent into Tor. It won't know |
|
| 260 |
+who sent |
|
| 207 | 261 |
this traffic. If you're using encryption, such as visiting a bank or |
| 208 |
-e-commerce website, or encrypted mail connections, etc, it will only know the |
|
| 209 |
-destination. It won't be able to see the data inside the traffic stream. You |
|
| 262 |
+e-commerce website, or encrypted mail connections, etc, it will only |
|
| 263 |
+know the |
|
| 264 |
+destination. It won't be able to see the data inside the traffic |
|
| 265 |
+stream. You |
|
| 210 | 266 |
are still protected from this node figuring out who you are and if using |
| 211 | 267 |
encryption, what data you're sending to the destination.</dd> |
| 212 | 268 |
</dl> |
| ... | ... |
@@ -215,25 +271,34 @@ encryption, what data you're sending to the destination.</dd> |
| 215 | 271 |
<hr> |
| 216 | 272 |
|
| 217 | 273 |
<a id="CompatibleApplications"></a> |
| 218 |
- <h3><a class="anchor" href="#CompatibleApplications">What programs can I use with Tor?</a></h3> |
|
| 274 |
+ <h3><a class="anchor" href="#CompatibleApplications">What programs |
|
| 275 |
+can I use with Tor?</a></h3> |
|
| 219 | 276 |
|
| 220 | 277 |
<p> |
| 221 |
- There are two pieces to "Torifying" a program: connection-level anonymity |
|
| 222 |
- and application-level anonymity. Connection-level anonymity focuses on |
|
| 223 |
- making sure the application's Internet connections get sent through Tor. |
|
| 278 |
+ There are two pieces to "Torifying" a program: connection-level |
|
| 279 |
+anonymity |
|
| 280 |
+ and application-level anonymity. Connection-level anonymity focuses |
|
| 281 |
+on |
|
| 282 |
+ making sure the application's Internet connections get sent through |
|
| 283 |
+Tor. |
|
| 224 | 284 |
This step is normally done by configuring |
| 225 | 285 |
the program to use your Tor client as a "socks" proxy, but there are |
| 226 |
- other ways to do it too. For application-level anonymity, you need to |
|
| 227 |
- make sure that the information the application sends out doesn't hurt |
|
| 228 |
- your privacy. (Even if the connections are being routed through Tor, you |
|
| 229 |
- still don't want to include sensitive information like your name.) This |
|
| 286 |
+ other ways to do it too. For application-level anonymity, you need |
|
| 287 |
+to |
|
| 288 |
+ make sure that the information the application sends out doesn't |
|
| 289 |
+hurt |
|
| 290 |
+ your privacy. (Even if the connections are being routed through Tor, |
|
| 291 |
+you |
|
| 292 |
+ still don't want to include sensitive information like your name.) |
|
| 293 |
+This |
|
| 230 | 294 |
second step needs to be done on a program-by-program basis, which is |
| 231 | 295 |
why we don't yet recommend very many programs for safe use with Tor. |
| 232 | 296 |
</p> |
| 233 | 297 |
|
| 234 | 298 |
<p> |
| 235 | 299 |
Most of our work so far has focused on the Firefox web browser. The |
| 236 |
- bundles on the <a href="<page download/download>">download page</a> automatically |
|
| 300 |
+ bundles on the <a href="<page download/download>">download page</a> |
|
| 301 |
+automatically |
|
| 237 | 302 |
install the <a href="<page torbutton/index>">Torbutton Firefox |
| 238 | 303 |
extension</a> if you have Firefox installed. As of version 1.2.0, |
| 239 | 304 |
Torbutton now takes care of a lot of the connection-level and |
| ... | ... |
@@ -255,7 +320,8 @@ encryption, what data you're sending to the destination.</dd> |
| 255 | 320 |
<hr> |
| 256 | 321 |
|
| 257 | 322 |
<a id="WhyCalledTor"></a> |
| 258 |
- <h3><a class="anchor" href="#WhyCalledTor">Why is it called Tor?</a></h3> |
|
| 323 |
+ <h3><a class="anchor" href="#WhyCalledTor">Why is it called |
|
| 324 |
+Tor?</a></h3> |
|
| 259 | 325 |
|
| 260 | 326 |
<p> |
| 261 | 327 |
Because Tor is the onion routing network. When we were starting the |
| ... | ... |
@@ -272,28 +338,35 @@ encryption, what data you're sending to the destination.</dd> |
| 272 | 338 |
</p> |
| 273 | 339 |
|
| 274 | 340 |
<p> |
| 275 |
- Note: even though it originally came from an acronym, Tor is not spelled |
|
| 341 |
+ Note: even though it originally came from an acronym, Tor is not |
|
| 342 |
+spelled |
|
| 276 | 343 |
"TOR". Only the first letter is capitalized. In fact, we can usually |
| 277 |
- spot people who haven't read any of our website (and have instead learned |
|
| 278 |
- everything they know about Tor from news articles) by the fact that they |
|
| 344 |
+ spot people who haven't read any of our website (and have instead |
|
| 345 |
+learned |
|
| 346 |
+ everything they know about Tor from news articles) by the fact that |
|
| 347 |
+they |
|
| 279 | 348 |
spell it wrong. |
| 280 | 349 |
</p> |
| 281 | 350 |
|
| 282 | 351 |
<hr> |
| 283 | 352 |
|
| 284 | 353 |
<a id="Backdoor"></a> |
| 285 |
- <h3><a class="anchor" href="#Backdoor">Is there a backdoor in Tor?</a></h3> |
|
| 354 |
+ <h3><a class="anchor" href="#Backdoor">Is there a backdoor in |
|
| 355 |
+Tor?</a></h3> |
|
| 286 | 356 |
|
| 287 | 357 |
<p> |
| 288 |
- There is absolutely no backdoor in Tor. Nobody has asked us to put one |
|
| 289 |
- in, and we know some smart lawyers who say that it's unlikely that anybody |
|
| 358 |
+ There is absolutely no backdoor in Tor. Nobody has asked us to put |
|
| 359 |
+one |
|
| 360 |
+ in, and we know some smart lawyers who say that it's unlikely that |
|
| 361 |
+anybody |
|
| 290 | 362 |
will try to make us add one in our jurisdiction (U.S.). If they do |
| 291 | 363 |
ask us, we will fight them, and (the lawyers say) probably win. |
| 292 | 364 |
</p> |
| 293 | 365 |
|
| 294 | 366 |
<p> |
| 295 | 367 |
We think that putting a backdoor in Tor would be tremendously |
| 296 |
- irresponsible to our users, and a bad precedent for security software |
|
| 368 |
+ irresponsible to our users, and a bad precedent for security |
|
| 369 |
+software |
|
| 297 | 370 |
in general. If we ever put a deliberate backdoor in our security |
| 298 | 371 |
software, it would ruin our professional reputations. Nobody would |
| 299 | 372 |
trust our software ever again — for excellent reason! |
| ... | ... |
@@ -302,8 +375,10 @@ encryption, what data you're sending to the destination.</dd> |
| 302 | 375 |
<p> |
| 303 | 376 |
But that said, there are still plenty of subtle attacks |
| 304 | 377 |
people might try. Somebody might impersonate us, or break into our |
| 305 |
- computers, or something like that. Tor is open source, and you should |
|
| 306 |
- always check the source (or at least the diffs since the last release) |
|
| 378 |
+ computers, or something like that. Tor is open source, and you |
|
| 379 |
+should |
|
| 380 |
+ always check the source (or at least the diffs since the last |
|
| 381 |
+release) |
|
| 307 | 382 |
for suspicious things. If we (or the distributors) don't give you |
| 308 | 383 |
source, that's a sure sign something funny might be going on. You |
| 309 | 384 |
should also check the <a href="<page docs/verifying-signatures>">PGP |
| ... | ... |
@@ -313,35 +388,43 @@ encryption, what data you're sending to the destination.</dd> |
| 313 | 388 |
|
| 314 | 389 |
<p> |
| 315 | 390 |
Also, there might be accidental bugs in Tor that could affect your |
| 316 |
- anonymity. We periodically find and fix anonymity-related bugs, so make |
|
| 391 |
+ anonymity. We periodically find and fix anonymity-related bugs, so |
|
| 392 |
+make |
|
| 317 | 393 |
sure you keep your Tor versions up-to-date. |
| 318 | 394 |
</p> |
| 319 | 395 |
|
| 320 | 396 |
<hr> |
| 321 | 397 |
|
| 322 | 398 |
<a id="DistributingTor"></a> |
| 323 |
- <h3><a class="anchor" href="#DistributingTor">Can I distribute Tor?</a></h3> |
|
| 399 |
+ <h3><a class="anchor" href="#DistributingTor">Can I distribute |
|
| 400 |
+Tor?</a></h3> |
|
| 324 | 401 |
|
| 325 | 402 |
<p> |
| 326 | 403 |
Yes. |
| 327 | 404 |
</p> |
| 328 | 405 |
|
| 329 | 406 |
<p> |
| 330 |
- The Tor software is <a href="https://www.fsf.org/">free software</a>. This |
|
| 331 |
- means we give you the rights to redistribute the Tor software, either |
|
| 332 |
- modified or unmodified, either for a fee or gratis. You don't have to |
|
| 407 |
+ The Tor software is <a href="https://www.fsf.org/">free |
|
| 408 |
+software</a>. This |
|
| 409 |
+ means we give you the rights to redistribute the Tor software, |
|
| 410 |
+either |
|
| 411 |
+ modified or unmodified, either for a fee or gratis. You don't have |
|
| 412 |
+to |
|
| 333 | 413 |
ask us for specific permission. |
| 334 | 414 |
</p> |
| 335 | 415 |
|
| 336 | 416 |
<p> |
| 337 |
- However, if you want to redistribute the Tor software you must follow our |
|
| 417 |
+ However, if you want to redistribute the Tor software you must |
|
| 418 |
+follow our |
|
| 338 | 419 |
<a href="<gitblob>LICENSE">LICENSE</a>. |
| 339 |
- Essentially this means that you need to include our LICENSE file along |
|
| 420 |
+ Essentially this means that you need to include our LICENSE file |
|
| 421 |
+along |
|
| 340 | 422 |
with whatever part of the Tor software you're distributing. |
| 341 | 423 |
</p> |
| 342 | 424 |
|
| 343 | 425 |
<p> |
| 344 |
- Most people who ask us this question don't want to distribute just the |
|
| 426 |
+ Most people who ask us this question don't want to distribute just |
|
| 427 |
+the |
|
| 345 | 428 |
Tor software, though. They want to distribute the <a |
| 346 | 429 |
href="https://www.torproject.org/projects/torbrowser.html.en">Tor |
| 347 | 430 |
Browser</a>. This includes <a |
| ... | ... |
@@ -359,39 +442,52 @@ encryption, what data you're sending to the destination.</dd> |
| 359 | 442 |
</p> |
| 360 | 443 |
|
| 361 | 444 |
<p> |
| 362 |
- Also, you should make sure not to confuse your readers about what Tor is, |
|
| 363 |
- who makes it, and what properties it provides (and doesn't provide). See |
|
| 364 |
- our <a href="<page docs/trademark-faq>">trademark FAQ</a> for details. |
|
| 445 |
+ Also, you should make sure not to confuse your readers about what |
|
| 446 |
+Tor is, |
|
| 447 |
+ who makes it, and what properties it provides (and doesn't provide). |
|
| 448 |
+See |
|
| 449 |
+ our <a href="<page docs/trademark-faq>">trademark FAQ</a> for |
|
| 450 |
+details. |
|
| 365 | 451 |
</p> |
| 366 | 452 |
|
| 367 | 453 |
<p> |
| 368 | 454 |
Lastly, you should realize that we release new versions of the |
| 369 | 455 |
Tor software frequently, and sometimes we make backward incompatible |
| 370 |
- changes. So if you distribute a particular version of the Tor software, it |
|
| 371 |
- may not be supported — or even work — six months later. This |
|
| 456 |
+ changes. So if you distribute a particular version of the Tor |
|
| 457 |
+software, it |
|
| 458 |
+ may not be supported — or even work — six months later. |
|
| 459 |
+This |
|
| 372 | 460 |
is a fact of life for all security software under heavy development. |
| 373 | 461 |
</p> |
| 374 | 462 |
|
| 375 | 463 |
<hr> |
| 376 | 464 |
|
| 377 | 465 |
<a id="SupportMail"></a> |
| 378 |
- <h3><a class="anchor" href="#SupportMail">How can I get support?</a></h3> |
|
| 466 |
+ <h3><a class="anchor" href="#SupportMail">How can I get |
|
| 467 |
+support?</a></h3> |
|
| 379 | 468 |
|
| 380 | 469 |
<p>Your best bet is to first try the following:</p> |
| 381 | 470 |
<ol> |
| 382 | 471 |
<li>Read through this <a href="<page docs/faq>">FAQ</a>.</li> |
| 383 |
- <li>Read through the <a href="<page docs/documentation>">documentation</a>.</li> |
|
| 472 |
+ <li>Read through the <a href="<page |
|
| 473 |
+docs/documentation>">documentation</a>.</li> |
|
| 384 | 474 |
<li>Read through the <a |
| 385 |
- href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">tor-talk |
|
| 475 |
+ |
|
| 476 |
+href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk"> |
|
| 477 |
+tor-talk |
|
| 386 | 478 |
archives</a> and see if your question is already answered.</li> |
| 387 |
- <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a> and |
|
| 479 |
+ <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a> |
|
| 480 |
+and |
|
| 388 | 481 |
state the issue and wait for help.</li> |
| 389 | 482 |
<li>Send an email to <a |
| 483 |
+ |
|
| 390 | 484 |
href="mailto:help@rt.torproject.org">help@rt.torproject.org</a>.</li> |
| 391 |
- <li>If all else fails, try <a href="<page about/contact>">contacting us</a> directly.</li> |
|
| 485 |
+ <li>If all else fails, try <a href="<page about/contact>">contacting |
|
| 486 |
+us</a> directly.</li> |
|
| 392 | 487 |
</ol> |
| 393 | 488 |
|
| 394 |
- <p>If you find your answer, please stick around on the IRC channel or the |
|
| 489 |
+ <p>If you find your answer, please stick around on the IRC channel |
|
| 490 |
+or the |
|
| 395 | 491 |
mailing list to help others who were once in your position.</p> |
| 396 | 492 |
|
| 397 | 493 |
<hr> |
| ... | ... |
@@ -420,24 +516,31 @@ encryption, what data you're sending to the destination.</dd> |
| 420 | 516 |
</p> |
| 421 | 517 |
|
| 422 | 518 |
<p> |
| 423 |
- Before we answer, though, you should realize that Tor is never going to |
|
| 424 |
- be blazing fast. Your traffic is bouncing through volunteers' computers |
|
| 425 |
- in various parts of the world, and some bottlenecks and network latency |
|
| 519 |
+ Before we answer, though, you should realize that Tor is never going |
|
| 520 |
+to |
|
| 521 |
+ be blazing fast. Your traffic is bouncing through volunteers' |
|
| 522 |
+computers |
|
| 523 |
+ in various parts of the world, and some bottlenecks and network |
|
| 524 |
+latency |
|
| 426 | 525 |
will always be present. You shouldn't expect to see university-style |
| 427 | 526 |
bandwidth through Tor. |
| 428 | 527 |
</p> |
| 429 | 528 |
|
| 430 | 529 |
<p> |
| 431 |
- But that doesn't mean that it can't be improved. The current Tor network |
|
| 432 |
- is quite small compared to the number of people trying to use it, and |
|
| 433 |
- many of these users don't understand or care that Tor can't currently |
|
| 530 |
+ But that doesn't mean that it can't be improved. The current Tor |
|
| 531 |
+network |
|
| 532 |
+ is quite small compared to the number of people trying to use it, |
|
| 533 |
+and |
|
| 534 |
+ many of these users don't understand or care that Tor can't |
|
| 535 |
+currently |
|
| 434 | 536 |
handle file-sharing traffic load. |
| 435 | 537 |
</p> |
| 436 | 538 |
|
| 437 | 539 |
<p> |
| 438 | 540 |
For the much more in-depth answer, see <a |
| 439 | 541 |
href="<blog>why-tor-is-slow">Roger's blog |
| 440 |
- post on the topic</a>, which includes both a detailed PDF and a video |
|
| 542 |
+ post on the topic</a>, which includes both a detailed PDF and a |
|
| 543 |
+video |
|
| 441 | 544 |
to go with it. |
| 442 | 545 |
</p> |
| 443 | 546 |
|
| ... | ... |
@@ -448,60 +551,64 @@ encryption, what data you're sending to the destination.</dd> |
| 448 | 551 |
<ul> |
| 449 | 552 |
|
| 450 | 553 |
<li> |
| 451 |
- <a href="<page docs/tor-doc-relay>">Configure your Tor to relay traffic |
|
| 452 |
- for others</a>. Help make the Tor network large enough that we can handle |
|
| 554 |
+ <a href="<page docs/tor-doc-relay>">Configure your Tor to relay |
|
| 555 |
+traffic |
|
| 556 |
+ for others</a>. Help make the Tor network large enough that we can |
|
| 557 |
+handle |
|
| 453 | 558 |
all the users who want privacy and security on the Internet. |
| 454 | 559 |
</li> |
| 455 | 560 |
|
| 456 | 561 |
<li> |
| 457 |
- <a href="<page projects/vidalia>">Help us make Tor more usable</a>. We |
|
| 562 |
+ <a href="<page projects/vidalia>">Help us make Tor more usable</a>. |
|
| 563 |
+We |
|
| 458 | 564 |
especially need people to help make it easier to configure your Tor |
| 459 | 565 |
as a relay. Also, we need help with clear simple documentation to |
| 460 | 566 |
walk people through setting it up. |
| 461 | 567 |
</li> |
| 462 | 568 |
|
| 463 | 569 |
<li> |
| 464 |
- There are some bottlenecks in the current Tor network. Help us design |
|
| 465 |
- experiments to track down and demonstrate where the problems are, and |
|
| 570 |
+ There are some bottlenecks in the current Tor network. Help us |
|
| 571 |
+design |
|
| 572 |
+ experiments to track down and demonstrate where the problems are, |
|
| 573 |
+and |
|
| 466 | 574 |
then we can focus better on fixing them. |
| 467 | 575 |
</li> |
| 468 | 576 |
|
| 469 |
- <li> |
|
| 470 |
- There are some steps that individuals |
|
| 471 |
- can take to improve their Tor performance. <a |
|
| 472 |
- href="<wiki>doc/FireFoxTorPerf">You |
|
| 473 |
- can configure your Firefox to handle Tor better</a>, <a |
|
| 474 |
- href="http://www.pps.jussieu.fr/~jch/software/polipo/tor.html">you can use |
|
| 475 |
- Polipo with Tor</a>, or you can try <a href="<page download/download>">upgrading |
|
| 476 |
- to the latest version of Tor</a>. If this works well, please help by |
|
| 477 |
- documenting what you did, and letting us know about it. |
|
| 478 |
- </li> |
|
| 479 |
- |
|
| 480 | 577 |
<li> |
| 481 | 578 |
Tor needs some architectural changes too. One important change is to |
| 482 |
- start providing <a href="#EverybodyARelay">better service to people who |
|
| 483 |
- relay traffic</a>. We're working on this, and we'll finish faster if we |
|
| 579 |
+ start providing <a href="#EverybodyARelay">better service to people |
|
| 580 |
+who |
|
| 581 |
+ relay traffic</a>. We're working on this, and we'll finish faster if |
|
| 582 |
+we |
|
| 484 | 583 |
get to spend more time on it. |
| 485 | 584 |
</li> |
| 486 | 585 |
|
| 487 | 586 |
<li> |
| 488 |
- Help do other things so we can do the hard stuff. Please take a moment |
|
| 489 |
- to figure out what your skills and interests are, and then <a href="<page |
|
| 587 |
+ Help do other things so we can do the hard stuff. Please take a |
|
| 588 |
+moment |
|
| 589 |
+ to figure out what your skills and interests are, and then <a |
|
| 590 |
+href="<page |
|
| 490 | 591 |
getinvolved/volunteer>">look at our volunteer page</a>. |
| 491 | 592 |
</li> |
| 492 | 593 |
|
| 493 | 594 |
<li> |
| 494 |
- Help find sponsors for Tor. Do you work at a company or government agency |
|
| 595 |
+ Help find sponsors for Tor. Do you work at a company or government |
|
| 596 |
+agency |
|
| 495 | 597 |
that uses Tor or has a use for Internet privacy, e.g. to browse the |
| 496 |
- competition's websites discreetly, or to connect back to the home servers |
|
| 497 |
- when on the road without revealing affiliations? If your organization has |
|
| 498 |
- an interest in keeping the Tor network working, please contact them about |
|
| 499 |
- supporting Tor. Without sponsors, Tor is going to become even slower. |
|
| 598 |
+ competition's websites discreetly, or to connect back to the home |
|
| 599 |
+servers |
|
| 600 |
+ when on the road without revealing affiliations? If your |
|
| 601 |
+organization has |
|
| 602 |
+ an interest in keeping the Tor network working, please contact them |
|
| 603 |
+about |
|
| 604 |
+ supporting Tor. Without sponsors, Tor is going to become even |
|
| 605 |
+slower. |
|
| 500 | 606 |
</li> |
| 501 | 607 |
|
| 502 | 608 |
<li> |
| 503 | 609 |
If you can't help out with any of the above, you can still help out |
| 504 |
- individually by <a href="<page donate/donate>">donating a bit of money to the |
|
| 610 |
+ individually by <a href="<page donate/donate>">donating a bit of |
|
| 611 |
+money to the |
|
| 505 | 612 |
cause</a>. It adds up! |
| 506 | 613 |
</li> |
| 507 | 614 |
|
| ... | ... |
@@ -510,7 +617,8 @@ encryption, what data you're sending to the destination.</dd> |
| 510 | 617 |
<hr> |
| 511 | 618 |
|
| 512 | 619 |
<a id="Funding"></a> |
| 513 |
- <h3><a class="anchor" href="#Funding">What would The Tor Project do with more funding?</a></h3> |
|
| 620 |
+ <h3><a class="anchor" href="#Funding">What would The Tor Project do |
|
| 621 |
+with more funding?</a></h3> |
|
| 514 | 622 |
|
| 515 | 623 |
<p> |
| 516 | 624 |
The Tor network's <a |
| ... | ... |
@@ -524,7 +634,8 @@ encryption, what data you're sending to the destination.</dd> |
| 524 | 634 |
</p> |
| 525 | 635 |
|
| 526 | 636 |
<p> |
| 527 |
- There are six main development/maintenance pushes that need attention: |
|
| 637 |
+ There are six main development/maintenance pushes that need |
|
| 638 |
+attention: |
|
| 528 | 639 |
</p> |
| 529 | 640 |
|
| 530 | 641 |
<ul> |
| ... | ... |
@@ -532,38 +643,52 @@ encryption, what data you're sending to the destination.</dd> |
| 532 | 643 |
<li> |
| 533 | 644 |
Scalability: We need to keep scaling and decentralizing the Tor |
| 534 | 645 |
architecture so it can handle thousands of relays and millions of |
| 535 |
- users. The upcoming stable release is a major improvement, but there's |
|
| 646 |
+ users. The upcoming stable release is a major improvement, but |
|
| 647 |
+there's |
|
| 536 | 648 |
lots more to be done next in terms of keeping Tor fast and stable. |
| 537 | 649 |
</li> |
| 538 | 650 |
|
| 539 | 651 |
<li> |
| 540 |
- User support: With this many users, a lot of people are asking questions |
|
| 541 |
- all the time, offering to help out with things, and so on. We need good |
|
| 542 |
- clean docs, and we need to spend some effort coordinating volunteers. |
|
| 652 |
+ User support: With this many users, a lot of people are asking |
|
| 653 |
+questions |
|
| 654 |
+ all the time, offering to help out with things, and so on. We need |
|
| 655 |
+good |
|
| 656 |
+ clean docs, and we need to spend some effort coordinating |
|
| 657 |
+volunteers. |
|
| 543 | 658 |
</li> |
| 544 | 659 |
|
| 545 | 660 |
<li> |
| 546 |
- Relay support: the Tor network is run by volunteers, but they still need |
|
| 661 |
+ Relay support: the Tor network is run by volunteers, but they still |
|
| 662 |
+need |
|
| 547 | 663 |
attention with prompt bug fixes, explanations when things go wrong, |
| 548 |
- reminders to upgrade, and so on. The network itself is a commons, and |
|
| 549 |
- somebody needs to spend some energy making sure the relay operators stay |
|
| 550 |
- happy. We also need to work on stability on some platforms — e.g., |
|
| 664 |
+ reminders to upgrade, and so on. The network itself is a commons, |
|
| 665 |
+and |
|
| 666 |
+ somebody needs to spend some energy making sure the relay operators |
|
| 667 |
+stay |
|
| 668 |
+ happy. We also need to work on stability on some platforms — |
|
| 669 |
+e.g., |
|
| 551 | 670 |
Tor relays have problems on Win XP currently. |
| 552 | 671 |
</li> |
| 553 | 672 |
|
| 554 | 673 |
<li> |
| 555 |
- Usability: Beyond documentation, we also need to work on usability of the |
|
| 556 |
- software itself. This includes installers, clean GUIs, easy configuration |
|
| 557 |
- to interface with other applications, and generally automating all of |
|
| 558 |
- the difficult and confusing steps inside Tor. We've got a start on this |
|
| 559 |
- with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much more work |
|
| 674 |
+ Usability: Beyond documentation, we also need to work on usability |
|
| 675 |
+of the |
|
| 676 |
+ software itself. This includes installers, clean GUIs, easy |
|
| 677 |
+configuration |
|
| 678 |
+ to interface with other applications, and generally automating all |
|
| 679 |
+of |
|
| 680 |
+ the difficult and confusing steps inside Tor. We've got a start on |
|
| 681 |
+this |
|
| 682 |
+ with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much |
|
| 683 |
+more work |
|
| 560 | 684 |
remains — usability for privacy software has never been easy. |
| 561 | 685 |
</li> |
| 562 | 686 |
|
| 563 | 687 |
<li> |
| 564 | 688 |
Incentives: We need to work on ways to encourage people to configure |
| 565 | 689 |
their Tors as relays and exit nodes rather than just clients. |
| 566 |
- <a href="#EverybodyARelay">We need to make it easy to become a relay, |
|
| 690 |
+ <a href="#EverybodyARelay">We need to make it easy to become a |
|
| 691 |
+relay, |
|
| 567 | 692 |
and we need to give people incentives to do it.</a> |
| 568 | 693 |
</li> |
| 569 | 694 |
|
| ... | ... |
@@ -572,9 +697,12 @@ encryption, what data you're sending to the destination.</dd> |
| 572 | 697 |
of surprises and gotchas. In our copious free time, we |
| 573 | 698 |
also help run top anonymity and privacy conferences like <a |
| 574 | 699 |
href="http://petsymposium.org/">PETS</a>. We've identified a set of |
| 575 |
- critical <a href="<page getinvolved/volunteer>#Research">Tor research questions</a> |
|
| 576 |
- that will help us figure out how to make Tor secure against the variety of |
|
| 577 |
- attacks out there. Of course, there are more research questions waiting |
|
| 700 |
+ critical <a href="<page getinvolved/volunteer>#Research">Tor |
|
| 701 |
+research questions</a> |
|
| 702 |
+ that will help us figure out how to make Tor secure against the |
|
| 703 |
+variety of |
|
| 704 |
+ attacks out there. Of course, there are more research questions |
|
| 705 |
+waiting |
|
| 578 | 706 |
behind these. |
| 579 | 707 |
</li> |
| 580 | 708 |
|
| ... | ... |
@@ -582,9 +710,11 @@ encryption, what data you're sending to the destination.</dd> |
| 582 | 710 |
|
| 583 | 711 |
<p> |
| 584 | 712 |
We're continuing to move forward on all of these, but at this rate |
| 585 |
- <a href="#WhySlow">the Tor network is growing faster than the developers |
|
| 713 |
+ <a href="#WhySlow">the Tor network is growing faster than the |
|
| 714 |
+developers |
|
| 586 | 715 |
can keep up</a>. |
| 587 |
- Now would be an excellent time to add a few more developers to the effort |
|
| 716 |
+ Now would be an excellent time to add a few more developers to the |
|
| 717 |
+effort |
|
| 588 | 718 |
so we can continue to grow the network. |
| 589 | 719 |
</p> |
| 590 | 720 |
|
| ... | ... |
@@ -594,23 +724,30 @@ encryption, what data you're sending to the destination.</dd> |
| 594 | 724 |
</p> |
| 595 | 725 |
|
| 596 | 726 |
<p> |
| 597 |
- We are proud to have <a href="<page about/sponsors>">sponsorship and support</a> |
|
| 598 |
- from the Omidyar Network, the International Broadcasting Bureau, Bell |
|
| 599 |
- Security Solutions, the Electronic Frontier Foundation, several government |
|
| 727 |
+ We are proud to have <a href="<page about/sponsors>">sponsorship and |
|
| 728 |
+support</a> |
|
| 729 |
+ from the Omidyar Network, the International Broadcasting Bureau, |
|
| 730 |
+Bell |
|
| 731 |
+ Security Solutions, the Electronic Frontier Foundation, several |
|
| 732 |
+government |
|
| 600 | 733 |
agencies and research groups, and hundreds of private contributors. |
| 601 | 734 |
</p> |
| 602 | 735 |
|
| 603 | 736 |
<p> |
| 604 |
- However, this support is not enough to keep Tor abreast of changes in the |
|
| 605 |
- Internet privacy landscape. Please <a href="<page donate/donate>">donate</a> |
|
| 606 |
- to the project, or <a href="<page about/contact>">contact</a> our executive |
|
| 737 |
+ However, this support is not enough to keep Tor abreast of changes |
|
| 738 |
+in the |
|
| 739 |
+ Internet privacy landscape. Please <a href="<page |
|
| 740 |
+donate/donate>">donate</a> |
|
| 741 |
+ to the project, or <a href="<page about/contact>">contact</a> our |
|
| 742 |
+executive |
|
| 607 | 743 |
director for information on making grants or major donations. |
| 608 | 744 |
</p> |
| 609 | 745 |
|
| 610 | 746 |
<hr> |
| 611 | 747 |
|
| 612 | 748 |
<a id="Metrics"></a> |
| 613 |
- <h3><a class="anchor" href="#Metrics">How many people use Tor? How many relays or exit nodes are there?</a></h3> |
|
| 749 |
+ <h3><a class="anchor" href="#Metrics">How many people use Tor? How |
|
| 750 |
+many relays or exit nodes are there?</a></h3> |
|
| 614 | 751 |
|
| 615 | 752 |
<p>All this and more about measuring Tor can be found at the <a |
| 616 | 753 |
href="https://metrics.torproject.org/">Tor Metrics Portal</a>.</p> |
| ... | ... |
@@ -622,9 +759,11 @@ certificate fingerprints for Tor's various websites?</a></h3> |
| 622 | 759 |
<p> |
| 623 | 760 |
<pre> |
| 624 | 761 |
*.torproject.org SSL certificate from Digicert: |
| 625 |
- The serial number is: 02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE |
|
| 762 |
+ The serial number is: |
|
| 763 |
+02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE |
|
| 626 | 764 |
The SHA-1 fingerprint is: a7e70f8a648fe04a9677f13eedf6f91b5f7f2e25 |
| 627 |
- The SHA-256 fingerprint is: 23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b |
|
| 765 |
+ The SHA-256 fingerprint is: |
|
| 766 |
+23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b |
|
| 628 | 767 |
|
| 629 | 768 |
blog.torproject.org SSL certificate from RapidSSL: |
| 630 | 769 |
The serial number is: 00:EF:A3 |
| ... | ... |
@@ -634,31 +773,47 @@ certificate fingerprints for Tor's various websites?</a></h3> |
| 634 | 773 |
<hr> |
| 635 | 774 |
|
| 636 | 775 |
<a id="HowUninstallTor"></a> |
| 637 |
- <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall Tor?</a></h3> |
|
| 776 |
+ <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall |
|
| 777 |
+Tor?</a></h3> |
|
| 778 |
+ |
|
| 779 |
+ <p> |
|
| 780 |
+ Tor Browser does not install itself in the classic sense of |
|
| 781 |
+applications. You just simply delete the folder or directory named "Tor |
|
| 782 |
+Browser" and it is removed from your system. |
|
| 783 |
+ </p> |
|
| 638 | 784 |
|
| 639 | 785 |
<p> |
| 640 |
- This depends entirely on how you installed it and which operating system you |
|
| 641 |
- have. If you installed a package, then hopefully your package has a way to |
|
| 642 |
- uninstall itself. The Windows packages include uninstallers. The proper way to |
|
| 643 |
- completely remove Tor, Vidalia, Torbutton for Firefox, and Polipo on any |
|
| 786 |
+ If this is not related to Tor Browser, uninstallation depends |
|
| 787 |
+entirely on how you installed it and which operating system you |
|
| 788 |
+ have. If you installed a package, then hopefully your package has a |
|
| 789 |
+way to |
|
| 790 |
+ uninstall itself. The Windows packages include uninstallers. The |
|
| 791 |
+proper way to |
|
| 792 |
+ completely remove Tor, Vidalia, and Torbutton for Firefox on any |
|
| 644 | 793 |
version of Windows is as follows: |
| 645 | 794 |
</p> |
| 646 | 795 |
|
| 647 | 796 |
<ol> |
| 648 |
- <li>In your taskbar, right click on Vidalia (the green onion or the black head) |
|
| 797 |
+ <li>In your taskbar, right click on Vidalia (the green onion or the |
|
| 798 |
+black head) |
|
| 649 | 799 |
and choose exit.</li> |
| 650 |
- <li>Right click on the taskbar to bring up TaskManager. Look for tor.exe in the |
|
| 651 |
- Process List. If it's running, right click and choose End Process.</li> |
|
| 652 |
- <li>Click the Start button, go to Programs, go to Vidalia, choose Uninstall. |
|
| 653 |
- This will remove the Vidalia bundle, which includes Tor and Polipo.</li> |
|
| 654 |
- <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select Torbutton. |
|
| 800 |
+ <li>Right click on the taskbar to bring up TaskManager. Look for |
|
| 801 |
+tor.exe in the |
|
| 802 |
+ Process List. If it's running, right click and choose End |
|
| 803 |
+Process.</li> |
|
| 804 |
+ <li>Click the Start button, go to Programs, go to Vidalia, choose |
|
| 805 |
+Uninstall. |
|
| 806 |
+ This will remove the Vidalia bundle, which includes Tor.</li> |
|
| 807 |
+ <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select |
|
| 808 |
+Torbutton. |
|
| 655 | 809 |
Click the Uninstall button.</li> |
| 656 | 810 |
</ol> |
| 657 | 811 |
|
| 658 | 812 |
<p> |
| 659 | 813 |
If you do not follow these steps (for example by trying to uninstall |
| 660 |
- Vidalia, Tor, and Polipo while they are still running), you will need to |
|
| 661 |
- reboot and manually remove the directory "Program Files\Vidalia Bundle". |
|
| 814 |
+ Vidalia and Tor while they are still running), you will need to |
|
| 815 |
+ reboot and manually remove the directory "Program Files\Vidalia |
|
| 816 |
+Bundle". |
|
| 662 | 817 |
</p> |
| 663 | 818 |
|
| 664 | 819 |
<p> |
| ... | ... |
@@ -667,24 +822,29 @@ certificate fingerprints for Tor's various websites?</a></h3> |
| 667 | 822 |
</p> |
| 668 | 823 |
|
| 669 | 824 |
<p> |
| 670 |
- If you installed by source, I'm afraid there is no easy uninstall method. But |
|
| 671 |
- on the bright side, by default it only installs into /usr/local/ and it should |
|
| 825 |
+ If you installed by source, I'm afraid there is no easy uninstall |
|
| 826 |
+method. But |
|
| 827 |
+ on the bright side, by default it only installs into /usr/local/ and |
|
| 828 |
+it should |
|
| 672 | 829 |
be pretty easy to notice things there. |
| 673 | 830 |
</p> |
| 674 | 831 |
|
| 675 | 832 |
<hr> |
| 676 | 833 |
|
| 677 | 834 |
<a id="PGPSigs"></a> |
| 678 |
- <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on the download page?</a></h3> |
|
| 835 |
+ <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on |
|
| 836 |
+the download page?</a></h3> |
|
| 679 | 837 |
|
| 680 | 838 |
<p> |
| 681 |
- These are PGP signatures, so you can verify that the file you've downloaded is |
|
| 839 |
+ These are PGP signatures, so you can verify that the file you've |
|
| 840 |
+downloaded is |
|
| 682 | 841 |
exactly the one that we intended you to get. |
| 683 | 842 |
</p> |
| 684 | 843 |
|
| 685 | 844 |
<p> |
| 686 | 845 |
Please read the <a |
| 687 |
- href="<page docs/verifying-signatures>">verifying signatures</a> page for details. |
|
| 846 |
+ href="<page docs/verifying-signatures>">verifying signatures</a> |
|
| 847 |
+page for details. |
|
| 688 | 848 |
</p> |
| 689 | 849 |
|
| 690 | 850 |
<hr> |
| ... | ... |
@@ -698,7 +858,8 @@ Some government or corporate firewalls censor connections to Tor's |
| 698 | 858 |
website. In those cases, you have three options. First, get it from |
| 699 | 859 |
a friend — the <a href="<page projects/torbrowser>">Tor Browser |
| 700 | 860 |
Bundle</a> fits nicely on a USB key. Second, find the <a |
| 701 |
-href="https://encrypted.google.com/search?q=tor+mirrors">google cache</a> |
|
| 861 |
+href="https://encrypted.google.com/search?q=tor+mirrors">google |
|
| 862 |
+cache</a> |
|
| 702 | 863 |
for the <a href="<page getinvolved/mirrors>">Tor mirrors</a> page |
| 703 | 864 |
and see if any of those copies of our website work for you. Third, |
| 704 | 865 |
you can download Tor via email: log in to your Gmail account and mail |
| ... | ... |
@@ -709,7 +870,8 @@ to receive very large attachments. |
| 709 | 870 |
</p> |
| 710 | 871 |
|
| 711 | 872 |
<p> |
| 712 |
-Be sure to <a href="<page docs/verifying-signatures>">verify the signature</a> |
|
| 873 |
+Be sure to <a href="<page docs/verifying-signatures>">verify the |
|
| 874 |
+signature</a> |
|
| 713 | 875 |
of any package you download, especially when you get it from somewhere |
| 714 | 876 |
other than our official HTTPS website. |
| 715 | 877 |
</p> |
| ... | ... |
@@ -717,57 +879,72 @@ other than our official HTTPS website. |
| 717 | 879 |
<hr> |
| 718 | 880 |
|
| 719 | 881 |
<a id="CompileTorWindows"></a> |
| 720 |
- <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor under Windows?</a></h3> |
|
| 882 |
+ <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor |
|
| 883 |
+under Windows?</a></h3> |
|
| 721 | 884 |
|
| 722 | 885 |
<p> |
| 723 |
- Try following the steps at <a href="<gitblob>doc/tor-win32-mingw-creation.txt"> |
|
| 886 |
+ Try following the steps at <a |
|
| 887 |
+href="<gitblob>doc/tor-win32-mingw-creation.txt"> |
|
| 724 | 888 |
tor-win32-mingw-creation.txt</a>. |
| 725 | 889 |
</p> |
| 726 | 890 |
|
| 727 | 891 |
<p> |
| 728 | 892 |
(Note that you don't need to compile Tor yourself in order to use |
| 729 |
- it. Most people just use the packages available on the <a href="<page |
|
| 893 |
+ it. Most people just use the packages available on the <a |
|
| 894 |
+href="<page |
|
| 730 | 895 |
download/download>">download page</a>.) |
| 731 | 896 |
</p> |
| 732 | 897 |
|
| 733 | 898 |
<hr> |
| 734 | 899 |
|
| 735 | 900 |
<a id="VirusFalsePositives"></a> |
| 736 |
- <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor executable appear to have a virus or spyware?</a></h3> |
|
| 901 |
+ <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor |
|
| 902 |
+executable appear to have a virus or spyware?</a></h3> |
|
| 737 | 903 |
|
| 738 | 904 |
<p> |
| 739 |
- Sometimes, overzealous Windows virus and spyware detectors trigger on some |
|
| 740 |
- parts of the Tor Windows binary. Our best guess is that these are false |
|
| 741 |
- positives — after all, the anti-virus and anti-spyware business is just a |
|
| 742 |
- guessing game anyway. You should contact your vendor and explain that you have |
|
| 743 |
- a program that seems to be triggering false positives. Or pick a better vendor. |
|
| 905 |
+ Sometimes, overzealous Windows virus and spyware detectors trigger |
|
| 906 |
+on some |
|
| 907 |
+ parts of the Tor Windows binary. Our best guess is that these are |
|
| 908 |
+false |
|
| 909 |
+ positives — after all, the anti-virus and anti-spyware |
|
| 910 |
+business is just a |
|
| 911 |
+ guessing game anyway. You should contact your vendor and explain |
|
| 912 |
+that you have |
|
| 913 |
+ a program that seems to be triggering false positives. Or pick a |
|
| 914 |
+better vendor. |
|
| 744 | 915 |
</p> |
| 745 | 916 |
|
| 746 | 917 |
<p> |
| 747 | 918 |
In the meantime, we encourage you to not just take our word for |
| 748 |
- it. Our job is to provide the source; if you're concerned, please do <a |
|
| 919 |
+ it. Our job is to provide the source; if you're concerned, please do |
|
| 920 |
+<a |
|
| 749 | 921 |
href="#CompileTorWindows">recompile it yourself</a>. |
| 750 | 922 |
</p> |
| 751 | 923 |
|
| 752 | 924 |
<hr> |
| 753 | 925 |
|
| 754 | 926 |
<a id="LiveCD"></a> |
| 755 |
- <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></h3> |
|
| 927 |
+ <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other |
|
| 928 |
+bundle that includes Tor?</a></h3> |
|
| 756 | 929 |
|
| 757 | 930 |
<p> |
| 758 | 931 |
Yes. Use <a href="https://tails.boum.org/">The Amnesic Incognito |
| 759 |
- Live System</a> or <a href="<page projects/torbrowser>">the Tor Browser |
|
| 932 |
+ Live System</a> or <a href="<page projects/torbrowser>">the Tor |
|
| 933 |
+Browser |
|
| 760 | 934 |
Bundle</a>. |
| 761 | 935 |
</p> |
| 762 | 936 |
|
| 763 | 937 |
<hr> |
| 764 | 938 |
|
| 765 | 939 |
<a id="TBBFlash"></a> |
| 766 |
-<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on YouTube |
|
| 940 |
+<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on |
|
| 941 |
+YouTube |
|
| 767 | 942 |
and other Flash-based sites?</a></h3> |
| 768 | 943 |
|
| 769 | 944 |
<p> |
| 770 |
-<a href="https://www.torproject.org/torbutton/torbutton-faq.html.en#noflash">Answer</a> |
|
| 945 |
+<a |
|
| 946 |
+href="https://www.torproject.org/torbutton/torbutton-faq.html. |
|
| 947 |
+en#noflash">Answer</a> |
|
| 771 | 948 |
</p> |
| 772 | 949 |
|
| 773 | 950 |
<hr> |
| ... | ... |
@@ -821,12 +998,11 @@ for OSX and Linux. |
| 821 | 998 |
|
| 822 | 999 |
<p> |
| 823 | 1000 |
If that fails, feel free to install <a |
| 824 |
-href="http://www.privoxy.org/">privoxy</a> or <a |
|
| 825 |
-href="https://archive.torproject.org/tor-package-archive/polipo/">polipo</a>. |
|
| 826 |
-You can use <a |
|
| 827 |
-href="https://gitweb.torproject.org/torbrowser.git/blob_plain/1ffcd9dafb9dd76c3a29dd686e05a71a95599fb5:/build-scripts/config/polipo.conf">our |
|
| 828 |
-old polipo config file</a> if you like. However, please realize that |
|
| 829 |
-this approach is not recommended for novice users. |
|
| 1001 |
+href="http://www.privoxy.org/">privoxy</a>. |
|
| 1002 |
+However, please realize that this approach is not recommended for novice |
|
| 1003 |
+users. Privoxy has an <a |
|
| 1004 |
+href="http://www.privoxy.org/faq/misc.html#TOR">example |
|
| 1005 |
+configuration</a> of Tor and Privoxy. |
|
| 830 | 1006 |
</p> |
| 831 | 1007 |
|
| 832 | 1008 |
<hr> |
| ... | ... |
@@ -837,7 +1013,8 @@ Firefox extensions?</a></h3> |
| 837 | 1013 |
|
| 838 | 1014 |
<p> |
| 839 | 1015 |
Yes. Just install them like normal. But be sure to avoid extensions like |
| 840 |
-Foxyproxy that screw up your proxy settings. Also, avoid privacy-invasive |
|
| 1016 |
+Foxyproxy that screw up your proxy settings. Also, avoid |
|
| 1017 |
+privacy-invasive |
|
| 841 | 1018 |
extensions (for example, pretty much anything with the word Toolbar in |
| 842 | 1019 |
its name). |
| 843 | 1020 |
</p> |
| ... | ... |
@@ -845,7 +1022,9 @@ its name). |
| 845 | 1022 |
<hr> |
| 846 | 1023 |
|
| 847 | 1024 |
<a id="TBBJavaScriptEnabled"></a> |
| 848 |
-<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle? Isn't that unsafe?</a></h3> |
|
| 1025 |
+<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript |
|
| 1026 |
+configured to allow JavaScript by default in the Tor Browser Bundle? |
|
| 1027 |
+Isn't that unsafe?</a></h3> |
|
| 849 | 1028 |
|
| 850 | 1029 |
<p> |
| 851 | 1030 |
We configure NoScript to allow JavaScript by default in the Tor |
| ... | ... |
@@ -859,7 +1038,8 @@ JavaScript might make a website work). |
| 859 | 1038 |
<hr> |
| 860 | 1039 |
|
| 861 | 1040 |
<a id="TBBCanIBlockJS"></a> |
| 862 |
-<h3><a class="anchor" href="#CanIBlockJS">I'm an expert! (No, really!) Can I configure NoScript to block JavaScript by default?</a></h3> |
|
| 1041 |
+<h3><a class="anchor" href="#CanIBlockJS">I'm an expert! (No, really!) |
|
| 1042 |
+Can I configure NoScript to block JavaScript by default?</a></h3> |
|
| 863 | 1043 |
|
| 864 | 1044 |
<p> |
| 865 | 1045 |
You can configure your copies of Tor Browser Bundle however you want |
| ... | ... |
@@ -887,22 +1067,27 @@ Chrome/IE/Opera/etc with Tor.</a></h3> |
| 887 | 1067 |
Unfortunately, Torbutton only works with Firefox right now, and without |
| 888 | 1068 |
<a href="https://www.torproject.org/torbutton/en/design/">Torbutton's |
| 889 | 1069 |
extensive privacy fixes</a> there are many ways for websites or other |
| 890 |
-attackers to recognize you, track you back to your IP address, and so on. |
|
| 1070 |
+attackers to recognize you, track you back to your IP address, and so |
|
| 1071 |
+on. |
|
| 891 | 1072 |
In short, using any browser besides Tor Browser Bundle with Tor is a |
| 892 | 1073 |
really bad idea. |
| 893 | 1074 |
</p> |
| 894 | 1075 |
|
| 895 | 1076 |
<p> |
| 896 | 1077 |
We're working with the Chrome team to <a |
| 897 |
-href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">fix |
|
| 898 |
-some bugs and missing APIs in Chrome</a> so it will be possible to write a |
|
| 899 |
-Torbutton for Chrome. No support for any other browser is on the horizon. |
|
| 1078 |
+href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor- |
|
| 1079 |
+and-fingerprinting">fix |
|
| 1080 |
+some bugs and missing APIs in Chrome</a> so it will be possible to write |
|
| 1081 |
+a |
|
| 1082 |
+Torbutton for Chrome. No support for any other browser is on the |
|
| 1083 |
+horizon. |
|
| 900 | 1084 |
</p> |
| 901 | 1085 |
|
| 902 | 1086 |
<hr> |
| 903 | 1087 |
|
| 904 | 1088 |
<a id="TBBCloseBrowser"></a> |
| 905 |
-<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor Browser |
|
| 1089 |
+<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor |
|
| 1090 |
+Browser |
|
| 906 | 1091 |
Bundle running but close the browser.</a></h3> |
| 907 | 1092 |
|
| 908 | 1093 |
<p> |
| ... | ... |
@@ -913,7 +1098,8 @@ be patient. |
| 913 | 1098 |
<hr> |
| 914 | 1099 |
|
| 915 | 1100 |
<a id="GoogleCaptcha"></a> |
| 916 |
-<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
| 1101 |
+<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a |
|
| 1102 |
+Captcha or tells me I have spyware installed.</a></h3> |
|
| 917 | 1103 |
|
| 918 | 1104 |
<p> |
| 919 | 1105 |
This is a known and intermittent problem; it does not mean that Google |
| ... | ... |
@@ -921,9 +1107,11 @@ considers Tor to be spyware. |
| 921 | 1107 |
</p> |
| 922 | 1108 |
|
| 923 | 1109 |
<p> |
| 924 |
-When you use Tor, you are sending queries through exit relays that are also |
|
| 1110 |
+When you use Tor, you are sending queries through exit relays that are |
|
| 1111 |
+also |
|
| 925 | 1112 |
shared by thousands of other users. Tor users typically see this message |
| 926 |
-when many Tor users are querying Google in a short period of time. Google |
|
| 1113 |
+when many Tor users are querying Google in a short period of time. |
|
| 1114 |
|
|
| 927 | 1115 |
interprets the high volume of traffic from a single IP address (the exit |
| 928 | 1116 |
relay you happened to pick) as somebody trying to "crawl" their website, |
| 929 | 1117 |
so it slows down traffic from that IP address for a short time. |
| ... | ... |
@@ -938,7 +1126,8 @@ an infection. |
| 938 | 1126 |
</p> |
| 939 | 1127 |
|
| 940 | 1128 |
<p> |
| 941 |
-To our knowledge, Google is not doing anything intentionally specifically |
|
| 1129 |
+To our knowledge, Google is not doing anything intentionally |
|
| 1130 |
+specifically |
|
| 942 | 1131 |
to deter or block Tor use. The error message about an infected machine |
| 943 | 1132 |
should clear up again after a short time. |
| 944 | 1133 |
</p> |
| ... | ... |
@@ -952,7 +1141,8 @@ DuckDuckGo, ixquick, or Bing. |
| 952 | 1141 |
<hr /> |
| 953 | 1142 |
|
| 954 | 1143 |
<a id="GmailWarning"></a> |
| 955 |
-<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account |
|
| 1144 |
+<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my |
|
| 1145 |
+account |
|
| 956 | 1146 |
may have been compromised.</a></h3> |
| 957 | 1147 |
|
| 958 | 1148 |
<p> |
| ... | ... |
@@ -964,7 +1154,8 @@ throughout the world recently used to access your account. |
| 964 | 1154 |
|
| 965 | 1155 |
<p> |
| 966 | 1156 |
In general this is a false alarm: Google saw a bunch of logins from |
| 967 |
-different places, as a result of running the service via Tor, and decided |
|
| 1157 |
+different places, as a result of running the service via Tor, and |
|
| 1158 |
+decided |
|
| 968 | 1159 |
it was a good idea to confirm the account was being accessed by it's |
| 969 | 1160 |
rightful owner. |
| 970 | 1161 |
</p> |
| ... | ... |
@@ -981,7 +1172,8 @@ Cookie hijacking is possible by either physical access to your computer |
| 981 | 1172 |
or by watching your network traffic. In theory only physical access |
| 982 | 1173 |
should compromise your system because Gmail and similar services |
| 983 | 1174 |
should only send the cookie over an SSL link. In practice, alas, it's <a |
| 984 |
-href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
| 1175 |
+href="http://fscked.org/blog/fully-automated-active-https-cookie- |
|
| 1176 |
+hijacking"> |
|
| 985 | 1177 |
way more complex than that</a>. |
| 986 | 1178 |
</p> |
| 987 | 1179 |
|
| ... | ... |
@@ -998,7 +1190,8 @@ recent logins and wondering if you actually logged in at those times. |
| 998 | 1190 |
<hr> |
| 999 | 1191 |
|
| 1000 | 1192 |
<a id="torrc"></a> |
| 1001 |
-<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". What does that mean?</a></h3> |
|
| 1193 |
+<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". |
|
| 1194 |
+What does that mean?</a></h3> |
|
| 1002 | 1195 |
|
| 1003 | 1196 |
<p> |
| 1004 | 1197 |
Tor installs a text file called torrc that contains configuration |
| ... | ... |
@@ -1008,8 +1201,10 @@ make common changes through the Vidalia interface — only advanced |
| 1008 | 1201 |
users should need to modify their torrc file directly. |
| 1009 | 1202 |
</p> |
| 1010 | 1203 |
<p> |
| 1011 |
-Tor Browser Bundle users should edit your torrc through Vidalia. Open the |
|
| 1012 |
-Vidalia Control Panel. Choose Settings. Choose Advanced. Click the button |
|
| 1204 |
+Tor Browser Bundle users should edit your torrc through Vidalia. Open |
|
| 1205 |
+the |
|
| 1206 |
+Vidalia Control Panel. Choose Settings. Choose Advanced. Click the |
|
| 1207 |
+button |
|
| 1013 | 1208 |
labelled "Edit current torrc". Remember to make sure the checkbox for |
| 1014 | 1209 |
"Save Settings." is checked. Hit the Ok button and you are done. |
| 1015 | 1210 |
</p> |
| ... | ... |
@@ -1040,19 +1235,22 @@ package's documentation. |
| 1040 | 1235 |
</li> |
| 1041 | 1236 |
<li>Finally, if you installed from source, you may not have a torrc |
| 1042 | 1237 |
installed yet: look in <code>/usr/local/etc/</code> and note that you |
| 1043 |
-may need to manually copy <code>torrc.sample</code> to <code>torrc</code>. |
|
| 1238 |
+may need to manually copy <code>torrc.sample</code> to |
|
| 1239 |
+<code>torrc</code>. |
|
| 1044 | 1240 |
</li> |
| 1045 | 1241 |
</ul> |
| 1046 | 1242 |
|
| 1047 | 1243 |
<p> |
| 1048 | 1244 |
If you use Vidalia, be sure to exit both Tor and Vidalia before you edit |
| 1049 |
-your torrc file manually. Otherwise Vidalia might overwrite your changes. |
|
| 1245 |
+your torrc file manually. Otherwise Vidalia might overwrite your |
|
| 1246 |
+changes. |
|
| 1050 | 1247 |
</p> |
| 1051 | 1248 |
|
| 1052 | 1249 |
<p> |
| 1053 | 1250 |
Once you've changed your torrc, you will need to restart Tor for the |
| 1054 | 1251 |
changes to take effect. (For advanced users on OS X and Unix, note that |
| 1055 |
-you actually only need to send Tor a HUP signal, not actually restart it.) |
|
| 1252 |
+you actually only need to send Tor a HUP signal, not actually restart |
|
| 1253 |
+it.) |
|
| 1056 | 1254 |
</p> |
| 1057 | 1255 |
|
| 1058 | 1256 |
<p> |
| ... | ... |
@@ -1065,7 +1263,8 @@ configuration. |
| 1065 | 1263 |
<hr> |
| 1066 | 1264 |
|
| 1067 | 1265 |
<a id="Logs"></a> |
| 1068 |
-<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's logs?</a></h3> |
|
| 1266 |
+<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's |
|
| 1267 |
+logs?</a></h3> |
|
| 1069 | 1268 |
|
| 1070 | 1269 |
<p> |
| 1071 | 1270 |
If you installed a Tor bundle that includes Vidalia, then Vidalia has a |
| ... | ... |
@@ -1094,7 +1293,8 @@ default to <code>/usr/local/var/log/tor/</code>. |
| 1094 | 1293 |
</ul> |
| 1095 | 1294 |
|
| 1096 | 1295 |
<p> |
| 1097 |
-To change your logging setup by hand, <a href="#torrc">edit your torrc</a> |
|
| 1296 |
+To change your logging setup by hand, <a href="#torrc">edit your |
|
| 1297 |
+torrc</a> |
|
| 1098 | 1298 |
and find the section (near the top of the file) which contains the |
| 1099 | 1299 |
following line: |
| 1100 | 1300 |
</p> |
| ... | ... |
@@ -1122,7 +1322,8 @@ and filename for your Tor log. |
| 1122 | 1322 |
<hr> |
| 1123 | 1323 |
|
| 1124 | 1324 |
<a id="DoesntWork"></a> |
| 1125 |
-<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not working.</a></h3> |
|
| 1325 |
+<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not |
|
| 1326 |
+working.</a></h3> |
|
| 1126 | 1327 |
|
| 1127 | 1328 |
<p> |
| 1128 | 1329 |
Once you've got the Tor bundle up and running, the first question to |
| ... | ... |
@@ -1130,8 +1331,10 @@ ask is whether your Tor client is able to establish a circuit. |
| 1130 | 1331 |
</p> |
| 1131 | 1332 |
|
| 1132 | 1333 |
<p>If Tor can establish a circuit, the onion icon in |
| 1133 |
-Vidalia will turn green (and if you're running Tor Browser Bundle, it will |
|
| 1134 |
-automatically launch a browser for you). You can also check in the Vidalia |
|
| 1334 |
+Vidalia will turn green (and if you're running Tor Browser Bundle, it |
|
| 1335 |
+will |
|
| 1336 |
+automatically launch a browser for you). You can also check in the |
|
| 1337 |
+Vidalia |
|
| 1135 | 1338 |
Control Panel to make sure it says "Connected to the Tor |
| 1136 | 1339 |
network!" under Status. For those not using Vidalia, check your <a |
| 1137 | 1340 |
href="#Logs">Tor logs</a> for |
| ... | ... |
@@ -1153,9 +1356,11 @@ day and date under the 'Date & Time' Tab. Also make sure your time |
| 1153 | 1356 |
zone is correct.</li> |
| 1154 | 1357 |
<li>Is your Internet connection <a href="#FirewallPorts">firewalled |
| 1155 | 1358 |
by port</a>, or do you normally need to use a <a |
| 1156 |
-href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</a>? |
|
| 1359 |
+href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</ |
|
| 1360 |
+a>? |
|
| 1157 | 1361 |
</li> |
| 1158 |
-<li>Are you running programs like Norton Internet Security or SELinux that |
|
| 1362 |
+<li>Are you running programs like Norton Internet Security or SELinux |
|
| 1363 |
+that |
|
| 1159 | 1364 |
block certain connections, even though you don't realize they do? They |
| 1160 | 1365 |
could be preventing Tor from making network connections.</li> |
| 1161 | 1366 |
<li>Are you in China, or behind a restrictive corporate network firewall |
| ... | ... |
@@ -1168,7 +1373,8 @@ about what's going wrong?</li> |
| 1168 | 1373 |
<hr /> |
| 1169 | 1374 |
|
| 1170 | 1375 |
<a id="VidaliaPassword"></a> |
| 1171 |
-<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a password at start.</a></h3> |
|
| 1376 |
+<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a |
|
| 1377 |
+password at start.</a></h3> |
|
| 1172 | 1378 |
|
| 1173 | 1379 |
<p> |
| 1174 | 1380 |
Vidalia interacts with the Tor software via Tor's "control port". The |
| ... | ... |
@@ -1193,9 +1399,11 @@ Vidalia and Tor before you can run this one. |
| 1193 | 1399 |
</li> |
| 1194 | 1400 |
<li>Vidalia crashed, but left Tor running with the last known random |
| 1195 | 1401 |
password. After you restart Vidalia, it generates a new random password, |
| 1196 |
-but Vidalia can't talk to Tor, because the random passwords are different. |
|
| 1402 |
+but Vidalia can't talk to Tor, because the random passwords are |
|
| 1403 |
+different. |
|
| 1197 | 1404 |
<br /> |
| 1198 |
-If the dialog that prompts you for a control password has a Reset button, |
|
| 1405 |
+If the dialog that prompts you for a control password has a Reset |
|
| 1406 |
+button, |
|
| 1199 | 1407 |
you can click the button and Vidalia will restart Tor with a new random |
| 1200 | 1408 |
control password. |
| 1201 | 1409 |
<br /> |
| ... | ... |
@@ -1214,7 +1422,8 @@ talk to the already running Tor. Vidalia generates a random password, |
| 1214 | 1422 |
but it is different than the saved password in the Tor service. |
| 1215 | 1423 |
<br /> |
| 1216 | 1424 |
You need to reconfigure Tor to not be a service. See the FAQ entry on |
| 1217 |
-<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a Windows NT service</a> |
|
| 1425 |
+<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a |
|
| 1426 |
+Windows NT service</a> |
|
| 1218 | 1427 |
for more information on how to remove the Tor service. |
| 1219 | 1428 |
</li> |
| 1220 | 1429 |
</ol> |
| ... | ... |
@@ -1222,7 +1431,8 @@ for more information on how to remove the Tor service. |
| 1222 | 1431 |
<hr> |
| 1223 | 1432 |
|
| 1224 | 1433 |
<a id="ChooseEntryExit"></a> |
| 1225 |
- <h3><a class="anchor" href="#ChooseEntryExit">Can I control which nodes (or country) are used for entry/exit?</a></h3> |
|
| 1434 |
+ <h3><a class="anchor" href="#ChooseEntryExit">Can I control which |
|
| 1435 |
+nodes (or country) are used for entry/exit?</a></h3> |
|
| 1226 | 1436 |
|
| 1227 | 1437 |
<p> |
| 1228 | 1438 |
Yes. You can set preferred entry and exit nodes as well as |
| ... | ... |
@@ -1232,22 +1442,26 @@ for more information on how to remove the Tor service. |
| 1232 | 1442 |
</p> |
| 1233 | 1443 |
<dl> |
| 1234 | 1444 |
<dt><tt>EntryNodes $fingerprint,$fingerprint,...</tt></dt> |
| 1235 |
- <dd>A list of preferred nodes to use for the first hop in the circuit, if possible. |
|
| 1445 |
+ <dd>A list of preferred nodes to use for the first hop in the |
|
| 1446 |
+circuit, if possible. |
|
| 1236 | 1447 |
</dd> |
| 1237 | 1448 |
<dt><tt>ExitNodes $fingerprint,$fingerprint,...</tt></dt> |
| 1238 |
- <dd>A list of preferred nodes to use for the last hop in the circuit, if possible. |
|
| 1449 |
+ <dd>A list of preferred nodes to use for the last hop in the |
|
| 1450 |
+circuit, if possible. |
|
| 1239 | 1451 |
</dd> |
| 1240 | 1452 |
<dt><tt>ExcludeNodes $fingerprint,$fingerprint,...</tt></dt> |
| 1241 | 1453 |
<dd>A list of nodes to never use when building a circuit. |
| 1242 | 1454 |
</dd> |
| 1243 | 1455 |
<dt><tt>ExcludeExitNodes $fingerprint,$fingerprint,...</tt></dt> |
| 1244 | 1456 |
<dd>A list of nodes to never use when picking an exit. |
| 1245 |
- Nodes listed in <tt>ExcludeNodes</tt> are automatically in this list. |
|
| 1457 |
+ Nodes listed in <tt>ExcludeNodes</tt> are automatically in |
|
| 1458 |
+this list. |
|
| 1246 | 1459 |
</dd> |
| 1247 | 1460 |
</dl> |
| 1248 | 1461 |
<p> |
| 1249 | 1462 |
<em>We recommend you do not use these</em> |
| 1250 |
- — they are intended for testing and may disappear in future versions. |
|
| 1463 |
+ — they are intended for testing and may disappear in future |
|
| 1464 |
+versions. |
|
| 1251 | 1465 |
You get the best security that Tor can provide when you leave the |
| 1252 | 1466 |
route selection to Tor; overriding the entry / exit nodes can mess |
| 1253 | 1467 |
up your anonymity in ways we don't understand. |
| ... | ... |
@@ -1259,32 +1473,39 @@ for more information on how to remove the Tor service. |
| 1259 | 1473 |
setting <tt>StrictExitNodes 1</tt> or <tt>StrictEntryNodes 1</tt> |
| 1260 | 1474 |
— but if you do, your Tor connections will stop working |
| 1261 | 1475 |
if all of the nodes you have specified become unreachable. |
| 1262 |
- See the <a href="<page docs/documentation>#NeatLinks">Tor status pages</a> |
|
| 1476 |
+ See the <a href="<page docs/documentation>#NeatLinks">Tor status |
|
| 1477 |
+pages</a> |
|
| 1263 | 1478 |
for some nodes you might pick. |
| 1264 | 1479 |
</p> |
| 1265 | 1480 |
<p> |
| 1266 | 1481 |
Instead of <tt>$fingerprint</tt> you can also specify a <a |
| 1267 |
- href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2">2 |
|
| 1482 |
+ |
|
| 1483 |
+href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2" |
|
| 1484 |
+>2 |
|
| 1268 | 1485 |
letter ISO3166 country code</a> in curly braces (for example {de}),
|
| 1269 | 1486 |
or an ip address pattern (for example 255.254.0.0/8), or a node |
| 1270 | 1487 |
nickname. Make sure there are no spaces between the commas and the |
| 1271 | 1488 |
list items. |
| 1272 | 1489 |
</p> |
| 1273 | 1490 |
<p> |
| 1274 |
- If you want to access a service directly through Tor's Socks interface |
|
| 1491 |
+ If you want to access a service directly through Tor's Socks |
|
| 1492 |
+interface |
|
| 1275 | 1493 |
(eg. using ssh via connect.c), another option is to set up an |
| 1276 |
- internal mapping in your configuration file using <tt>MapAddress</tt>. |
|
| 1494 |
+ internal mapping in your configuration file using |
|
| 1495 |
+<tt>MapAddress</tt>. |
|
| 1277 | 1496 |
See the manual page for details. |
| 1278 | 1497 |
</p> |
| 1279 | 1498 |
|
| 1280 | 1499 |
<hr> |
| 1281 | 1500 |
|
| 1282 | 1501 |
<a id="FirewallPorts"></a> |
| 1283 |
-<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a few outgoing ports.</a></h3> |
|
| 1502 |
+<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a |
|
| 1503 |
+few outgoing ports.</a></h3> |
|
| 1284 | 1504 |
|
| 1285 | 1505 |
<p> |
| 1286 | 1506 |
If your firewall works by blocking ports, then you can tell Tor to only |
| 1287 |
-use the ports that your firewall permits by adding "FascistFirewall 1" to |
|
| 1507 |
+use the ports that your firewall permits by adding "FascistFirewall 1" |
|
| 1508 |
+to |
|
| 1288 | 1509 |
your <a href="<page docs/faq>#torrc">torrc |
| 1289 | 1510 |
configuration file</a>, or by clicking "My firewall only lets me connect |
| 1290 | 1511 |
to certain ports" in Vidalia's Network Settings window. |
| ... | ... |
@@ -1309,7 +1530,8 @@ use the ReachableAddresses config options, e.g.: |
| 1309 | 1530 |
<hr> |
| 1310 | 1531 |
|
| 1311 | 1532 |
<a id="RelayFlexible"></a> |
| 1312 |
- <h3><a class="anchor" href="#RelayFlexible">How stable does my relay need to be?</a></h3> |
|
| 1533 |
+ <h3><a class="anchor" href="#RelayFlexible">How stable does my relay |
|
| 1534 |
+need to be?</a></h3> |
|
| 1313 | 1535 |
|
| 1314 | 1536 |
<p> |
| 1315 | 1537 |
We aim to make setting up a Tor relay easy and convenient: |
| ... | ... |
@@ -1321,13 +1543,19 @@ use the ReachableAddresses config options, e.g.: |
| 1321 | 1543 |
rate limiting</a>. Further, if you have a fast |
| 1322 | 1544 |
link but want to limit the number of bytes per |
| 1323 | 1545 |
day (or week or month) that you donate, check out the <a |
| 1324 |
- href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">hibernation |
|
| 1546 |
+ |
|
| 1547 |
+href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay"> |
|
| 1548 |
+hibernation |
|
| 1325 | 1549 |
feature</a>. |
| 1326 | 1550 |
</li> |
| 1327 |
- <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> that |
|
| 1328 |
- specifies what sort of outbound connections are allowed or refused from |
|
| 1329 |
- that relay. If you are uncomfortable allowing people to exit from your |
|
| 1330 |
- relay, you can set it up to only allow connections to other Tor relays. |
|
| 1551 |
+ <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> |
|
| 1552 |
+that |
|
| 1553 |
+ specifies what sort of outbound connections are allowed or refused |
|
| 1554 |
+from |
|
| 1555 |
+ that relay. If you are uncomfortable allowing people to exit from |
|
| 1556 |
+your |
|
| 1557 |
+ relay, you can set it up to only allow connections to other Tor |
|
| 1558 |
+relays. |
|
| 1331 | 1559 |
</li> |
| 1332 | 1560 |
<li>It's fine if the relay goes offline sometimes. The directories |
| 1333 | 1561 |
notice this quickly and stop advertising the relay. Just try to make |
| ... | ... |
@@ -1344,8 +1572,10 @@ use the ReachableAddresses config options, e.g.: |
| 1344 | 1572 |
offers some examples on how to do this. |
| 1345 | 1573 |
</li> |
| 1346 | 1574 |
<li>Your relay will passively estimate and advertise its recent |
| 1347 |
- bandwidth capacity, so high-bandwidth relays will attract more users than |
|
| 1348 |
- low-bandwidth ones. Therefore having low-bandwidth relays is useful too. |
|
| 1575 |
+ bandwidth capacity, so high-bandwidth relays will attract more users |
|
| 1576 |
+than |
|
| 1577 |
+ low-bandwidth ones. Therefore having low-bandwidth relays is useful |
|
| 1578 |
+too. |
|
| 1349 | 1579 |
</li> |
| 1350 | 1580 |
</ul> |
| 1351 | 1581 |
|
| ... | ... |
@@ -1353,7 +1583,8 @@ use the ReachableAddresses config options, e.g.: |
| 1353 | 1583 |
|
| 1354 | 1584 |
<a id="RunARelayBut"></a> |
| 1355 | 1585 |
<a id="ExitPolicies"></a> |
| 1356 |
- <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I don't want to deal with abuse issues.</a></h3> |
|
| 1586 |
+ <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I |
|
| 1587 |
+don't want to deal with abuse issues.</a></h3> |
|
| 1357 | 1588 |
|
| 1358 | 1589 |
<p> |
| 1359 | 1590 |
Great. That's exactly why we implemented exit policies. |
| ... | ... |
@@ -1361,13 +1592,16 @@ use the ReachableAddresses config options, e.g.: |
| 1361 | 1592 |
|
| 1362 | 1593 |
<p> |
| 1363 | 1594 |
Each Tor relay has an exit policy that specifies what sort of |
| 1364 |
- outbound connections are allowed or refused from that relay. The exit |
|
| 1595 |
+ outbound connections are allowed or refused from that relay. The |
|
| 1596 |
+exit |
|
| 1365 | 1597 |
policies are propagated to Tor clients via the directory, so clients |
| 1366 | 1598 |
will automatically avoid picking exit relays that would refuse to |
| 1367 | 1599 |
exit to their intended destination. This way each relay can decide |
| 1368 | 1600 |
the services, hosts, and networks he wants to allow connections to, |
| 1369 |
- based on abuse potential and his own situation. Read the FAQ entry on |
|
| 1370 |
- <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might encounter</a> |
|
| 1601 |
+ based on abuse potential and his own situation. Read the FAQ entry |
|
| 1602 |
+on |
|
| 1603 |
+ <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might |
|
| 1604 |
+encounter</a> |
|
| 1371 | 1605 |
if you use the default exit policy, and then read Mike Perry's |
| 1372 | 1606 |
<a href="<blog>tips-running-exit-node-minimal-harassment">tips |
| 1373 | 1607 |
for running an exit node with minimal harassment</a>. |
| ... | ... |
@@ -1375,36 +1609,47 @@ use the ReachableAddresses config options, e.g.: |
| 1375 | 1609 |
|
| 1376 | 1610 |
<p> |
| 1377 | 1611 |
The default exit policy allows access to many popular services |
| 1378 |
- (e.g. web browsing), but <a href="<wikifaq>#Istherealistofdefaultexitports">restricts</a> |
|
| 1612 |
+ (e.g. web browsing), but <a |
|
| 1613 |
+href="<wikifaq>#Istherealistofdefaultexitports">restricts</a> |
|
| 1379 | 1614 |
some due to abuse potential (e.g. mail) and some since |
| 1380 | 1615 |
the Tor network can't handle the load (e.g. default |
| 1381 | 1616 |
file-sharing ports). You can change your exit policy |
| 1382 | 1617 |
using Vidalia's "Sharing" tab, or by manually editing your |
| 1383 | 1618 |
<a href="<page docs/faq>#torrc">torrc</a> |
| 1384 |
- file. If you want to avoid most if not all abuse potential, set it to |
|
| 1385 |
- "reject *:*" (or un-check all the boxes in Vidalia). This setting means |
|
| 1386 |
- that your relay will be used for relaying traffic inside the Tor network, |
|
| 1619 |
+ file. If you want to avoid most if not all abuse potential, set it |
|
| 1620 |
+to |
|
| 1621 |
+ "reject *:*" (or un-check all the boxes in Vidalia). This setting |
|
| 1622 |
+means |
|
| 1623 |
+ that your relay will be used for relaying traffic inside the Tor |
|
| 1624 |
+network, |
|
| 1387 | 1625 |
but not for connections to external websites or other services. |
| 1388 | 1626 |
</p> |
| 1389 | 1627 |
|
| 1390 | 1628 |
<p> |
| 1391 |
- If you do allow any exit connections, make sure name resolution works |
|
| 1629 |
+ If you do allow any exit connections, make sure name resolution |
|
| 1630 |
+works |
|
| 1392 | 1631 |
(that is, your computer can resolve Internet addresses correctly). |
| 1393 |
- If there are any resources that your computer can't reach (for example, |
|
| 1632 |
+ If there are any resources that your computer can't reach (for |
|
| 1633 |
+example, |
|
| 1394 | 1634 |
you are behind a restrictive firewall or content filter), please |
| 1395 |
- explicitly reject them in your exit policy — otherwise Tor users |
|
| 1635 |
+ explicitly reject them in your exit policy — otherwise Tor |
|
| 1636 |
+users |
|
| 1396 | 1637 |
will be impacted too. |
| 1397 | 1638 |
</p> |
| 1398 | 1639 |
|
| 1399 | 1640 |
<hr> |
| 1400 | 1641 |
|
| 1401 | 1642 |
<a id="RelayOrBridge"></a> |
| 1402 |
- <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal relay or bridge relay?</a></h3> |
|
| 1643 |
+ <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal |
|
| 1644 |
+relay or bridge relay?</a></h3> |
|
| 1403 | 1645 |
|
| 1404 |
- <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for short) |
|
| 1405 |
- are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't listed |
|
| 1646 |
+ <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for |
|
| 1647 |
+short) |
|
| 1648 |
+ are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't |
|
| 1649 |
+listed |
|
| 1406 | 1650 |
in the main Tor directory. That means |
| 1407 |
- that even an ISP or government trying to filter connections to the Tor |
|
| 1651 |
+ that even an ISP or government trying to filter connections to the |
|
| 1652 |
+Tor |
|
| 1408 | 1653 |
network probably won't be able to block all the bridges. |
| 1409 | 1654 |
</p> |
| 1410 | 1655 |
|
| ... | ... |
@@ -1414,14 +1659,17 @@ use the ReachableAddresses config options, e.g.: |
| 1414 | 1659 |
</p> |
| 1415 | 1660 |
|
| 1416 | 1661 |
<p>Right now, China is the main place in the world that filters |
| 1417 |
- connections to the Tor network. So bridges are useful a) for users in |
|
| 1418 |
- China, b) as a backup measure in case the Tor network gets blocked in |
|
| 1662 |
+ connections to the Tor network. So bridges are useful a) for users |
|
| 1663 |
+in |
|
| 1664 |
+ China, b) as a backup measure in case the Tor network gets blocked |
|
| 1665 |
+in |
|
| 1419 | 1666 |
more places, and c) for people who want an extra layer of security |
| 1420 | 1667 |
because they're worried somebody will recognize that it's a public |
| 1421 | 1668 |
Tor relay IP address they're contacting. |
| 1422 | 1669 |
</p> |
| 1423 | 1670 |
|
| 1424 |
- <p>So should you run a normal relay or bridge relay? If you have lots |
|
| 1671 |
+ <p>So should you run a normal relay or bridge relay? If you have |
|
| 1672 |
+lots |
|
| 1425 | 1673 |
of bandwidth, you should definitely run a normal relay — the |
| 1426 | 1674 |
average bridge doesn't see much load these days. If you're willing |
| 1427 | 1675 |
to <a href="#ExitPolicies">be an exit</a>, you should definitely |
| ... | ... |
@@ -1433,7 +1681,8 @@ use the ReachableAddresses config options, e.g.: |
| 1433 | 1681 |
<hr> |
| 1434 | 1682 |
|
| 1435 | 1683 |
<a id="MultipleRelays"></a> |
| 1436 |
-<h3><a class="anchor" href="#MultipleRelays">I want to run more than one relay.</a></h3> |
|
| 1684 |
+<h3><a class="anchor" href="#MultipleRelays">I want to run more than one |
|
| 1685 |
+relay.</a></h3> |
|
| 1437 | 1686 |
|
| 1438 | 1687 |
<p> |
| 1439 | 1688 |
Great. If you want to run several relays to donate more to the network, |
| ... | ... |
@@ -1454,7 +1703,8 @@ all the relays (comma-separated) that are under your control: |
| 1454 | 1703 |
|
| 1455 | 1704 |
<p> |
| 1456 | 1705 |
where each fingerprint is the 40 character identity fingerprint (without |
| 1457 |
-spaces). You can also list them by nickname, but fingerprint is safer. Be |
|
| 1706 |
+spaces). You can also list them by nickname, but fingerprint is safer. |
|
| 1707 |
+Be |
|
| 1458 | 1708 |
sure to prefix the digest strings with a dollar sign ('$') so that the
|
| 1459 | 1709 |
digest is not confused with a nickname in the config file. |
| 1460 | 1710 |
</p> |
| ... | ... |
@@ -1469,27 +1719,38 @@ the same geographic location. |
| 1469 | 1719 |
<hr> |
| 1470 | 1720 |
|
| 1471 | 1721 |
<a id="RelayMemory"></a> |
| 1472 |
- <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using so much memory?</a></h3> |
|
| 1722 |
+ <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using |
|
| 1723 |
+so much memory?</a></h3> |
|
| 1473 | 1724 |
|
| 1474 |
- <p>If your Tor relay is using more memory than you'd like, here are some |
|
| 1725 |
+ <p>If your Tor relay is using more memory than you'd like, here are |
|
| 1726 |
+some |
|
| 1475 | 1727 |
tips for reducing its footprint: |
| 1476 | 1728 |
</p> |
| 1477 | 1729 |
|
| 1478 | 1730 |
<ol> |
| 1479 | 1731 |
<li>If you're on Linux, you may be encountering memory fragmentation |
| 1480 |
- bugs in glibc's malloc implementation. That is, when Tor releases memory |
|
| 1481 |
- back to the system, the pieces of memory are fragmented so they're hard |
|
| 1482 |
- to reuse. The Tor tarball ships with OpenBSD's malloc implementation, |
|
| 1483 |
- which doesn't have as many fragmentation bugs (but the tradeoff is higher |
|
| 1484 |
- CPU load). You can tell Tor to use this malloc implementation instead: |
|
| 1732 |
+ bugs in glibc's malloc implementation. That is, when Tor releases |
|
| 1733 |
+memory |
|
| 1734 |
+ back to the system, the pieces of memory are fragmented so they're |
|
| 1735 |
+hard |
|
| 1736 |
+ to reuse. The Tor tarball ships with OpenBSD's malloc |
|
| 1737 |
+implementation, |
|
| 1738 |
+ which doesn't have as many fragmentation bugs (but the tradeoff is |
|
| 1739 |
+higher |
|
| 1740 |
+ CPU load). You can tell Tor to use this malloc implementation |
|
| 1741 |
+instead: |
|
| 1485 | 1742 |
<tt>./configure --enable-openbsd-malloc</tt></li> |
| 1486 | 1743 |
|
| 1487 |
- <li>If you're running a fast relay, meaning you have many TLS connections |
|
| 1744 |
+ <li>If you're running a fast relay, meaning you have many TLS |
|
| 1745 |
+connections |
|
| 1488 | 1746 |
open, you are probably losing a lot of memory to OpenSSL's internal |
| 1489 | 1747 |
buffers (38KB+ per socket). We've patched OpenSSL to <a |
| 1490 |
- href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519.html">release |
|
| 1748 |
+ |
|
| 1749 |
+href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519. |
|
| 1750 |
+html">release |
|
| 1491 | 1751 |
unused buffer memory more aggressively</a>. If you update to OpenSSL |
| 1492 |
- 1.0.0 or newer, Tor's build process will automatically recognize and use |
|
| 1752 |
+ 1.0.0 or newer, Tor's build process will automatically recognize and |
|
| 1753 |
+use |
|
| 1493 | 1754 |
this feature.</li> |
| 1494 | 1755 |
|
| 1495 | 1756 |
<li>If you're running on Solaris, OpenBSD, NetBSD, or |
| ... | ... |
@@ -1499,7 +1760,8 @@ the same geographic location. |
| 1499 | 1760 |
operating system</a>.</li> |
| 1500 | 1761 |
|
| 1501 | 1762 |
<li>If you still can't handle the memory load, consider reducing the |
| 1502 |
- amount of bandwidth your relay advertises. Advertising less bandwidth |
|
| 1763 |
+ amount of bandwidth your relay advertises. Advertising less |
|
| 1764 |
+bandwidth |
|
| 1503 | 1765 |
means you will attract fewer users, so your relay shouldn't grow |
| 1504 | 1766 |
as large. See the <tt>MaxAdvertisedBandwidth</tt> option in the man |
| 1505 | 1767 |
page.</li> |
| ... | ... |
@@ -1507,23 +1769,28 @@ the same geographic location. |
| 1507 | 1769 |
</ol> |
| 1508 | 1770 |
|
| 1509 | 1771 |
<p> |
| 1510 |
- All of this said, fast Tor relays do use a lot of ram. It is not unusual |
|
| 1772 |
+ All of this said, fast Tor relays do use a lot of ram. It is not |
|
| 1773 |
+unusual |
|
| 1511 | 1774 |
for a fast exit relay to use 500-1000 MB of memory. |
| 1512 | 1775 |
</p> |
| 1513 | 1776 |
|
| 1514 | 1777 |
<hr> |
| 1515 | 1778 |
|
| 1516 | 1779 |
<a id="WhyNotNamed"></a> |
| 1517 |
- <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not named?</a></h3> |
|
| 1780 |
+ <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not |
|
| 1781 |
+named?</a></h3> |
|
| 1518 | 1782 |
|
| 1519 | 1783 |
<p> |
| 1520 |
- We currently use these metrics to determine if your relay should be named:<br> |
|
| 1784 |
+ We currently use these metrics to determine if your relay should be |
|
| 1785 |
+named:<br> |
|
| 1521 | 1786 |
</p> |
| 1522 | 1787 |
<ul> |
| 1523 |
- <li>The name is not currently mapped to a different key. Existing mappings |
|
| 1788 |
+ <li>The name is not currently mapped to a different key. Existing |
|
| 1789 |
+mappings |
|
| 1524 | 1790 |
are removed after 6 months of inactivity from a relay.</li> |
| 1525 | 1791 |
<li>The relay must have been around for at least two weeks.</li> |
| 1526 |
- <li>No other router may have wanted the same name in the past month.</li> |
|
| 1792 |
+ <li>No other router may have wanted the same name in the past |
|
| 1793 |
+month.</li> |
|
| 1527 | 1794 |
</ul> |
| 1528 | 1795 |
|
| 1529 | 1796 |
<hr> |
| ... | ... |
@@ -1555,7 +1823,8 @@ the same geographic location. |
| 1555 | 1823 |
|
| 1556 | 1824 |
<p> |
| 1557 | 1825 |
Note that there can be a tradeoff here between anonymity and |
| 1558 |
- performance. The Tor network's anonymity comes in part from diversity, |
|
| 1826 |
+ performance. The Tor network's anonymity comes in part from |
|
| 1827 |
+diversity, |
|
| 1559 | 1828 |
so if you are in a position to run your own relay, you will be |
| 1560 | 1829 |
improving Tor's anonymity more than by donating. At the same time |
| 1561 | 1830 |
though, economies |
| ... | ... |
@@ -1568,24 +1837,29 @@ the same geographic location. |
| 1568 | 1837 |
<hr> |
| 1569 | 1838 |
|
| 1570 | 1839 |
<a id="KeyManagement"></a> |
| 1571 |
- <h3><a class="anchor" href="#KeyManagement">Tell me about all the keys Tor uses.</a></h3> |
|
| 1840 |
+ <h3><a class="anchor" href="#KeyManagement">Tell me about all the |
|
| 1841 |
+keys Tor uses.</a></h3> |
|
| 1572 | 1842 |
|
| 1573 | 1843 |
<p> |
| 1574 | 1844 |
Tor uses a variety of different keys, with three goals in mind: 1) |
| 1575 | 1845 |
encryption to ensure privacy of data within the Tor network, 2) |
| 1576 | 1846 |
authentication so clients know they're |
| 1577 |
- talking to the relays they meant to talk to, and 3) signatures to make |
|
| 1847 |
+ talking to the relays they meant to talk to, and 3) signatures to |
|
| 1848 |
+make |
|
| 1578 | 1849 |
sure all clients know the same set of relays. |
| 1579 | 1850 |
</p> |
| 1580 | 1851 |
|
| 1581 | 1852 |
<p> |
| 1582 |
- <b>Encryption</b>: first, all connections in Tor use TLS link encryption, |
|
| 1853 |
+ <b>Encryption</b>: first, all connections in Tor use TLS link |
|
| 1854 |
+encryption, |
|
| 1583 | 1855 |
so observers can't look inside to see which circuit a given cell is |
| 1584 |
- intended for. Further, the Tor client establishes an ephemeral encryption |
|
| 1856 |
+ intended for. Further, the Tor client establishes an ephemeral |
|
| 1857 |
+encryption |
|
| 1585 | 1858 |
key with each relay in the circuit; these extra layers of encryption |
| 1586 | 1859 |
mean that only the exit relay can read |
| 1587 | 1860 |
the cells. Both sides discard the circuit key when the circuit ends, |
| 1588 |
- so logging traffic and then breaking into the relay to discover the key |
|
| 1861 |
+ so logging traffic and then breaking into the relay to discover the |
|
| 1862 |
+key |
|
| 1589 | 1863 |
won't work. |
| 1590 | 1864 |
</p> |
| 1591 | 1865 |
|
| ... | ... |
@@ -1604,23 +1879,32 @@ the same geographic location. |
| 1604 | 1879 |
|
| 1605 | 1880 |
<p> |
| 1606 | 1881 |
<b>Coordination</b>: |
| 1607 |
- How do clients know what the relays are, and how do they know that they |
|
| 1608 |
- have the right keys for them? Each relay has a long-term public signing |
|
| 1609 |
- key called the "identity key". Each directory authority additionally has a |
|
| 1882 |
+ How do clients know what the relays are, and how do they know that |
|
| 1883 |
+they |
|
| 1884 |
+ have the right keys for them? Each relay has a long-term public |
|
| 1885 |
+signing |
|
| 1886 |
+ key called the "identity key". Each directory authority additionally |
|
| 1887 |
+has a |
|
| 1610 | 1888 |
"directory signing key". The directory authorities <a |
| 1611 | 1889 |
href="<specblob>dir-spec.txt">provide a signed list</a> |
| 1612 |
- of all the known relays, and in that list are a set of certificates from |
|
| 1613 |
- each relay (self-signed by their identity key) specifying their keys, |
|
| 1614 |
- locations, exit policies, and so on. So unless the adversary can control |
|
| 1890 |
+ of all the known relays, and in that list are a set of certificates |
|
| 1891 |
+from |
|
| 1892 |
+ each relay (self-signed by their identity key) specifying their |
|
| 1893 |
+keys, |
|
| 1894 |
+ locations, exit policies, and so on. So unless the adversary can |
|
| 1895 |
+control |
|
| 1615 | 1896 |
a majority of the directory authorities (as of 2012 there are 8 |
| 1616 | 1897 |
directory authorities), he can't trick the Tor client into using |
| 1617 | 1898 |
other Tor relays. |
| 1618 | 1899 |
</p> |
| 1619 | 1900 |
|
| 1620 | 1901 |
<p> |
| 1621 |
- How do clients know what the directory authorities are? The Tor software |
|
| 1622 |
- comes with a built-in list of location and public key for each directory |
|
| 1623 |
- authority. So the only way to trick users into using a fake Tor network |
|
| 1902 |
+ How do clients know what the directory authorities are? The Tor |
|
| 1903 |
+software |
|
| 1904 |
+ comes with a built-in list of location and public key for each |
|
| 1905 |
+directory |
|
| 1906 |
+ authority. So the only way to trick users into using a fake Tor |
|
| 1907 |
+network |
|
| 1624 | 1908 |
is to give them a specially modified version of the software. |
| 1625 | 1909 |
</p> |
| 1626 | 1910 |
|
| ... | ... |
@@ -1633,23 +1917,30 @@ the same geographic location. |
| 1633 | 1917 |
</p> |
| 1634 | 1918 |
|
| 1635 | 1919 |
<p> |
| 1636 |
- In order to be certain that it's really signed by us, you need to have |
|
| 1637 |
- met us in person and gotten a copy of our GPG key fingerprint, or you |
|
| 1638 |
- need to know somebody who has. If you're concerned about an attack on |
|
| 1639 |
- this level, we recommend you get involved with the security community |
|
| 1920 |
+ In order to be certain that it's really signed by us, you need to |
|
| 1921 |
+have |
|
| 1922 |
+ met us in person and gotten a copy of our GPG key fingerprint, or |
|
| 1923 |
+you |
|
| 1924 |
+ need to know somebody who has. If you're concerned about an attack |
|
| 1925 |
+on |
|
| 1926 |
+ this level, we recommend you get involved with the security |
|
| 1927 |
+community |
|
| 1640 | 1928 |
and start meeting people. |
| 1641 | 1929 |
</p> |
| 1642 | 1930 |
|
| 1643 | 1931 |
<hr> |
| 1644 | 1932 |
|
| 1645 | 1933 |
<a id="EntryGuards"></a> |
| 1646 |
-<h3><a class="anchor" href="#EntryGuards">What are Entry Guards?</a></h3> |
|
| 1934 |
+<h3><a class="anchor" href="#EntryGuards">What are Entry |
|
| 1935 |
+Guards?</a></h3> |
|
| 1647 | 1936 |
|
| 1648 | 1937 |
<p> |
| 1649 | 1938 |
Tor (like all current practical low-latency anonymity designs) fails |
| 1650 | 1939 |
when the attacker can see both ends of the communications channel. For |
| 1651 |
-example, suppose the attacker controls or watches the Tor relay you choose |
|
| 1652 |
-to enter the network, and also controls or watches the website you visit. In |
|
| 1940 |
+example, suppose the attacker controls or watches the Tor relay you |
|
| 1941 |
+choose |
|
| 1942 |
+to enter the network, and also controls or watches the website you |
|
| 1943 |
+visit. In |
|
| 1653 | 1944 |
this case, the research community knows no practical low-latency design |
| 1654 | 1945 |
that can reliably stop the attacker from correlating volume and timing |
| 1655 | 1946 |
information on the two sides. |
| ... | ... |
@@ -1663,17 +1954,20 @@ will be able to correlate all traffic you send with probability |
| 1663 | 1954 |
<i>(c/n)<sup>2</sup></i>. But profiling is, for most users, as bad |
| 1664 | 1955 |
as being traced all the time: they want to do something often without |
| 1665 | 1956 |
an attacker noticing, and the attacker noticing once is as bad as the |
| 1666 |
-attacker noticing more often. Thus, choosing many random entries and exits |
|
| 1957 |
+attacker noticing more often. Thus, choosing many random entries and |
|
| 1958 |
+exits |
|
| 1667 | 1959 |
gives the user no chance of escaping profiling by this kind of attacker. |
| 1668 | 1960 |
</p> |
| 1669 | 1961 |
|
| 1670 | 1962 |
<p> |
| 1671 |
-The solution is "entry guards": each Tor client selects a few relays at random |
|
| 1963 |
+The solution is "entry guards": each Tor client selects a few relays at |
|
| 1964 |
+random |
|
| 1672 | 1965 |
to use as entry points, and uses only those relays for her first hop. If |
| 1673 | 1966 |
those relays are not controlled or observed, the attacker can't win, |
| 1674 | 1967 |
ever, and the user is secure. If those relays <i>are</i> observed or |
| 1675 | 1968 |
controlled by the attacker, the attacker sees a larger <i>fraction</i> |
| 1676 |
-of the user's traffic — but still the user is no more profiled than |
|
| 1969 |
+of the user's traffic — but still the user is no more profiled |
|
| 1970 |
+than |
|
| 1677 | 1971 |
before. Thus, the user has some chance (on the order of <i>(n-c)/n</i>) |
| 1678 | 1972 |
of avoiding profiling, whereas she had none before. |
| 1679 | 1973 |
</p> |
| ... | ... |
@@ -1699,50 +1993,66 @@ we move to a "directory guard" design as well. |
| 1699 | 1993 |
<hr> |
| 1700 | 1994 |
|
| 1701 | 1995 |
<a id="EverybodyARelay"></a> |
| 1702 |
- <h3><a class="anchor" href="#EverybodyARelay">You should make every Tor user be a relay.</a></h3> |
|
| 1996 |
+ <h3><a class="anchor" href="#EverybodyARelay">You should make every |
|
| 1997 |
+Tor user be a relay.</a></h3> |
|
| 1703 | 1998 |
|
| 1704 | 1999 |
<p> |
| 1705 | 2000 |
Requiring every Tor user to be a relay would help with scaling the |
| 1706 | 2001 |
network to handle all our users, and <a |
| 1707 | 2002 |
href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">running a Tor |
| 1708 |
- relay may help your anonymity</a>. However, many Tor users cannot be good |
|
| 1709 |
- relays — for example, some Tor clients operate from behind restrictive |
|
| 1710 |
- firewalls, connect via modem, or otherwise aren't in a position where they |
|
| 2003 |
+ relay may help your anonymity</a>. However, many Tor users cannot be |
|
| 2004 |
+good |
|
| 2005 |
+ relays — for example, some Tor clients operate from behind |
|
| 2006 |
+restrictive |
|
| 2007 |
+ firewalls, connect via modem, or otherwise aren't in a position |
|
| 2008 |
+where they |
|
| 1711 | 2009 |
can relay traffic. Providing service to these clients is a critical |
| 1712 |
- part of providing effective anonymity for everyone, since many Tor users |
|
| 1713 |
- are subject to these or similar constraints and including these clients |
|
| 2010 |
+ part of providing effective anonymity for everyone, since many Tor |
|
| 2011 |
+users |
|
| 2012 |
+ are subject to these or similar constraints and including these |
|
| 2013 |
+clients |
|
| 1714 | 2014 |
increases the size of the anonymity set. |
| 1715 | 2015 |
</p> |
| 1716 | 2016 |
|
| 1717 | 2017 |
<p> |
| 1718 |
- That said, we do want to encourage Tor users to run relays, so what we |
|
| 1719 |
- really want to do is simplify the process of setting up and maintaining |
|
| 1720 |
- a relay. We've made a lot of progress with easy configuration in the past |
|
| 1721 |
- few years: Vidalia has an easy relay configuration interface, and supports |
|
| 1722 |
- uPnP too. Tor is good at automatically detecting whether it's reachable and |
|
| 2018 |
+ That said, we do want to encourage Tor users to run relays, so what |
|
| 2019 |
+we |
|
| 2020 |
+ really want to do is simplify the process of setting up and |
|
| 2021 |
+maintaining |
|
| 2022 |
+ a relay. We've made a lot of progress with easy configuration in the |
|
| 2023 |
+past |
|
| 2024 |
+ few years: Vidalia has an easy relay configuration interface, and |
|
| 2025 |
+supports |
|
| 2026 |
+ uPnP too. Tor is good at automatically detecting whether it's |
|
| 2027 |
+reachable and |
|
| 1723 | 2028 |
how much bandwidth it can offer. |
| 1724 | 2029 |
</p> |
| 1725 | 2030 |
|
| 1726 | 2031 |
<p> |
| 1727 |
- There are five steps we need to address before we can do this though: |
|
| 2032 |
+ There are five steps we need to address before we can do this |
|
| 2033 |
+though: |
|
| 1728 | 2034 |
</p> |
| 1729 | 2035 |
|
| 1730 | 2036 |
<p> |
| 1731 | 2037 |
First, we need to make Tor stable as a relay on all common |
| 1732 | 2038 |
operating systems. The main remaining platform is Windows, |
| 1733 | 2039 |
and we're mostly there. See Section 4.1 of <a |
| 1734 |
- href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our |
|
| 2040 |
+ |
|
| 2041 |
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release" |
|
| 2042 |
+>our |
|
| 1735 | 2043 |
development roadmap</a>. |
| 1736 | 2044 |
</p> |
| 1737 | 2045 |
|
| 1738 | 2046 |
<p> |
| 1739 | 2047 |
Second, we still need to get better at automatically estimating |
| 1740 | 2048 |
the right amount of bandwidth to allow. See item #7 on the |
| 1741 |
- <a href="<page getinvolved/volunteer>#Research">research section of the |
|
| 2049 |
+ <a href="<page getinvolved/volunteer>#Research">research section of |
|
| 2050 |
+the |
|
| 1742 | 2051 |
volunteer page</a>: "Tor doesn't work very well when relays |
| 1743 | 2052 |
have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a |
| 1744 | 2053 |
href="<page docs/faq>#TransportIPnotTCP">switching |
| 1745 |
- to UDP transport</a> is the simplest answer here — which alas is |
|
| 2054 |
+ to UDP transport</a> is the simplest answer here — which alas |
|
| 2055 |
+is |
|
| 1746 | 2056 |
not a very simple answer at all. |
| 1747 | 2057 |
</p> |
| 1748 | 2058 |
|
| ... | ... |
@@ -1764,17 +2074,25 @@ we move to a "directory guard" design as well. |
| 1764 | 2074 |
href="http://freehaven.net/anonbib/#clog-the-queue">different</a> |
| 1765 | 2075 |
<a href="http://freehaven.net/anonbib/#torta05">research</a> papers |
| 1766 | 2076 |
describe ways to identify the relays in a circuit by running traffic |
| 1767 |
- through candidate relays and looking for dips in the traffic while the |
|
| 1768 |
- circuit is active. These clogging attacks are not that scary in the Tor |
|
| 1769 |
- context so long as relays are never clients too. But if we're trying to |
|
| 1770 |
- encourage more clients to turn on relay functionality too (whether as |
|
| 1771 |
- <a href="<page docs/bridges>">bridge relays</a> or as normal relays), then |
|
| 1772 |
- we need to understand this threat better and learn how to mitigate it. |
|
| 1773 |
- </p> |
|
| 1774 |
- |
|
| 1775 |
- <p> |
|
| 1776 |
- Fifth, we might need some sort of incentive scheme to encourage people |
|
| 1777 |
- to relay traffic for others, and/or to become exit nodes. Here are our |
|
| 2077 |
+ through candidate relays and looking for dips in the traffic while |
|
| 2078 |
+the |
|
| 2079 |
+ circuit is active. These clogging attacks are not that scary in the |
|
| 2080 |
+Tor |
|
| 2081 |
+ context so long as relays are never clients too. But if we're trying |
|
| 2082 |
+to |
|
| 2083 |
+ encourage more clients to turn on relay functionality too (whether |
|
| 2084 |
+as |
|
| 2085 |
+ <a href="<page docs/bridges>">bridge relays</a> or as normal |
|
| 2086 |
+relays), then |
|
| 2087 |
+ we need to understand this threat better and learn how to mitigate |
|
| 2088 |
+it. |
|
| 2089 |
+ </p> |
|
| 2090 |
+ |
|
| 2091 |
+ <p> |
|
| 2092 |
+ Fifth, we might need some sort of incentive scheme to encourage |
|
| 2093 |
+people |
|
| 2094 |
+ to relay traffic for others, and/or to become exit nodes. Here are |
|
| 2095 |
+our |
|
| 1778 | 2096 |
<a href="<blog>two-incentive-designs-tor">current |
| 1779 | 2097 |
thoughts on Tor incentives</a>. |
| 1780 | 2098 |
</p> |
| ... | ... |
@@ -1786,13 +2104,15 @@ we move to a "directory guard" design as well. |
| 1786 | 2104 |
<hr> |
| 1787 | 2105 |
|
| 1788 | 2106 |
<a id="TransportIPnotTCP"></a> |
| 1789 |
-<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all IP packets, not just TCP packets.</a></h3> |
|
| 2107 |
+<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all |
|
| 2108 |
+IP packets, not just TCP packets.</a></h3> |
|
| 1790 | 2109 |
|
| 1791 | 2110 |
<p> |
| 1792 | 2111 |
This would be handy, because it would make Tor better able to handle |
| 1793 | 2112 |
new protocols like VoIP, it could solve the whole need to socksify |
| 1794 | 2113 |
applications, and it would solve the fact that exit relays need to |
| 1795 |
-allocate a lot of file descriptors to hold open all the exit connections. |
|
| 2114 |
+allocate a lot of file descriptors to hold open all the exit |
|
| 2115 |
+connections. |
|
| 1796 | 2116 |
</p> |
| 1797 | 2117 |
|
| 1798 | 2118 |
<p> |
| ... | ... |
@@ -1820,7 +2140,8 @@ rather than the DNS server at a user's ISP; thus, we must understand |
| 1820 | 2140 |
the protocols we are transporting. |
| 1821 | 2141 |
</li> |
| 1822 | 2142 |
<li><a |
| 1823 |
-href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS</a> |
|
| 2143 |
+href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS |
|
| 2144 |
+</a> |
|
| 1824 | 2145 |
(datagram TLS) basically has no users, and IPsec sure is big. Once we've |
| 1825 | 2146 |
picked a transport mechanism, we need to design a new end-to-end Tor |
| 1826 | 2147 |
protocol for avoiding tagging attacks and other potential anonymity and |
| ... | ... |
@@ -1830,13 +2151,15 @@ integrity issues now that we allow drops, resends, et cetera. |
| 1830 | 2151 |
IDS. Our node operators tell us that exit policies are one of the main |
| 1831 | 2152 |
reasons they're willing to run Tor. Adding an Intrusion Detection System |
| 1832 | 2153 |
to handle exit policies would increase the security complexity of Tor, |
| 1833 |
-and would likely not work anyway, as evidenced by the entire field of IDS |
|
| 2154 |
+and would likely not work anyway, as evidenced by the entire field of |
|
| 2155 |
+IDS |
|
| 1834 | 2156 |
and counter-IDS papers. Many potential abuse issues are resolved by the |
| 1835 | 2157 |
fact that Tor only transports valid TCP streams (as opposed to arbitrary |
| 1836 | 2158 |
IP including malformed packets and IP floods), so exit policies become |
| 1837 | 2159 |
even <i>more</i> important as we become able to transport IP packets. We |
| 1838 | 2160 |
also need to compactly describe exit policies in the Tor directory, |
| 1839 |
-so clients can predict which nodes will allow their packets to exit — |
|
| 2161 |
+so clients can predict which nodes will allow their packets to exit |
|
| 2162 |
+— |
|
| 1840 | 2163 |
and clients need to predict all the packets they will want to send in |
| 1841 | 2164 |
a session before picking their exit node! |
| 1842 | 2165 |
</li> |
| ... | ... |
@@ -1865,10 +2188,12 @@ list of relays directly, somebody could still make a lot of connections |
| 1865 | 2188 |
through Tor to a test site and build a list of the addresses they see. |
| 1866 | 2189 |
</li> |
| 1867 | 2190 |
|
| 1868 |
-<li>If people want to block us, we believe that they should be allowed to |
|
| 2191 |
+<li>If people want to block us, we believe that they should be allowed |
|
| 2192 |
+to |
|
| 1869 | 2193 |
do so. Obviously, we would prefer for everybody to allow Tor users to |
| 1870 | 2194 |
connect to them, but people have the right to decide who their services |
| 1871 |
-should allow connections from, and if they want to block anonymous users, |
|
| 2195 |
+should allow connections from, and if they want to block anonymous |
|
| 2196 |
+users, |
|
| 1872 | 2197 |
they can. |
| 1873 | 2198 |
</li> |
| 1874 | 2199 |
|
| ... | ... |
@@ -1885,7 +2210,8 @@ spend rethinking their overall approach to privacy and anonymity. |
| 1885 | 2210 |
<hr> |
| 1886 | 2211 |
|
| 1887 | 2212 |
<a id="Criminals"></a> |
| 1888 |
- <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></h3> |
|
| 2213 |
+ <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals |
|
| 2214 |
+to do bad things?</a></h3> |
|
| 1889 | 2215 |
|
| 1890 | 2216 |
<p> |
| 1891 | 2217 |
For the answer to this question and others, please see our <a |
| ... | ... |
@@ -1895,7 +2221,8 @@ spend rethinking their overall approach to privacy and anonymity. |
| 1895 | 2221 |
<hr> |
| 1896 | 2222 |
|
| 1897 | 2223 |
<a id="RespondISP"></a> |
| 1898 |
- <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP about my exit relay?</a></h3> |
|
| 2224 |
+ <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP |
|
| 2225 |
+about my exit relay?</a></h3> |
|
| 1899 | 2226 |
|
| 1900 | 2227 |
<p> |
| 1901 | 2228 |
A collection of templates for successfully responding to ISPs is <a |
| 1902 | 2229 |