Andrew Lewman commited on 2013-01-21 02:44:17
Zeige 1 geänderte Dateien mit 667 Einfügungen und 344 Löschungen.
... | ... |
@@ -17,7 +17,8 @@ |
17 | 17 |
<p>General questions:</p> |
18 | 18 |
<ul> |
19 | 19 |
<li><a href="#WhatIsTor">What is Tor?</a></li> |
20 |
- <li><a href="#Torisdifferent">How is Tor different from other proxies?</a></li> |
|
20 |
+ <li><a href="#Torisdifferent">How is Tor different from other |
|
21 |
+proxies?</a></li> |
|
21 | 22 |
<li><a href="#CompatibleApplications">What programs can I use with |
22 | 23 |
Tor?</a></li> |
23 | 24 |
<li><a href="#WhyCalledTor">Why is it called Tor?</a></li> |
... | ... |
@@ -41,10 +42,13 @@ |
41 | 42 |
page?</a></li> |
42 | 43 |
<li><a href="#GetTor">Your website is blocked in my country. How |
43 | 44 |
do I download Tor?</a></li> |
44 |
- <li><a href="#CompileTorWindows">How do I compile Tor under Windows?</a></li> |
|
45 |
- <li><a href="#VirusFalsePositives">Why does my Tor executable appear to |
|
45 |
+ <li><a href="#CompileTorWindows">How do I compile Tor under |
|
46 |
+Windows?</a></li> |
|
47 |
+ <li><a href="#VirusFalsePositives">Why does my Tor executable appear |
|
48 |
+to |
|
46 | 49 |
have a virus or spyware?</a></li> |
47 |
- <li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li> |
|
50 |
+ <li><a href="#LiveCD">Is there a LiveCD or other bundle that |
|
51 |
+includes Tor?</a></li> |
|
48 | 52 |
</ul> |
49 | 53 |
|
50 | 54 |
<p>Tor Browser Bundle:</p> |
... | ... |
@@ -59,14 +63,18 @@ |
59 | 63 |
go?</a></li> |
60 | 64 |
<li><a href="#TBBOtherExtensions">Can I install other Firefox |
61 | 65 |
extensions?</a></li> |
62 |
- <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle? Isn't that unsafe?</a></li> |
|
63 |
- <li><a href="#TBBCanIBlockJS">I'm an expert! (No, really!) Can I configure NoScript to block JavaScript by default?</a></li> |
|
66 |
+ <li><a href="#TBBJavaScriptEnabled">Why is NoScript configured to |
|
67 |
+allow JavaScript by default in the Tor Browser Bundle? Isn't that |
|
68 |
+unsafe?</a></li> |
|
69 |
+ <li><a href="#TBBCanIBlockJS">I'm an expert! (No, really!) Can I |
|
70 |
+configure NoScript to block JavaScript by default?</a></li> |
|
64 | 71 |
<li><a href="#TBBOtherBrowser">I want to use Chrome/IE/Opera/etc |
65 | 72 |
with Tor.</a></li> |
66 | 73 |
<li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle |
67 | 74 |
running but close the browser.</a></li> |
68 | 75 |
|
69 |
- <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
76 |
+ <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or |
|
77 |
+tells |
|
70 | 78 |
me I have spyware installed.</a></li> |
71 | 79 |
<li><a href="#GmailWarning">Gmail warns me that my account may have |
72 | 80 |
been compromised.</a></li> |
... | ... |
@@ -82,7 +90,8 @@ |
82 | 90 |
correctly.</a></li> |
83 | 91 |
<li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at |
84 | 92 |
start.</a></li> |
85 |
- <li><a href="#ChooseEntryExit">Can I control which nodes (or country) |
|
93 |
+ <li><a href="#ChooseEntryExit">Can I control which nodes (or |
|
94 |
+country) |
|
86 | 95 |
are used for entry/exit?</a></li> |
87 | 96 |
<li><a href="#FirewallPorts">My firewall only allows a few outgoing |
88 | 97 |
ports.</a></li> |
... | ... |
@@ -90,13 +99,17 @@ |
90 | 99 |
|
91 | 100 |
<p>Running a Tor relay:</p> |
92 | 101 |
<ul> |
93 |
- <li><a href="#RelayFlexible">How stable does my relay need to be?</a></li> |
|
94 |
- <li><a href="#ExitPolicies">I'd run a relay, but I don't want to deal |
|
102 |
+ <li><a href="#RelayFlexible">How stable does my relay need to |
|
103 |
+be?</a></li> |
|
104 |
+ <li><a href="#ExitPolicies">I'd run a relay, but I don't want to |
|
105 |
+deal |
|
95 | 106 |
with abuse issues.</a></li> |
96 | 107 |
<li><a href="#RelayOrBridge">Should I be a normal relay or bridge |
97 | 108 |
relay?</a></li> |
98 |
- <li><a href="#MultipleRelays">I want to run more than one relay.</a></li> |
|
99 |
- <li><a href="#RelayMemory">Why is my Tor relay using so much memory?</a></li> |
|
109 |
+ <li><a href="#MultipleRelays">I want to run more than one |
|
110 |
+relay.</a></li> |
|
111 |
+ <li><a href="#RelayMemory">Why is my Tor relay using so much |
|
112 |
+memory?</a></li> |
|
100 | 113 |
<li><a href="#WhyNotNamed">Why is my Tor relay not named?</a></li> |
101 | 114 |
<li><a href="#RelayDonations">Can I donate for a relay rather than |
102 | 115 |
run my own?</a></li> |
... | ... |
@@ -106,7 +119,8 @@ |
106 | 119 |
|
107 | 120 |
<p>Anonymity and Security:</p> |
108 | 121 |
<ul> |
109 |
- <li><a href="#KeyManagement">Tell me about all the keys Tor uses.</a></li> |
|
122 |
+ <li><a href="#KeyManagement">Tell me about all the keys Tor |
|
123 |
+uses.</a></li> |
|
110 | 124 |
<li><a href="#EntryGuards">What are Entry Guards?</a></li> |
111 | 125 |
</ul> |
112 | 126 |
|
... | ... |
@@ -114,7 +128,8 @@ |
114 | 128 |
<ul> |
115 | 129 |
<li><a href="#EverybodyARelay">You should make every Tor user be a |
116 | 130 |
relay.</a></li> |
117 |
- <li><a href="#TransportIPnotTCP">You should transport all IP packets, |
|
131 |
+ <li><a href="#TransportIPnotTCP">You should transport all IP |
|
132 |
+packets, |
|
118 | 133 |
not just TCP packets.</a></li> |
119 | 134 |
<li><a href="#HideExits">You should hide the list of Tor relays, |
120 | 135 |
so people can't block the exits.</a></li> |
... | ... |
@@ -122,12 +137,14 @@ |
122 | 137 |
|
123 | 138 |
<p>Abuse:</p> |
124 | 139 |
<ul> |
125 |
- <li><a href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></li> |
|
140 |
+ <li><a href="#Criminals">Doesn't Tor enable criminals to do bad |
|
141 |
+things?</a></li> |
|
126 | 142 |
<li><a href="#RespondISP">How do I respond to my ISP about my exit |
127 | 143 |
relay?</a></li> |
128 | 144 |
</ul> |
129 | 145 |
|
130 |
- <p>For other questions not yet on this version of the FAQ, see the <a |
|
146 |
+ <p>For other questions not yet on this version of the FAQ, see the |
|
147 |
+<a |
|
131 | 148 |
href="<wikifaq>">wiki FAQ</a> for now.</p> |
132 | 149 |
|
133 | 150 |
<hr> |
... | ... |
@@ -142,71 +159,110 @@ |
142 | 159 |
</p> |
143 | 160 |
|
144 | 161 |
<p> |
145 |
- The Tor software is a program you can run on your computer that helps keep |
|
146 |
- you safe on the Internet. Tor protects you by bouncing your communications |
|
162 |
+ The Tor software is a program you can run on your computer that |
|
163 |
+helps keep |
|
164 |
+ you safe on the Internet. Tor protects you by bouncing your |
|
165 |
+communications |
|
147 | 166 |
around a distributed network of relays run by volunteers all around |
148 |
- the world: it prevents somebody watching your Internet connection from |
|
167 |
+ the world: it prevents somebody watching your Internet connection |
|
168 |
+from |
|
149 | 169 |
learning what sites you visit, and it prevents the sites you visit |
150 |
- from learning your physical location. This set of volunteer relays is |
|
151 |
- called the Tor network. You can read more about how Tor works on the <a |
|
170 |
+ from learning your physical location. This set of volunteer relays |
|
171 |
+is |
|
172 |
+ called the Tor network. You can read more about how Tor works on the |
|
173 |
+<a |
|
152 | 174 |
href="<page about/overview>">overview page</a>. |
153 | 175 |
</p> |
154 | 176 |
|
155 | 177 |
<p> |
156 |
- The Tor Project is a non-profit (charity) organization that maintains |
|
178 |
+ The Tor Project is a non-profit (charity) organization that |
|
179 |
+maintains |
|
157 | 180 |
and develops the Tor software. |
158 | 181 |
</p> |
159 | 182 |
|
160 | 183 |
<hr> |
161 | 184 |
|
162 | 185 |
<a id="Torisdifferent"></a> |
163 |
- <h3><a class="anchor" href="#Torisdifferent">How is Tor different from other proxies?</a></h3> |
|
164 |
- <p> |
|
165 |
- A typical proxy provider sets up a server somewhere on the Internet and |
|
166 |
-allows you to use it to relay your traffic. This creates a simple, easy to |
|
167 |
-maintain architecture. The users all enter and leave through the same server. |
|
168 |
-The provider may charge for use of the proxy, or fund their costs through |
|
169 |
-advertisements on the server. In the simplest configuration, you don't have to |
|
170 |
-install anything. You just have to point your browser at their proxy server. |
|
171 |
-Simple proxy providers are fine solutions if you do not want protections for |
|
172 |
-your privacy and anonymity online and you trust the provider from doing bad |
|
173 |
-things. Some simple proxy providers use SSL to secure your connection to them. |
|
174 |
-This may protect you against local eavesdroppers, such as those at a cafe with |
|
186 |
+ <h3><a class="anchor" href="#Torisdifferent">How is Tor different |
|
187 |
+from other proxies?</a></h3> |
|
188 |
+ <p> |
|
189 |
+ A typical proxy provider sets up a server somewhere on the Internet |
|
190 |
+and |
|
191 |
+allows you to use it to relay your traffic. This creates a simple, easy |
|
192 |
+to |
|
193 |
+maintain architecture. The users all enter and leave through the same |
|
194 |
+server. |
|
195 |
+The provider may charge for use of the proxy, or fund their costs |
|
196 |
+through |
|
197 |
+advertisements on the server. In the simplest configuration, you don't |
|
198 |
+have to |
|
199 |
+install anything. You just have to point your browser at their proxy |
|
200 |
+server. |
|
201 |
+Simple proxy providers are fine solutions if you do not want protections |
|
202 |
+for |
|
203 |
+your privacy and anonymity online and you trust the provider from doing |
|
204 |
+bad |
|
205 |
+things. Some simple proxy providers use SSL to secure your connection |
|
206 |
+to them. |
|
207 |
+This may protect you against local eavesdroppers, such as those at a |
|
208 |
+cafe with |
|
175 | 209 |
free wifi Internet. |
176 | 210 |
</p> |
177 | 211 |
<p> |
178 |
- Simple proxy providers also create a single point of failure. The provider |
|
179 |
-knows who you are and where you browse on the Internet. They can see your |
|
180 |
-traffic as it passes through their server. In some cases, they can even see |
|
212 |
+ Simple proxy providers also create a single point of failure. The |
|
213 |
+provider |
|
214 |
+knows who you are and where you browse on the Internet. They can see |
|
215 |
+your |
|
216 |
+traffic as it passes through their server. In some cases, they can even |
|
217 |
+see |
|
181 | 218 |
inside your |
182 |
-encrypted traffic as they relay it to your banking site or to ecommerce stores. |
|
219 |
+encrypted traffic as they relay it to your banking site or to ecommerce |
|
220 |
+stores. |
|
183 | 221 |
You have to trust the provider isn't doing any number of things, such as |
184 |
-watching your traffic, injecting their own advertisements into your traffic |
|
222 |
+watching your traffic, injecting their own advertisements into your |
|
223 |
+traffic |
|
185 | 224 |
stream, and recording your personal details. |
186 | 225 |
</p> |
187 | 226 |
<p> |
188 |
- Tor passes your traffic through at least 3 different servers before sending |
|
189 |
-it on to the destination. Because there's a separate layer of encryption for |
|
190 |
-each of the three relays, Tor does not modify, or even know, what you are |
|
191 |
-sending into it. It merely relays your traffic, completely encrypted through |
|
192 |
-the Tor network and has it pop out somewhere else in the world, completely |
|
193 |
-intact. The Tor client is required because we assume you trust your local |
|
194 |
-computer. The Tor client manages the encryption and the path chosen through |
|
195 |
-the network. The relays located all over the world merely pass encrypted |
|
227 |
+ Tor passes your traffic through at least 3 different servers before |
|
228 |
+sending |
|
229 |
+it on to the destination. Because there's a separate layer of encryption |
|
230 |
+for |
|
231 |
+each of the three relays, Tor does not modify, or even know, what you |
|
232 |
+are |
|
233 |
+sending into it. It merely relays your traffic, completely encrypted |
|
234 |
+through |
|
235 |
+the Tor network and has it pop out somewhere else in the world, |
|
236 |
+completely |
|
237 |
+intact. The Tor client is required because we assume you trust your |
|
238 |
+local |
|
239 |
+computer. The Tor client manages the encryption and the path chosen |
|
240 |
+through |
|
241 |
+the network. The relays located all over the world merely pass |
|
242 |
+encrypted |
|
196 | 243 |
packets between themselves.</p> |
197 | 244 |
<p> |
198 | 245 |
<dl> |
199 |
- <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad first of |
|
200 |
-three servers can see encrypted Tor traffic coming from your computer. It |
|
201 |
-still doesn't know who you are and what you are doing over Tor. It merely sees |
|
202 |
-"This IP address is using Tor". Tor is not illegal anywhere in the world, so |
|
203 |
-using Tor by itself is fine. You are still protected from this node figuring |
|
246 |
+ <dt>Doesn't the first server see who I am?</dt><dd>Possibly. A bad |
|
247 |
+first of |
|
248 |
+three servers can see encrypted Tor traffic coming from your computer. |
|
249 |
+It |
|
250 |
+still doesn't know who you are and what you are doing over Tor. It |
|
251 |
+merely sees |
|
252 |
+"This IP address is using Tor". Tor is not illegal anywhere in the |
|
253 |
+world, so |
|
254 |
+using Tor by itself is fine. You are still protected from this node |
|
255 |
+figuring |
|
204 | 256 |
out who you are and where you are going on the Internet.</dd> |
205 |
- <dt>Can't the third server see my traffic?</dt><dd>Possibly. A bad third |
|
206 |
-of three servers can see the traffic you sent into Tor. It won't know who sent |
|
257 |
+ <dt>Can't the third server see my traffic?</dt><dd>Possibly. A bad |
|
258 |
+third |
|
259 |
+of three servers can see the traffic you sent into Tor. It won't know |
|
260 |
+who sent |
|
207 | 261 |
this traffic. If you're using encryption, such as visiting a bank or |
208 |
-e-commerce website, or encrypted mail connections, etc, it will only know the |
|
209 |
-destination. It won't be able to see the data inside the traffic stream. You |
|
262 |
+e-commerce website, or encrypted mail connections, etc, it will only |
|
263 |
+know the |
|
264 |
+destination. It won't be able to see the data inside the traffic |
|
265 |
+stream. You |
|
210 | 266 |
are still protected from this node figuring out who you are and if using |
211 | 267 |
encryption, what data you're sending to the destination.</dd> |
212 | 268 |
</dl> |
... | ... |
@@ -215,25 +271,34 @@ encryption, what data you're sending to the destination.</dd> |
215 | 271 |
<hr> |
216 | 272 |
|
217 | 273 |
<a id="CompatibleApplications"></a> |
218 |
- <h3><a class="anchor" href="#CompatibleApplications">What programs can I use with Tor?</a></h3> |
|
274 |
+ <h3><a class="anchor" href="#CompatibleApplications">What programs |
|
275 |
+can I use with Tor?</a></h3> |
|
219 | 276 |
|
220 | 277 |
<p> |
221 |
- There are two pieces to "Torifying" a program: connection-level anonymity |
|
222 |
- and application-level anonymity. Connection-level anonymity focuses on |
|
223 |
- making sure the application's Internet connections get sent through Tor. |
|
278 |
+ There are two pieces to "Torifying" a program: connection-level |
|
279 |
+anonymity |
|
280 |
+ and application-level anonymity. Connection-level anonymity focuses |
|
281 |
+on |
|
282 |
+ making sure the application's Internet connections get sent through |
|
283 |
+Tor. |
|
224 | 284 |
This step is normally done by configuring |
225 | 285 |
the program to use your Tor client as a "socks" proxy, but there are |
226 |
- other ways to do it too. For application-level anonymity, you need to |
|
227 |
- make sure that the information the application sends out doesn't hurt |
|
228 |
- your privacy. (Even if the connections are being routed through Tor, you |
|
229 |
- still don't want to include sensitive information like your name.) This |
|
286 |
+ other ways to do it too. For application-level anonymity, you need |
|
287 |
+to |
|
288 |
+ make sure that the information the application sends out doesn't |
|
289 |
+hurt |
|
290 |
+ your privacy. (Even if the connections are being routed through Tor, |
|
291 |
+you |
|
292 |
+ still don't want to include sensitive information like your name.) |
|
293 |
+This |
|
230 | 294 |
second step needs to be done on a program-by-program basis, which is |
231 | 295 |
why we don't yet recommend very many programs for safe use with Tor. |
232 | 296 |
</p> |
233 | 297 |
|
234 | 298 |
<p> |
235 | 299 |
Most of our work so far has focused on the Firefox web browser. The |
236 |
- bundles on the <a href="<page download/download>">download page</a> automatically |
|
300 |
+ bundles on the <a href="<page download/download>">download page</a> |
|
301 |
+automatically |
|
237 | 302 |
install the <a href="<page torbutton/index>">Torbutton Firefox |
238 | 303 |
extension</a> if you have Firefox installed. As of version 1.2.0, |
239 | 304 |
Torbutton now takes care of a lot of the connection-level and |
... | ... |
@@ -255,7 +320,8 @@ encryption, what data you're sending to the destination.</dd> |
255 | 320 |
<hr> |
256 | 321 |
|
257 | 322 |
<a id="WhyCalledTor"></a> |
258 |
- <h3><a class="anchor" href="#WhyCalledTor">Why is it called Tor?</a></h3> |
|
323 |
+ <h3><a class="anchor" href="#WhyCalledTor">Why is it called |
|
324 |
+Tor?</a></h3> |
|
259 | 325 |
|
260 | 326 |
<p> |
261 | 327 |
Because Tor is the onion routing network. When we were starting the |
... | ... |
@@ -272,28 +338,35 @@ encryption, what data you're sending to the destination.</dd> |
272 | 338 |
</p> |
273 | 339 |
|
274 | 340 |
<p> |
275 |
- Note: even though it originally came from an acronym, Tor is not spelled |
|
341 |
+ Note: even though it originally came from an acronym, Tor is not |
|
342 |
+spelled |
|
276 | 343 |
"TOR". Only the first letter is capitalized. In fact, we can usually |
277 |
- spot people who haven't read any of our website (and have instead learned |
|
278 |
- everything they know about Tor from news articles) by the fact that they |
|
344 |
+ spot people who haven't read any of our website (and have instead |
|
345 |
+learned |
|
346 |
+ everything they know about Tor from news articles) by the fact that |
|
347 |
+they |
|
279 | 348 |
spell it wrong. |
280 | 349 |
</p> |
281 | 350 |
|
282 | 351 |
<hr> |
283 | 352 |
|
284 | 353 |
<a id="Backdoor"></a> |
285 |
- <h3><a class="anchor" href="#Backdoor">Is there a backdoor in Tor?</a></h3> |
|
354 |
+ <h3><a class="anchor" href="#Backdoor">Is there a backdoor in |
|
355 |
+Tor?</a></h3> |
|
286 | 356 |
|
287 | 357 |
<p> |
288 |
- There is absolutely no backdoor in Tor. Nobody has asked us to put one |
|
289 |
- in, and we know some smart lawyers who say that it's unlikely that anybody |
|
358 |
+ There is absolutely no backdoor in Tor. Nobody has asked us to put |
|
359 |
+one |
|
360 |
+ in, and we know some smart lawyers who say that it's unlikely that |
|
361 |
+anybody |
|
290 | 362 |
will try to make us add one in our jurisdiction (U.S.). If they do |
291 | 363 |
ask us, we will fight them, and (the lawyers say) probably win. |
292 | 364 |
</p> |
293 | 365 |
|
294 | 366 |
<p> |
295 | 367 |
We think that putting a backdoor in Tor would be tremendously |
296 |
- irresponsible to our users, and a bad precedent for security software |
|
368 |
+ irresponsible to our users, and a bad precedent for security |
|
369 |
+software |
|
297 | 370 |
in general. If we ever put a deliberate backdoor in our security |
298 | 371 |
software, it would ruin our professional reputations. Nobody would |
299 | 372 |
trust our software ever again — for excellent reason! |
... | ... |
@@ -302,8 +375,10 @@ encryption, what data you're sending to the destination.</dd> |
302 | 375 |
<p> |
303 | 376 |
But that said, there are still plenty of subtle attacks |
304 | 377 |
people might try. Somebody might impersonate us, or break into our |
305 |
- computers, or something like that. Tor is open source, and you should |
|
306 |
- always check the source (or at least the diffs since the last release) |
|
378 |
+ computers, or something like that. Tor is open source, and you |
|
379 |
+should |
|
380 |
+ always check the source (or at least the diffs since the last |
|
381 |
+release) |
|
307 | 382 |
for suspicious things. If we (or the distributors) don't give you |
308 | 383 |
source, that's a sure sign something funny might be going on. You |
309 | 384 |
should also check the <a href="<page docs/verifying-signatures>">PGP |
... | ... |
@@ -313,35 +388,43 @@ encryption, what data you're sending to the destination.</dd> |
313 | 388 |
|
314 | 389 |
<p> |
315 | 390 |
Also, there might be accidental bugs in Tor that could affect your |
316 |
- anonymity. We periodically find and fix anonymity-related bugs, so make |
|
391 |
+ anonymity. We periodically find and fix anonymity-related bugs, so |
|
392 |
+make |
|
317 | 393 |
sure you keep your Tor versions up-to-date. |
318 | 394 |
</p> |
319 | 395 |
|
320 | 396 |
<hr> |
321 | 397 |
|
322 | 398 |
<a id="DistributingTor"></a> |
323 |
- <h3><a class="anchor" href="#DistributingTor">Can I distribute Tor?</a></h3> |
|
399 |
+ <h3><a class="anchor" href="#DistributingTor">Can I distribute |
|
400 |
+Tor?</a></h3> |
|
324 | 401 |
|
325 | 402 |
<p> |
326 | 403 |
Yes. |
327 | 404 |
</p> |
328 | 405 |
|
329 | 406 |
<p> |
330 |
- The Tor software is <a href="https://www.fsf.org/">free software</a>. This |
|
331 |
- means we give you the rights to redistribute the Tor software, either |
|
332 |
- modified or unmodified, either for a fee or gratis. You don't have to |
|
407 |
+ The Tor software is <a href="https://www.fsf.org/">free |
|
408 |
+software</a>. This |
|
409 |
+ means we give you the rights to redistribute the Tor software, |
|
410 |
+either |
|
411 |
+ modified or unmodified, either for a fee or gratis. You don't have |
|
412 |
+to |
|
333 | 413 |
ask us for specific permission. |
334 | 414 |
</p> |
335 | 415 |
|
336 | 416 |
<p> |
337 |
- However, if you want to redistribute the Tor software you must follow our |
|
417 |
+ However, if you want to redistribute the Tor software you must |
|
418 |
+follow our |
|
338 | 419 |
<a href="<gitblob>LICENSE">LICENSE</a>. |
339 |
- Essentially this means that you need to include our LICENSE file along |
|
420 |
+ Essentially this means that you need to include our LICENSE file |
|
421 |
+along |
|
340 | 422 |
with whatever part of the Tor software you're distributing. |
341 | 423 |
</p> |
342 | 424 |
|
343 | 425 |
<p> |
344 |
- Most people who ask us this question don't want to distribute just the |
|
426 |
+ Most people who ask us this question don't want to distribute just |
|
427 |
+the |
|
345 | 428 |
Tor software, though. They want to distribute the <a |
346 | 429 |
href="https://www.torproject.org/projects/torbrowser.html.en">Tor |
347 | 430 |
Browser</a>. This includes <a |
... | ... |
@@ -359,39 +442,52 @@ encryption, what data you're sending to the destination.</dd> |
359 | 442 |
</p> |
360 | 443 |
|
361 | 444 |
<p> |
362 |
- Also, you should make sure not to confuse your readers about what Tor is, |
|
363 |
- who makes it, and what properties it provides (and doesn't provide). See |
|
364 |
- our <a href="<page docs/trademark-faq>">trademark FAQ</a> for details. |
|
445 |
+ Also, you should make sure not to confuse your readers about what |
|
446 |
+Tor is, |
|
447 |
+ who makes it, and what properties it provides (and doesn't provide). |
|
448 |
+See |
|
449 |
+ our <a href="<page docs/trademark-faq>">trademark FAQ</a> for |
|
450 |
+details. |
|
365 | 451 |
</p> |
366 | 452 |
|
367 | 453 |
<p> |
368 | 454 |
Lastly, you should realize that we release new versions of the |
369 | 455 |
Tor software frequently, and sometimes we make backward incompatible |
370 |
- changes. So if you distribute a particular version of the Tor software, it |
|
371 |
- may not be supported — or even work — six months later. This |
|
456 |
+ changes. So if you distribute a particular version of the Tor |
|
457 |
+software, it |
|
458 |
+ may not be supported — or even work — six months later. |
|
459 |
+This |
|
372 | 460 |
is a fact of life for all security software under heavy development. |
373 | 461 |
</p> |
374 | 462 |
|
375 | 463 |
<hr> |
376 | 464 |
|
377 | 465 |
<a id="SupportMail"></a> |
378 |
- <h3><a class="anchor" href="#SupportMail">How can I get support?</a></h3> |
|
466 |
+ <h3><a class="anchor" href="#SupportMail">How can I get |
|
467 |
+support?</a></h3> |
|
379 | 468 |
|
380 | 469 |
<p>Your best bet is to first try the following:</p> |
381 | 470 |
<ol> |
382 | 471 |
<li>Read through this <a href="<page docs/faq>">FAQ</a>.</li> |
383 |
- <li>Read through the <a href="<page docs/documentation>">documentation</a>.</li> |
|
472 |
+ <li>Read through the <a href="<page |
|
473 |
+docs/documentation>">documentation</a>.</li> |
|
384 | 474 |
<li>Read through the <a |
385 |
- href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">tor-talk |
|
475 |
+ |
|
476 |
+href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk"> |
|
477 |
+tor-talk |
|
386 | 478 |
archives</a> and see if your question is already answered.</li> |
387 |
- <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a> and |
|
479 |
+ <li>Join our <a href="ircs://irc.torproject.org#tor">irc channel</a> |
|
480 |
+and |
|
388 | 481 |
state the issue and wait for help.</li> |
389 | 482 |
<li>Send an email to <a |
483 |
+ |
|
390 | 484 |
href="mailto:help@rt.torproject.org">help@rt.torproject.org</a>.</li> |
391 |
- <li>If all else fails, try <a href="<page about/contact>">contacting us</a> directly.</li> |
|
485 |
+ <li>If all else fails, try <a href="<page about/contact>">contacting |
|
486 |
+us</a> directly.</li> |
|
392 | 487 |
</ol> |
393 | 488 |
|
394 |
- <p>If you find your answer, please stick around on the IRC channel or the |
|
489 |
+ <p>If you find your answer, please stick around on the IRC channel |
|
490 |
+or the |
|
395 | 491 |
mailing list to help others who were once in your position.</p> |
396 | 492 |
|
397 | 493 |
<hr> |
... | ... |
@@ -420,24 +516,31 @@ encryption, what data you're sending to the destination.</dd> |
420 | 516 |
</p> |
421 | 517 |
|
422 | 518 |
<p> |
423 |
- Before we answer, though, you should realize that Tor is never going to |
|
424 |
- be blazing fast. Your traffic is bouncing through volunteers' computers |
|
425 |
- in various parts of the world, and some bottlenecks and network latency |
|
519 |
+ Before we answer, though, you should realize that Tor is never going |
|
520 |
+to |
|
521 |
+ be blazing fast. Your traffic is bouncing through volunteers' |
|
522 |
+computers |
|
523 |
+ in various parts of the world, and some bottlenecks and network |
|
524 |
+latency |
|
426 | 525 |
will always be present. You shouldn't expect to see university-style |
427 | 526 |
bandwidth through Tor. |
428 | 527 |
</p> |
429 | 528 |
|
430 | 529 |
<p> |
431 |
- But that doesn't mean that it can't be improved. The current Tor network |
|
432 |
- is quite small compared to the number of people trying to use it, and |
|
433 |
- many of these users don't understand or care that Tor can't currently |
|
530 |
+ But that doesn't mean that it can't be improved. The current Tor |
|
531 |
+network |
|
532 |
+ is quite small compared to the number of people trying to use it, |
|
533 |
+and |
|
534 |
+ many of these users don't understand or care that Tor can't |
|
535 |
+currently |
|
434 | 536 |
handle file-sharing traffic load. |
435 | 537 |
</p> |
436 | 538 |
|
437 | 539 |
<p> |
438 | 540 |
For the much more in-depth answer, see <a |
439 | 541 |
href="<blog>why-tor-is-slow">Roger's blog |
440 |
- post on the topic</a>, which includes both a detailed PDF and a video |
|
542 |
+ post on the topic</a>, which includes both a detailed PDF and a |
|
543 |
+video |
|
441 | 544 |
to go with it. |
442 | 545 |
</p> |
443 | 546 |
|
... | ... |
@@ -448,60 +551,64 @@ encryption, what data you're sending to the destination.</dd> |
448 | 551 |
<ul> |
449 | 552 |
|
450 | 553 |
<li> |
451 |
- <a href="<page docs/tor-doc-relay>">Configure your Tor to relay traffic |
|
452 |
- for others</a>. Help make the Tor network large enough that we can handle |
|
554 |
+ <a href="<page docs/tor-doc-relay>">Configure your Tor to relay |
|
555 |
+traffic |
|
556 |
+ for others</a>. Help make the Tor network large enough that we can |
|
557 |
+handle |
|
453 | 558 |
all the users who want privacy and security on the Internet. |
454 | 559 |
</li> |
455 | 560 |
|
456 | 561 |
<li> |
457 |
- <a href="<page projects/vidalia>">Help us make Tor more usable</a>. We |
|
562 |
+ <a href="<page projects/vidalia>">Help us make Tor more usable</a>. |
|
563 |
+We |
|
458 | 564 |
especially need people to help make it easier to configure your Tor |
459 | 565 |
as a relay. Also, we need help with clear simple documentation to |
460 | 566 |
walk people through setting it up. |
461 | 567 |
</li> |
462 | 568 |
|
463 | 569 |
<li> |
464 |
- There are some bottlenecks in the current Tor network. Help us design |
|
465 |
- experiments to track down and demonstrate where the problems are, and |
|
570 |
+ There are some bottlenecks in the current Tor network. Help us |
|
571 |
+design |
|
572 |
+ experiments to track down and demonstrate where the problems are, |
|
573 |
+and |
|
466 | 574 |
then we can focus better on fixing them. |
467 | 575 |
</li> |
468 | 576 |
|
469 |
- <li> |
|
470 |
- There are some steps that individuals |
|
471 |
- can take to improve their Tor performance. <a |
|
472 |
- href="<wiki>doc/FireFoxTorPerf">You |
|
473 |
- can configure your Firefox to handle Tor better</a>, <a |
|
474 |
- href="http://www.pps.jussieu.fr/~jch/software/polipo/tor.html">you can use |
|
475 |
- Polipo with Tor</a>, or you can try <a href="<page download/download>">upgrading |
|
476 |
- to the latest version of Tor</a>. If this works well, please help by |
|
477 |
- documenting what you did, and letting us know about it. |
|
478 |
- </li> |
|
479 |
- |
|
480 | 577 |
<li> |
481 | 578 |
Tor needs some architectural changes too. One important change is to |
482 |
- start providing <a href="#EverybodyARelay">better service to people who |
|
483 |
- relay traffic</a>. We're working on this, and we'll finish faster if we |
|
579 |
+ start providing <a href="#EverybodyARelay">better service to people |
|
580 |
+who |
|
581 |
+ relay traffic</a>. We're working on this, and we'll finish faster if |
|
582 |
+we |
|
484 | 583 |
get to spend more time on it. |
485 | 584 |
</li> |
486 | 585 |
|
487 | 586 |
<li> |
488 |
- Help do other things so we can do the hard stuff. Please take a moment |
|
489 |
- to figure out what your skills and interests are, and then <a href="<page |
|
587 |
+ Help do other things so we can do the hard stuff. Please take a |
|
588 |
+moment |
|
589 |
+ to figure out what your skills and interests are, and then <a |
|
590 |
+href="<page |
|
490 | 591 |
getinvolved/volunteer>">look at our volunteer page</a>. |
491 | 592 |
</li> |
492 | 593 |
|
493 | 594 |
<li> |
494 |
- Help find sponsors for Tor. Do you work at a company or government agency |
|
595 |
+ Help find sponsors for Tor. Do you work at a company or government |
|
596 |
+agency |
|
495 | 597 |
that uses Tor or has a use for Internet privacy, e.g. to browse the |
496 |
- competition's websites discreetly, or to connect back to the home servers |
|
497 |
- when on the road without revealing affiliations? If your organization has |
|
498 |
- an interest in keeping the Tor network working, please contact them about |
|
499 |
- supporting Tor. Without sponsors, Tor is going to become even slower. |
|
598 |
+ competition's websites discreetly, or to connect back to the home |
|
599 |
+servers |
|
600 |
+ when on the road without revealing affiliations? If your |
|
601 |
+organization has |
|
602 |
+ an interest in keeping the Tor network working, please contact them |
|
603 |
+about |
|
604 |
+ supporting Tor. Without sponsors, Tor is going to become even |
|
605 |
+slower. |
|
500 | 606 |
</li> |
501 | 607 |
|
502 | 608 |
<li> |
503 | 609 |
If you can't help out with any of the above, you can still help out |
504 |
- individually by <a href="<page donate/donate>">donating a bit of money to the |
|
610 |
+ individually by <a href="<page donate/donate>">donating a bit of |
|
611 |
+money to the |
|
505 | 612 |
cause</a>. It adds up! |
506 | 613 |
</li> |
507 | 614 |
|
... | ... |
@@ -510,7 +617,8 @@ encryption, what data you're sending to the destination.</dd> |
510 | 617 |
<hr> |
511 | 618 |
|
512 | 619 |
<a id="Funding"></a> |
513 |
- <h3><a class="anchor" href="#Funding">What would The Tor Project do with more funding?</a></h3> |
|
620 |
+ <h3><a class="anchor" href="#Funding">What would The Tor Project do |
|
621 |
+with more funding?</a></h3> |
|
514 | 622 |
|
515 | 623 |
<p> |
516 | 624 |
The Tor network's <a |
... | ... |
@@ -524,7 +634,8 @@ encryption, what data you're sending to the destination.</dd> |
524 | 634 |
</p> |
525 | 635 |
|
526 | 636 |
<p> |
527 |
- There are six main development/maintenance pushes that need attention: |
|
637 |
+ There are six main development/maintenance pushes that need |
|
638 |
+attention: |
|
528 | 639 |
</p> |
529 | 640 |
|
530 | 641 |
<ul> |
... | ... |
@@ -532,38 +643,52 @@ encryption, what data you're sending to the destination.</dd> |
532 | 643 |
<li> |
533 | 644 |
Scalability: We need to keep scaling and decentralizing the Tor |
534 | 645 |
architecture so it can handle thousands of relays and millions of |
535 |
- users. The upcoming stable release is a major improvement, but there's |
|
646 |
+ users. The upcoming stable release is a major improvement, but |
|
647 |
+there's |
|
536 | 648 |
lots more to be done next in terms of keeping Tor fast and stable. |
537 | 649 |
</li> |
538 | 650 |
|
539 | 651 |
<li> |
540 |
- User support: With this many users, a lot of people are asking questions |
|
541 |
- all the time, offering to help out with things, and so on. We need good |
|
542 |
- clean docs, and we need to spend some effort coordinating volunteers. |
|
652 |
+ User support: With this many users, a lot of people are asking |
|
653 |
+questions |
|
654 |
+ all the time, offering to help out with things, and so on. We need |
|
655 |
+good |
|
656 |
+ clean docs, and we need to spend some effort coordinating |
|
657 |
+volunteers. |
|
543 | 658 |
</li> |
544 | 659 |
|
545 | 660 |
<li> |
546 |
- Relay support: the Tor network is run by volunteers, but they still need |
|
661 |
+ Relay support: the Tor network is run by volunteers, but they still |
|
662 |
+need |
|
547 | 663 |
attention with prompt bug fixes, explanations when things go wrong, |
548 |
- reminders to upgrade, and so on. The network itself is a commons, and |
|
549 |
- somebody needs to spend some energy making sure the relay operators stay |
|
550 |
- happy. We also need to work on stability on some platforms — e.g., |
|
664 |
+ reminders to upgrade, and so on. The network itself is a commons, |
|
665 |
+and |
|
666 |
+ somebody needs to spend some energy making sure the relay operators |
|
667 |
+stay |
|
668 |
+ happy. We also need to work on stability on some platforms — |
|
669 |
+e.g., |
|
551 | 670 |
Tor relays have problems on Win XP currently. |
552 | 671 |
</li> |
553 | 672 |
|
554 | 673 |
<li> |
555 |
- Usability: Beyond documentation, we also need to work on usability of the |
|
556 |
- software itself. This includes installers, clean GUIs, easy configuration |
|
557 |
- to interface with other applications, and generally automating all of |
|
558 |
- the difficult and confusing steps inside Tor. We've got a start on this |
|
559 |
- with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much more work |
|
674 |
+ Usability: Beyond documentation, we also need to work on usability |
|
675 |
+of the |
|
676 |
+ software itself. This includes installers, clean GUIs, easy |
|
677 |
+configuration |
|
678 |
+ to interface with other applications, and generally automating all |
|
679 |
+of |
|
680 |
+ the difficult and confusing steps inside Tor. We've got a start on |
|
681 |
+this |
|
682 |
+ with the <a href="<page projects/vidalia>">Vidalia GUI</a>, but much |
|
683 |
+more work |
|
560 | 684 |
remains — usability for privacy software has never been easy. |
561 | 685 |
</li> |
562 | 686 |
|
563 | 687 |
<li> |
564 | 688 |
Incentives: We need to work on ways to encourage people to configure |
565 | 689 |
their Tors as relays and exit nodes rather than just clients. |
566 |
- <a href="#EverybodyARelay">We need to make it easy to become a relay, |
|
690 |
+ <a href="#EverybodyARelay">We need to make it easy to become a |
|
691 |
+relay, |
|
567 | 692 |
and we need to give people incentives to do it.</a> |
568 | 693 |
</li> |
569 | 694 |
|
... | ... |
@@ -572,9 +697,12 @@ encryption, what data you're sending to the destination.</dd> |
572 | 697 |
of surprises and gotchas. In our copious free time, we |
573 | 698 |
also help run top anonymity and privacy conferences like <a |
574 | 699 |
href="http://petsymposium.org/">PETS</a>. We've identified a set of |
575 |
- critical <a href="<page getinvolved/volunteer>#Research">Tor research questions</a> |
|
576 |
- that will help us figure out how to make Tor secure against the variety of |
|
577 |
- attacks out there. Of course, there are more research questions waiting |
|
700 |
+ critical <a href="<page getinvolved/volunteer>#Research">Tor |
|
701 |
+research questions</a> |
|
702 |
+ that will help us figure out how to make Tor secure against the |
|
703 |
+variety of |
|
704 |
+ attacks out there. Of course, there are more research questions |
|
705 |
+waiting |
|
578 | 706 |
behind these. |
579 | 707 |
</li> |
580 | 708 |
|
... | ... |
@@ -582,9 +710,11 @@ encryption, what data you're sending to the destination.</dd> |
582 | 710 |
|
583 | 711 |
<p> |
584 | 712 |
We're continuing to move forward on all of these, but at this rate |
585 |
- <a href="#WhySlow">the Tor network is growing faster than the developers |
|
713 |
+ <a href="#WhySlow">the Tor network is growing faster than the |
|
714 |
+developers |
|
586 | 715 |
can keep up</a>. |
587 |
- Now would be an excellent time to add a few more developers to the effort |
|
716 |
+ Now would be an excellent time to add a few more developers to the |
|
717 |
+effort |
|
588 | 718 |
so we can continue to grow the network. |
589 | 719 |
</p> |
590 | 720 |
|
... | ... |
@@ -594,23 +724,30 @@ encryption, what data you're sending to the destination.</dd> |
594 | 724 |
</p> |
595 | 725 |
|
596 | 726 |
<p> |
597 |
- We are proud to have <a href="<page about/sponsors>">sponsorship and support</a> |
|
598 |
- from the Omidyar Network, the International Broadcasting Bureau, Bell |
|
599 |
- Security Solutions, the Electronic Frontier Foundation, several government |
|
727 |
+ We are proud to have <a href="<page about/sponsors>">sponsorship and |
|
728 |
+support</a> |
|
729 |
+ from the Omidyar Network, the International Broadcasting Bureau, |
|
730 |
+Bell |
|
731 |
+ Security Solutions, the Electronic Frontier Foundation, several |
|
732 |
+government |
|
600 | 733 |
agencies and research groups, and hundreds of private contributors. |
601 | 734 |
</p> |
602 | 735 |
|
603 | 736 |
<p> |
604 |
- However, this support is not enough to keep Tor abreast of changes in the |
|
605 |
- Internet privacy landscape. Please <a href="<page donate/donate>">donate</a> |
|
606 |
- to the project, or <a href="<page about/contact>">contact</a> our executive |
|
737 |
+ However, this support is not enough to keep Tor abreast of changes |
|
738 |
+in the |
|
739 |
+ Internet privacy landscape. Please <a href="<page |
|
740 |
+donate/donate>">donate</a> |
|
741 |
+ to the project, or <a href="<page about/contact>">contact</a> our |
|
742 |
+executive |
|
607 | 743 |
director for information on making grants or major donations. |
608 | 744 |
</p> |
609 | 745 |
|
610 | 746 |
<hr> |
611 | 747 |
|
612 | 748 |
<a id="Metrics"></a> |
613 |
- <h3><a class="anchor" href="#Metrics">How many people use Tor? How many relays or exit nodes are there?</a></h3> |
|
749 |
+ <h3><a class="anchor" href="#Metrics">How many people use Tor? How |
|
750 |
+many relays or exit nodes are there?</a></h3> |
|
614 | 751 |
|
615 | 752 |
<p>All this and more about measuring Tor can be found at the <a |
616 | 753 |
href="https://metrics.torproject.org/">Tor Metrics Portal</a>.</p> |
... | ... |
@@ -622,9 +759,11 @@ certificate fingerprints for Tor's various websites?</a></h3> |
622 | 759 |
<p> |
623 | 760 |
<pre> |
624 | 761 |
*.torproject.org SSL certificate from Digicert: |
625 |
- The serial number is: 02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE |
|
762 |
+ The serial number is: |
|
763 |
+02:DA:41:04:89:A5:FD:A2:B5:DB:DB:F8:ED:15:0D:BE |
|
626 | 764 |
The SHA-1 fingerprint is: a7e70f8a648fe04a9677f13eedf6f91b5f7f2e25 |
627 |
- The SHA-256 fingerprint is: 23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b |
|
765 |
+ The SHA-256 fingerprint is: |
|
766 |
+23b854af6b96co224fd173382c520b46fa94f2d4e7238893f63ad2d783e27b4b |
|
628 | 767 |
|
629 | 768 |
blog.torproject.org SSL certificate from RapidSSL: |
630 | 769 |
The serial number is: 00:EF:A3 |
... | ... |
@@ -634,31 +773,47 @@ certificate fingerprints for Tor's various websites?</a></h3> |
634 | 773 |
<hr> |
635 | 774 |
|
636 | 775 |
<a id="HowUninstallTor"></a> |
637 |
- <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall Tor?</a></h3> |
|
776 |
+ <h3><a class="anchor" href="#HowUninstallTor">How do I uninstall |
|
777 |
+Tor?</a></h3> |
|
778 |
+ |
|
779 |
+ <p> |
|
780 |
+ Tor Browser does not install itself in the classic sense of |
|
781 |
+applications. You just simply delete the folder or directory named "Tor |
|
782 |
+Browser" and it is removed from your system. |
|
783 |
+ </p> |
|
638 | 784 |
|
639 | 785 |
<p> |
640 |
- This depends entirely on how you installed it and which operating system you |
|
641 |
- have. If you installed a package, then hopefully your package has a way to |
|
642 |
- uninstall itself. The Windows packages include uninstallers. The proper way to |
|
643 |
- completely remove Tor, Vidalia, Torbutton for Firefox, and Polipo on any |
|
786 |
+ If this is not related to Tor Browser, uninstallation depends |
|
787 |
+entirely on how you installed it and which operating system you |
|
788 |
+ have. If you installed a package, then hopefully your package has a |
|
789 |
+way to |
|
790 |
+ uninstall itself. The Windows packages include uninstallers. The |
|
791 |
+proper way to |
|
792 |
+ completely remove Tor, Vidalia, and Torbutton for Firefox on any |
|
644 | 793 |
version of Windows is as follows: |
645 | 794 |
</p> |
646 | 795 |
|
647 | 796 |
<ol> |
648 |
- <li>In your taskbar, right click on Vidalia (the green onion or the black head) |
|
797 |
+ <li>In your taskbar, right click on Vidalia (the green onion or the |
|
798 |
+black head) |
|
649 | 799 |
and choose exit.</li> |
650 |
- <li>Right click on the taskbar to bring up TaskManager. Look for tor.exe in the |
|
651 |
- Process List. If it's running, right click and choose End Process.</li> |
|
652 |
- <li>Click the Start button, go to Programs, go to Vidalia, choose Uninstall. |
|
653 |
- This will remove the Vidalia bundle, which includes Tor and Polipo.</li> |
|
654 |
- <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select Torbutton. |
|
800 |
+ <li>Right click on the taskbar to bring up TaskManager. Look for |
|
801 |
+tor.exe in the |
|
802 |
+ Process List. If it's running, right click and choose End |
|
803 |
+Process.</li> |
|
804 |
+ <li>Click the Start button, go to Programs, go to Vidalia, choose |
|
805 |
+Uninstall. |
|
806 |
+ This will remove the Vidalia bundle, which includes Tor.</li> |
|
807 |
+ <li>Start Firefox. Go to the Tools menu, choose Add-ons. Select |
|
808 |
+Torbutton. |
|
655 | 809 |
Click the Uninstall button.</li> |
656 | 810 |
</ol> |
657 | 811 |
|
658 | 812 |
<p> |
659 | 813 |
If you do not follow these steps (for example by trying to uninstall |
660 |
- Vidalia, Tor, and Polipo while they are still running), you will need to |
|
661 |
- reboot and manually remove the directory "Program Files\Vidalia Bundle". |
|
814 |
+ Vidalia and Tor while they are still running), you will need to |
|
815 |
+ reboot and manually remove the directory "Program Files\Vidalia |
|
816 |
+Bundle". |
|
662 | 817 |
</p> |
663 | 818 |
|
664 | 819 |
<p> |
... | ... |
@@ -667,24 +822,29 @@ certificate fingerprints for Tor's various websites?</a></h3> |
667 | 822 |
</p> |
668 | 823 |
|
669 | 824 |
<p> |
670 |
- If you installed by source, I'm afraid there is no easy uninstall method. But |
|
671 |
- on the bright side, by default it only installs into /usr/local/ and it should |
|
825 |
+ If you installed by source, I'm afraid there is no easy uninstall |
|
826 |
+method. But |
|
827 |
+ on the bright side, by default it only installs into /usr/local/ and |
|
828 |
+it should |
|
672 | 829 |
be pretty easy to notice things there. |
673 | 830 |
</p> |
674 | 831 |
|
675 | 832 |
<hr> |
676 | 833 |
|
677 | 834 |
<a id="PGPSigs"></a> |
678 |
- <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on the download page?</a></h3> |
|
835 |
+ <h3><a class="anchor" href="#PGPSigs">What are these "sig" files on |
|
836 |
+the download page?</a></h3> |
|
679 | 837 |
|
680 | 838 |
<p> |
681 |
- These are PGP signatures, so you can verify that the file you've downloaded is |
|
839 |
+ These are PGP signatures, so you can verify that the file you've |
|
840 |
+downloaded is |
|
682 | 841 |
exactly the one that we intended you to get. |
683 | 842 |
</p> |
684 | 843 |
|
685 | 844 |
<p> |
686 | 845 |
Please read the <a |
687 |
- href="<page docs/verifying-signatures>">verifying signatures</a> page for details. |
|
846 |
+ href="<page docs/verifying-signatures>">verifying signatures</a> |
|
847 |
+page for details. |
|
688 | 848 |
</p> |
689 | 849 |
|
690 | 850 |
<hr> |
... | ... |
@@ -698,7 +858,8 @@ Some government or corporate firewalls censor connections to Tor's |
698 | 858 |
website. In those cases, you have three options. First, get it from |
699 | 859 |
a friend — the <a href="<page projects/torbrowser>">Tor Browser |
700 | 860 |
Bundle</a> fits nicely on a USB key. Second, find the <a |
701 |
-href="https://encrypted.google.com/search?q=tor+mirrors">google cache</a> |
|
861 |
+href="https://encrypted.google.com/search?q=tor+mirrors">google |
|
862 |
+cache</a> |
|
702 | 863 |
for the <a href="<page getinvolved/mirrors>">Tor mirrors</a> page |
703 | 864 |
and see if any of those copies of our website work for you. Third, |
704 | 865 |
you can download Tor via email: log in to your Gmail account and mail |
... | ... |
@@ -709,7 +870,8 @@ to receive very large attachments. |
709 | 870 |
</p> |
710 | 871 |
|
711 | 872 |
<p> |
712 |
-Be sure to <a href="<page docs/verifying-signatures>">verify the signature</a> |
|
873 |
+Be sure to <a href="<page docs/verifying-signatures>">verify the |
|
874 |
+signature</a> |
|
713 | 875 |
of any package you download, especially when you get it from somewhere |
714 | 876 |
other than our official HTTPS website. |
715 | 877 |
</p> |
... | ... |
@@ -717,57 +879,72 @@ other than our official HTTPS website. |
717 | 879 |
<hr> |
718 | 880 |
|
719 | 881 |
<a id="CompileTorWindows"></a> |
720 |
- <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor under Windows?</a></h3> |
|
882 |
+ <h3><a class="anchor" href="#CompileTorWindows">How do I compile Tor |
|
883 |
+under Windows?</a></h3> |
|
721 | 884 |
|
722 | 885 |
<p> |
723 |
- Try following the steps at <a href="<gitblob>doc/tor-win32-mingw-creation.txt"> |
|
886 |
+ Try following the steps at <a |
|
887 |
+href="<gitblob>doc/tor-win32-mingw-creation.txt"> |
|
724 | 888 |
tor-win32-mingw-creation.txt</a>. |
725 | 889 |
</p> |
726 | 890 |
|
727 | 891 |
<p> |
728 | 892 |
(Note that you don't need to compile Tor yourself in order to use |
729 |
- it. Most people just use the packages available on the <a href="<page |
|
893 |
+ it. Most people just use the packages available on the <a |
|
894 |
+href="<page |
|
730 | 895 |
download/download>">download page</a>.) |
731 | 896 |
</p> |
732 | 897 |
|
733 | 898 |
<hr> |
734 | 899 |
|
735 | 900 |
<a id="VirusFalsePositives"></a> |
736 |
- <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor executable appear to have a virus or spyware?</a></h3> |
|
901 |
+ <h3><a class="anchor" href="#VirusFalsePositives">Why does my Tor |
|
902 |
+executable appear to have a virus or spyware?</a></h3> |
|
737 | 903 |
|
738 | 904 |
<p> |
739 |
- Sometimes, overzealous Windows virus and spyware detectors trigger on some |
|
740 |
- parts of the Tor Windows binary. Our best guess is that these are false |
|
741 |
- positives — after all, the anti-virus and anti-spyware business is just a |
|
742 |
- guessing game anyway. You should contact your vendor and explain that you have |
|
743 |
- a program that seems to be triggering false positives. Or pick a better vendor. |
|
905 |
+ Sometimes, overzealous Windows virus and spyware detectors trigger |
|
906 |
+on some |
|
907 |
+ parts of the Tor Windows binary. Our best guess is that these are |
|
908 |
+false |
|
909 |
+ positives — after all, the anti-virus and anti-spyware |
|
910 |
+business is just a |
|
911 |
+ guessing game anyway. You should contact your vendor and explain |
|
912 |
+that you have |
|
913 |
+ a program that seems to be triggering false positives. Or pick a |
|
914 |
+better vendor. |
|
744 | 915 |
</p> |
745 | 916 |
|
746 | 917 |
<p> |
747 | 918 |
In the meantime, we encourage you to not just take our word for |
748 |
- it. Our job is to provide the source; if you're concerned, please do <a |
|
919 |
+ it. Our job is to provide the source; if you're concerned, please do |
|
920 |
+<a |
|
749 | 921 |
href="#CompileTorWindows">recompile it yourself</a>. |
750 | 922 |
</p> |
751 | 923 |
|
752 | 924 |
<hr> |
753 | 925 |
|
754 | 926 |
<a id="LiveCD"></a> |
755 |
- <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></h3> |
|
927 |
+ <h3><a class="anchor" href="#LiveCD">Is there a LiveCD or other |
|
928 |
+bundle that includes Tor?</a></h3> |
|
756 | 929 |
|
757 | 930 |
<p> |
758 | 931 |
Yes. Use <a href="https://tails.boum.org/">The Amnesic Incognito |
759 |
- Live System</a> or <a href="<page projects/torbrowser>">the Tor Browser |
|
932 |
+ Live System</a> or <a href="<page projects/torbrowser>">the Tor |
|
933 |
+Browser |
|
760 | 934 |
Bundle</a>. |
761 | 935 |
</p> |
762 | 936 |
|
763 | 937 |
<hr> |
764 | 938 |
|
765 | 939 |
<a id="TBBFlash"></a> |
766 |
-<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on YouTube |
|
940 |
+<h3><a class="anchor" href="#TBBFlash">Why can't I view videos on |
|
941 |
+YouTube |
|
767 | 942 |
and other Flash-based sites?</a></h3> |
768 | 943 |
|
769 | 944 |
<p> |
770 |
-<a href="https://www.torproject.org/torbutton/torbutton-faq.html.en#noflash">Answer</a> |
|
945 |
+<a |
|
946 |
+href="https://www.torproject.org/torbutton/torbutton-faq.html. |
|
947 |
+en#noflash">Answer</a> |
|
771 | 948 |
</p> |
772 | 949 |
|
773 | 950 |
<hr> |
... | ... |
@@ -821,12 +998,11 @@ for OSX and Linux. |
821 | 998 |
|
822 | 999 |
<p> |
823 | 1000 |
If that fails, feel free to install <a |
824 |
-href="http://www.privoxy.org/">privoxy</a> or <a |
|
825 |
-href="https://archive.torproject.org/tor-package-archive/polipo/">polipo</a>. |
|
826 |
-You can use <a |
|
827 |
-href="https://gitweb.torproject.org/torbrowser.git/blob_plain/1ffcd9dafb9dd76c3a29dd686e05a71a95599fb5:/build-scripts/config/polipo.conf">our |
|
828 |
-old polipo config file</a> if you like. However, please realize that |
|
829 |
-this approach is not recommended for novice users. |
|
1001 |
+href="http://www.privoxy.org/">privoxy</a>. |
|
1002 |
+However, please realize that this approach is not recommended for novice |
|
1003 |
+users. Privoxy has an <a |
|
1004 |
+href="http://www.privoxy.org/faq/misc.html#TOR">example |
|
1005 |
+configuration</a> of Tor and Privoxy. |
|
830 | 1006 |
</p> |
831 | 1007 |
|
832 | 1008 |
<hr> |
... | ... |
@@ -837,7 +1013,8 @@ Firefox extensions?</a></h3> |
837 | 1013 |
|
838 | 1014 |
<p> |
839 | 1015 |
Yes. Just install them like normal. But be sure to avoid extensions like |
840 |
-Foxyproxy that screw up your proxy settings. Also, avoid privacy-invasive |
|
1016 |
+Foxyproxy that screw up your proxy settings. Also, avoid |
|
1017 |
+privacy-invasive |
|
841 | 1018 |
extensions (for example, pretty much anything with the word Toolbar in |
842 | 1019 |
its name). |
843 | 1020 |
</p> |
... | ... |
@@ -845,7 +1022,9 @@ its name). |
845 | 1022 |
<hr> |
846 | 1023 |
|
847 | 1024 |
<a id="TBBJavaScriptEnabled"></a> |
848 |
-<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript configured to allow JavaScript by default in the Tor Browser Bundle? Isn't that unsafe?</a></h3> |
|
1025 |
+<h3><a class="anchor" href="#TBBJavaScriptEnabled">Why is NoScript |
|
1026 |
+configured to allow JavaScript by default in the Tor Browser Bundle? |
|
1027 |
+Isn't that unsafe?</a></h3> |
|
849 | 1028 |
|
850 | 1029 |
<p> |
851 | 1030 |
We configure NoScript to allow JavaScript by default in the Tor |
... | ... |
@@ -859,7 +1038,8 @@ JavaScript might make a website work). |
859 | 1038 |
<hr> |
860 | 1039 |
|
861 | 1040 |
<a id="TBBCanIBlockJS"></a> |
862 |
-<h3><a class="anchor" href="#CanIBlockJS">I'm an expert! (No, really!) Can I configure NoScript to block JavaScript by default?</a></h3> |
|
1041 |
+<h3><a class="anchor" href="#CanIBlockJS">I'm an expert! (No, really!) |
|
1042 |
+Can I configure NoScript to block JavaScript by default?</a></h3> |
|
863 | 1043 |
|
864 | 1044 |
<p> |
865 | 1045 |
You can configure your copies of Tor Browser Bundle however you want |
... | ... |
@@ -887,22 +1067,27 @@ Chrome/IE/Opera/etc with Tor.</a></h3> |
887 | 1067 |
Unfortunately, Torbutton only works with Firefox right now, and without |
888 | 1068 |
<a href="https://www.torproject.org/torbutton/en/design/">Torbutton's |
889 | 1069 |
extensive privacy fixes</a> there are many ways for websites or other |
890 |
-attackers to recognize you, track you back to your IP address, and so on. |
|
1070 |
+attackers to recognize you, track you back to your IP address, and so |
|
1071 |
+on. |
|
891 | 1072 |
In short, using any browser besides Tor Browser Bundle with Tor is a |
892 | 1073 |
really bad idea. |
893 | 1074 |
</p> |
894 | 1075 |
|
895 | 1076 |
<p> |
896 | 1077 |
We're working with the Chrome team to <a |
897 |
-href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor-and-fingerprinting">fix |
|
898 |
-some bugs and missing APIs in Chrome</a> so it will be possible to write a |
|
899 |
-Torbutton for Chrome. No support for any other browser is on the horizon. |
|
1078 |
+href="https://blog.torproject.org/blog/google-chrome-incognito-mode-tor- |
|
1079 |
+and-fingerprinting">fix |
|
1080 |
+some bugs and missing APIs in Chrome</a> so it will be possible to write |
|
1081 |
+a |
|
1082 |
+Torbutton for Chrome. No support for any other browser is on the |
|
1083 |
+horizon. |
|
900 | 1084 |
</p> |
901 | 1085 |
|
902 | 1086 |
<hr> |
903 | 1087 |
|
904 | 1088 |
<a id="TBBCloseBrowser"></a> |
905 |
-<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor Browser |
|
1089 |
+<h3><a class="anchor" href="#TBBCloseBrowser">I want to leave Tor |
|
1090 |
+Browser |
|
906 | 1091 |
Bundle running but close the browser.</a></h3> |
907 | 1092 |
|
908 | 1093 |
<p> |
... | ... |
@@ -913,7 +1098,8 @@ be patient. |
913 | 1098 |
<hr> |
914 | 1099 |
|
915 | 1100 |
<a id="GoogleCaptcha"></a> |
916 |
-<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
1101 |
+<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a |
|
1102 |
+Captcha or tells me I have spyware installed.</a></h3> |
|
917 | 1103 |
|
918 | 1104 |
<p> |
919 | 1105 |
This is a known and intermittent problem; it does not mean that Google |
... | ... |
@@ -921,9 +1107,11 @@ considers Tor to be spyware. |
921 | 1107 |
</p> |
922 | 1108 |
|
923 | 1109 |
<p> |
924 |
-When you use Tor, you are sending queries through exit relays that are also |
|
1110 |
+When you use Tor, you are sending queries through exit relays that are |
|
1111 |
+also |
|
925 | 1112 |
shared by thousands of other users. Tor users typically see this message |
926 |
-when many Tor users are querying Google in a short period of time. Google |
|
1113 |
+when many Tor users are querying Google in a short period of time. |
|
1114 |
|
|
927 | 1115 |
interprets the high volume of traffic from a single IP address (the exit |
928 | 1116 |
relay you happened to pick) as somebody trying to "crawl" their website, |
929 | 1117 |
so it slows down traffic from that IP address for a short time. |
... | ... |
@@ -938,7 +1126,8 @@ an infection. |
938 | 1126 |
</p> |
939 | 1127 |
|
940 | 1128 |
<p> |
941 |
-To our knowledge, Google is not doing anything intentionally specifically |
|
1129 |
+To our knowledge, Google is not doing anything intentionally |
|
1130 |
+specifically |
|
942 | 1131 |
to deter or block Tor use. The error message about an infected machine |
943 | 1132 |
should clear up again after a short time. |
944 | 1133 |
</p> |
... | ... |
@@ -952,7 +1141,8 @@ DuckDuckGo, ixquick, or Bing. |
952 | 1141 |
<hr /> |
953 | 1142 |
|
954 | 1143 |
<a id="GmailWarning"></a> |
955 |
-<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account |
|
1144 |
+<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my |
|
1145 |
+account |
|
956 | 1146 |
may have been compromised.</a></h3> |
957 | 1147 |
|
958 | 1148 |
<p> |
... | ... |
@@ -964,7 +1154,8 @@ throughout the world recently used to access your account. |
964 | 1154 |
|
965 | 1155 |
<p> |
966 | 1156 |
In general this is a false alarm: Google saw a bunch of logins from |
967 |
-different places, as a result of running the service via Tor, and decided |
|
1157 |
+different places, as a result of running the service via Tor, and |
|
1158 |
+decided |
|
968 | 1159 |
it was a good idea to confirm the account was being accessed by it's |
969 | 1160 |
rightful owner. |
970 | 1161 |
</p> |
... | ... |
@@ -981,7 +1172,8 @@ Cookie hijacking is possible by either physical access to your computer |
981 | 1172 |
or by watching your network traffic. In theory only physical access |
982 | 1173 |
should compromise your system because Gmail and similar services |
983 | 1174 |
should only send the cookie over an SSL link. In practice, alas, it's <a |
984 |
-href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
1175 |
+href="http://fscked.org/blog/fully-automated-active-https-cookie- |
|
1176 |
+hijacking"> |
|
985 | 1177 |
way more complex than that</a>. |
986 | 1178 |
</p> |
987 | 1179 |
|
... | ... |
@@ -998,7 +1190,8 @@ recent logins and wondering if you actually logged in at those times. |
998 | 1190 |
<hr> |
999 | 1191 |
|
1000 | 1192 |
<a id="torrc"></a> |
1001 |
-<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". What does that mean?</a></h3> |
|
1193 |
+<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". |
|
1194 |
+What does that mean?</a></h3> |
|
1002 | 1195 |
|
1003 | 1196 |
<p> |
1004 | 1197 |
Tor installs a text file called torrc that contains configuration |
... | ... |
@@ -1008,8 +1201,10 @@ make common changes through the Vidalia interface — only advanced |
1008 | 1201 |
users should need to modify their torrc file directly. |
1009 | 1202 |
</p> |
1010 | 1203 |
<p> |
1011 |
-Tor Browser Bundle users should edit your torrc through Vidalia. Open the |
|
1012 |
-Vidalia Control Panel. Choose Settings. Choose Advanced. Click the button |
|
1204 |
+Tor Browser Bundle users should edit your torrc through Vidalia. Open |
|
1205 |
+the |
|
1206 |
+Vidalia Control Panel. Choose Settings. Choose Advanced. Click the |
|
1207 |
+button |
|
1013 | 1208 |
labelled "Edit current torrc". Remember to make sure the checkbox for |
1014 | 1209 |
"Save Settings." is checked. Hit the Ok button and you are done. |
1015 | 1210 |
</p> |
... | ... |
@@ -1040,19 +1235,22 @@ package's documentation. |
1040 | 1235 |
</li> |
1041 | 1236 |
<li>Finally, if you installed from source, you may not have a torrc |
1042 | 1237 |
installed yet: look in <code>/usr/local/etc/</code> and note that you |
1043 |
-may need to manually copy <code>torrc.sample</code> to <code>torrc</code>. |
|
1238 |
+may need to manually copy <code>torrc.sample</code> to |
|
1239 |
+<code>torrc</code>. |
|
1044 | 1240 |
</li> |
1045 | 1241 |
</ul> |
1046 | 1242 |
|
1047 | 1243 |
<p> |
1048 | 1244 |
If you use Vidalia, be sure to exit both Tor and Vidalia before you edit |
1049 |
-your torrc file manually. Otherwise Vidalia might overwrite your changes. |
|
1245 |
+your torrc file manually. Otherwise Vidalia might overwrite your |
|
1246 |
+changes. |
|
1050 | 1247 |
</p> |
1051 | 1248 |
|
1052 | 1249 |
<p> |
1053 | 1250 |
Once you've changed your torrc, you will need to restart Tor for the |
1054 | 1251 |
changes to take effect. (For advanced users on OS X and Unix, note that |
1055 |
-you actually only need to send Tor a HUP signal, not actually restart it.) |
|
1252 |
+you actually only need to send Tor a HUP signal, not actually restart |
|
1253 |
+it.) |
|
1056 | 1254 |
</p> |
1057 | 1255 |
|
1058 | 1256 |
<p> |
... | ... |
@@ -1065,7 +1263,8 @@ configuration. |
1065 | 1263 |
<hr> |
1066 | 1264 |
|
1067 | 1265 |
<a id="Logs"></a> |
1068 |
-<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's logs?</a></h3> |
|
1266 |
+<h3><a class="anchor" href="#Logs">How do I set up logging, or see Tor's |
|
1267 |
+logs?</a></h3> |
|
1069 | 1268 |
|
1070 | 1269 |
<p> |
1071 | 1270 |
If you installed a Tor bundle that includes Vidalia, then Vidalia has a |
... | ... |
@@ -1094,7 +1293,8 @@ default to <code>/usr/local/var/log/tor/</code>. |
1094 | 1293 |
</ul> |
1095 | 1294 |
|
1096 | 1295 |
<p> |
1097 |
-To change your logging setup by hand, <a href="#torrc">edit your torrc</a> |
|
1296 |
+To change your logging setup by hand, <a href="#torrc">edit your |
|
1297 |
+torrc</a> |
|
1098 | 1298 |
and find the section (near the top of the file) which contains the |
1099 | 1299 |
following line: |
1100 | 1300 |
</p> |
... | ... |
@@ -1122,7 +1322,8 @@ and filename for your Tor log. |
1122 | 1322 |
<hr> |
1123 | 1323 |
|
1124 | 1324 |
<a id="DoesntWork"></a> |
1125 |
-<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not working.</a></h3> |
|
1325 |
+<h3><a class="anchor" href="#DoesntWork">I installed Tor but it's not |
|
1326 |
+working.</a></h3> |
|
1126 | 1327 |
|
1127 | 1328 |
<p> |
1128 | 1329 |
Once you've got the Tor bundle up and running, the first question to |
... | ... |
@@ -1130,8 +1331,10 @@ ask is whether your Tor client is able to establish a circuit. |
1130 | 1331 |
</p> |
1131 | 1332 |
|
1132 | 1333 |
<p>If Tor can establish a circuit, the onion icon in |
1133 |
-Vidalia will turn green (and if you're running Tor Browser Bundle, it will |
|
1134 |
-automatically launch a browser for you). You can also check in the Vidalia |
|
1334 |
+Vidalia will turn green (and if you're running Tor Browser Bundle, it |
|
1335 |
+will |
|
1336 |
+automatically launch a browser for you). You can also check in the |
|
1337 |
+Vidalia |
|
1135 | 1338 |
Control Panel to make sure it says "Connected to the Tor |
1136 | 1339 |
network!" under Status. For those not using Vidalia, check your <a |
1137 | 1340 |
href="#Logs">Tor logs</a> for |
... | ... |
@@ -1153,9 +1356,11 @@ day and date under the 'Date & Time' Tab. Also make sure your time |
1153 | 1356 |
zone is correct.</li> |
1154 | 1357 |
<li>Is your Internet connection <a href="#FirewallPorts">firewalled |
1155 | 1358 |
by port</a>, or do you normally need to use a <a |
1156 |
-href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</a>? |
|
1359 |
+href="<wikifaq>#MyInternetconnectionrequiresanHTTPorSOCKSproxy.">proxy</ |
|
1360 |
+a>? |
|
1157 | 1361 |
</li> |
1158 |
-<li>Are you running programs like Norton Internet Security or SELinux that |
|
1362 |
+<li>Are you running programs like Norton Internet Security or SELinux |
|
1363 |
+that |
|
1159 | 1364 |
block certain connections, even though you don't realize they do? They |
1160 | 1365 |
could be preventing Tor from making network connections.</li> |
1161 | 1366 |
<li>Are you in China, or behind a restrictive corporate network firewall |
... | ... |
@@ -1168,7 +1373,8 @@ about what's going wrong?</li> |
1168 | 1373 |
<hr /> |
1169 | 1374 |
|
1170 | 1375 |
<a id="VidaliaPassword"></a> |
1171 |
-<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a password at start.</a></h3> |
|
1376 |
+<h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a |
|
1377 |
+password at start.</a></h3> |
|
1172 | 1378 |
|
1173 | 1379 |
<p> |
1174 | 1380 |
Vidalia interacts with the Tor software via Tor's "control port". The |
... | ... |
@@ -1193,9 +1399,11 @@ Vidalia and Tor before you can run this one. |
1193 | 1399 |
</li> |
1194 | 1400 |
<li>Vidalia crashed, but left Tor running with the last known random |
1195 | 1401 |
password. After you restart Vidalia, it generates a new random password, |
1196 |
-but Vidalia can't talk to Tor, because the random passwords are different. |
|
1402 |
+but Vidalia can't talk to Tor, because the random passwords are |
|
1403 |
+different. |
|
1197 | 1404 |
<br /> |
1198 |
-If the dialog that prompts you for a control password has a Reset button, |
|
1405 |
+If the dialog that prompts you for a control password has a Reset |
|
1406 |
+button, |
|
1199 | 1407 |
you can click the button and Vidalia will restart Tor with a new random |
1200 | 1408 |
control password. |
1201 | 1409 |
<br /> |
... | ... |
@@ -1214,7 +1422,8 @@ talk to the already running Tor. Vidalia generates a random password, |
1214 | 1422 |
but it is different than the saved password in the Tor service. |
1215 | 1423 |
<br /> |
1216 | 1424 |
You need to reconfigure Tor to not be a service. See the FAQ entry on |
1217 |
-<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a Windows NT service</a> |
|
1425 |
+<a href="<wikifaq>#HowdoIrunmyTorrelayasanNTservice">running Tor as a |
|
1426 |
+Windows NT service</a> |
|
1218 | 1427 |
for more information on how to remove the Tor service. |
1219 | 1428 |
</li> |
1220 | 1429 |
</ol> |
... | ... |
@@ -1222,7 +1431,8 @@ for more information on how to remove the Tor service. |
1222 | 1431 |
<hr> |
1223 | 1432 |
|
1224 | 1433 |
<a id="ChooseEntryExit"></a> |
1225 |
- <h3><a class="anchor" href="#ChooseEntryExit">Can I control which nodes (or country) are used for entry/exit?</a></h3> |
|
1434 |
+ <h3><a class="anchor" href="#ChooseEntryExit">Can I control which |
|
1435 |
+nodes (or country) are used for entry/exit?</a></h3> |
|
1226 | 1436 |
|
1227 | 1437 |
<p> |
1228 | 1438 |
Yes. You can set preferred entry and exit nodes as well as |
... | ... |
@@ -1232,22 +1442,26 @@ for more information on how to remove the Tor service. |
1232 | 1442 |
</p> |
1233 | 1443 |
<dl> |
1234 | 1444 |
<dt><tt>EntryNodes $fingerprint,$fingerprint,...</tt></dt> |
1235 |
- <dd>A list of preferred nodes to use for the first hop in the circuit, if possible. |
|
1445 |
+ <dd>A list of preferred nodes to use for the first hop in the |
|
1446 |
+circuit, if possible. |
|
1236 | 1447 |
</dd> |
1237 | 1448 |
<dt><tt>ExitNodes $fingerprint,$fingerprint,...</tt></dt> |
1238 |
- <dd>A list of preferred nodes to use for the last hop in the circuit, if possible. |
|
1449 |
+ <dd>A list of preferred nodes to use for the last hop in the |
|
1450 |
+circuit, if possible. |
|
1239 | 1451 |
</dd> |
1240 | 1452 |
<dt><tt>ExcludeNodes $fingerprint,$fingerprint,...</tt></dt> |
1241 | 1453 |
<dd>A list of nodes to never use when building a circuit. |
1242 | 1454 |
</dd> |
1243 | 1455 |
<dt><tt>ExcludeExitNodes $fingerprint,$fingerprint,...</tt></dt> |
1244 | 1456 |
<dd>A list of nodes to never use when picking an exit. |
1245 |
- Nodes listed in <tt>ExcludeNodes</tt> are automatically in this list. |
|
1457 |
+ Nodes listed in <tt>ExcludeNodes</tt> are automatically in |
|
1458 |
+this list. |
|
1246 | 1459 |
</dd> |
1247 | 1460 |
</dl> |
1248 | 1461 |
<p> |
1249 | 1462 |
<em>We recommend you do not use these</em> |
1250 |
- — they are intended for testing and may disappear in future versions. |
|
1463 |
+ — they are intended for testing and may disappear in future |
|
1464 |
+versions. |
|
1251 | 1465 |
You get the best security that Tor can provide when you leave the |
1252 | 1466 |
route selection to Tor; overriding the entry / exit nodes can mess |
1253 | 1467 |
up your anonymity in ways we don't understand. |
... | ... |
@@ -1259,32 +1473,39 @@ for more information on how to remove the Tor service. |
1259 | 1473 |
setting <tt>StrictExitNodes 1</tt> or <tt>StrictEntryNodes 1</tt> |
1260 | 1474 |
— but if you do, your Tor connections will stop working |
1261 | 1475 |
if all of the nodes you have specified become unreachable. |
1262 |
- See the <a href="<page docs/documentation>#NeatLinks">Tor status pages</a> |
|
1476 |
+ See the <a href="<page docs/documentation>#NeatLinks">Tor status |
|
1477 |
+pages</a> |
|
1263 | 1478 |
for some nodes you might pick. |
1264 | 1479 |
</p> |
1265 | 1480 |
<p> |
1266 | 1481 |
Instead of <tt>$fingerprint</tt> you can also specify a <a |
1267 |
- href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2">2 |
|
1482 |
+ |
|
1483 |
+href="https://secure.wikimedia.org/wikipedia/en/wiki/ISO_3166-1_alpha-2" |
|
1484 |
+>2 |
|
1268 | 1485 |
letter ISO3166 country code</a> in curly braces (for example {de}), |
1269 | 1486 |
or an ip address pattern (for example 255.254.0.0/8), or a node |
1270 | 1487 |
nickname. Make sure there are no spaces between the commas and the |
1271 | 1488 |
list items. |
1272 | 1489 |
</p> |
1273 | 1490 |
<p> |
1274 |
- If you want to access a service directly through Tor's Socks interface |
|
1491 |
+ If you want to access a service directly through Tor's Socks |
|
1492 |
+interface |
|
1275 | 1493 |
(eg. using ssh via connect.c), another option is to set up an |
1276 |
- internal mapping in your configuration file using <tt>MapAddress</tt>. |
|
1494 |
+ internal mapping in your configuration file using |
|
1495 |
+<tt>MapAddress</tt>. |
|
1277 | 1496 |
See the manual page for details. |
1278 | 1497 |
</p> |
1279 | 1498 |
|
1280 | 1499 |
<hr> |
1281 | 1500 |
|
1282 | 1501 |
<a id="FirewallPorts"></a> |
1283 |
-<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a few outgoing ports.</a></h3> |
|
1502 |
+<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a |
|
1503 |
+few outgoing ports.</a></h3> |
|
1284 | 1504 |
|
1285 | 1505 |
<p> |
1286 | 1506 |
If your firewall works by blocking ports, then you can tell Tor to only |
1287 |
-use the ports that your firewall permits by adding "FascistFirewall 1" to |
|
1507 |
+use the ports that your firewall permits by adding "FascistFirewall 1" |
|
1508 |
+to |
|
1288 | 1509 |
your <a href="<page docs/faq>#torrc">torrc |
1289 | 1510 |
configuration file</a>, or by clicking "My firewall only lets me connect |
1290 | 1511 |
to certain ports" in Vidalia's Network Settings window. |
... | ... |
@@ -1309,7 +1530,8 @@ use the ReachableAddresses config options, e.g.: |
1309 | 1530 |
<hr> |
1310 | 1531 |
|
1311 | 1532 |
<a id="RelayFlexible"></a> |
1312 |
- <h3><a class="anchor" href="#RelayFlexible">How stable does my relay need to be?</a></h3> |
|
1533 |
+ <h3><a class="anchor" href="#RelayFlexible">How stable does my relay |
|
1534 |
+need to be?</a></h3> |
|
1313 | 1535 |
|
1314 | 1536 |
<p> |
1315 | 1537 |
We aim to make setting up a Tor relay easy and convenient: |
... | ... |
@@ -1321,13 +1543,19 @@ use the ReachableAddresses config options, e.g.: |
1321 | 1543 |
rate limiting</a>. Further, if you have a fast |
1322 | 1544 |
link but want to limit the number of bytes per |
1323 | 1545 |
day (or week or month) that you donate, check out the <a |
1324 |
- href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay">hibernation |
|
1546 |
+ |
|
1547 |
+href="<wikifaq>#HowcanIlimitthetotalamountofbandwidthusedbymyTorrelay"> |
|
1548 |
+hibernation |
|
1325 | 1549 |
feature</a>. |
1326 | 1550 |
</li> |
1327 |
- <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> that |
|
1328 |
- specifies what sort of outbound connections are allowed or refused from |
|
1329 |
- that relay. If you are uncomfortable allowing people to exit from your |
|
1330 |
- relay, you can set it up to only allow connections to other Tor relays. |
|
1551 |
+ <li>Each Tor relay has an <a href="#ExitPolicies">exit policy</a> |
|
1552 |
+that |
|
1553 |
+ specifies what sort of outbound connections are allowed or refused |
|
1554 |
+from |
|
1555 |
+ that relay. If you are uncomfortable allowing people to exit from |
|
1556 |
+your |
|
1557 |
+ relay, you can set it up to only allow connections to other Tor |
|
1558 |
+relays. |
|
1331 | 1559 |
</li> |
1332 | 1560 |
<li>It's fine if the relay goes offline sometimes. The directories |
1333 | 1561 |
notice this quickly and stop advertising the relay. Just try to make |
... | ... |
@@ -1344,8 +1572,10 @@ use the ReachableAddresses config options, e.g.: |
1344 | 1572 |
offers some examples on how to do this. |
1345 | 1573 |
</li> |
1346 | 1574 |
<li>Your relay will passively estimate and advertise its recent |
1347 |
- bandwidth capacity, so high-bandwidth relays will attract more users than |
|
1348 |
- low-bandwidth ones. Therefore having low-bandwidth relays is useful too. |
|
1575 |
+ bandwidth capacity, so high-bandwidth relays will attract more users |
|
1576 |
+than |
|
1577 |
+ low-bandwidth ones. Therefore having low-bandwidth relays is useful |
|
1578 |
+too. |
|
1349 | 1579 |
</li> |
1350 | 1580 |
</ul> |
1351 | 1581 |
|
... | ... |
@@ -1353,7 +1583,8 @@ use the ReachableAddresses config options, e.g.: |
1353 | 1583 |
|
1354 | 1584 |
<a id="RunARelayBut"></a> |
1355 | 1585 |
<a id="ExitPolicies"></a> |
1356 |
- <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I don't want to deal with abuse issues.</a></h3> |
|
1586 |
+ <h3><a class="anchor" href="#ExitPolicies">I'd run a relay, but I |
|
1587 |
+don't want to deal with abuse issues.</a></h3> |
|
1357 | 1588 |
|
1358 | 1589 |
<p> |
1359 | 1590 |
Great. That's exactly why we implemented exit policies. |
... | ... |
@@ -1361,13 +1592,16 @@ use the ReachableAddresses config options, e.g.: |
1361 | 1592 |
|
1362 | 1593 |
<p> |
1363 | 1594 |
Each Tor relay has an exit policy that specifies what sort of |
1364 |
- outbound connections are allowed or refused from that relay. The exit |
|
1595 |
+ outbound connections are allowed or refused from that relay. The |
|
1596 |
+exit |
|
1365 | 1597 |
policies are propagated to Tor clients via the directory, so clients |
1366 | 1598 |
will automatically avoid picking exit relays that would refuse to |
1367 | 1599 |
exit to their intended destination. This way each relay can decide |
1368 | 1600 |
the services, hosts, and networks he wants to allow connections to, |
1369 |
- based on abuse potential and his own situation. Read the FAQ entry on |
|
1370 |
- <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might encounter</a> |
|
1601 |
+ based on abuse potential and his own situation. Read the FAQ entry |
|
1602 |
+on |
|
1603 |
+ <a href="<page docs/faq-abuse>#TypicalAbuses">issues you might |
|
1604 |
+encounter</a> |
|
1371 | 1605 |
if you use the default exit policy, and then read Mike Perry's |
1372 | 1606 |
<a href="<blog>tips-running-exit-node-minimal-harassment">tips |
1373 | 1607 |
for running an exit node with minimal harassment</a>. |
... | ... |
@@ -1375,36 +1609,47 @@ use the ReachableAddresses config options, e.g.: |
1375 | 1609 |
|
1376 | 1610 |
<p> |
1377 | 1611 |
The default exit policy allows access to many popular services |
1378 |
- (e.g. web browsing), but <a href="<wikifaq>#Istherealistofdefaultexitports">restricts</a> |
|
1612 |
+ (e.g. web browsing), but <a |
|
1613 |
+href="<wikifaq>#Istherealistofdefaultexitports">restricts</a> |
|
1379 | 1614 |
some due to abuse potential (e.g. mail) and some since |
1380 | 1615 |
the Tor network can't handle the load (e.g. default |
1381 | 1616 |
file-sharing ports). You can change your exit policy |
1382 | 1617 |
using Vidalia's "Sharing" tab, or by manually editing your |
1383 | 1618 |
<a href="<page docs/faq>#torrc">torrc</a> |
1384 |
- file. If you want to avoid most if not all abuse potential, set it to |
|
1385 |
- "reject *:*" (or un-check all the boxes in Vidalia). This setting means |
|
1386 |
- that your relay will be used for relaying traffic inside the Tor network, |
|
1619 |
+ file. If you want to avoid most if not all abuse potential, set it |
|
1620 |
+to |
|
1621 |
+ "reject *:*" (or un-check all the boxes in Vidalia). This setting |
|
1622 |
+means |
|
1623 |
+ that your relay will be used for relaying traffic inside the Tor |
|
1624 |
+network, |
|
1387 | 1625 |
but not for connections to external websites or other services. |
1388 | 1626 |
</p> |
1389 | 1627 |
|
1390 | 1628 |
<p> |
1391 |
- If you do allow any exit connections, make sure name resolution works |
|
1629 |
+ If you do allow any exit connections, make sure name resolution |
|
1630 |
+works |
|
1392 | 1631 |
(that is, your computer can resolve Internet addresses correctly). |
1393 |
- If there are any resources that your computer can't reach (for example, |
|
1632 |
+ If there are any resources that your computer can't reach (for |
|
1633 |
+example, |
|
1394 | 1634 |
you are behind a restrictive firewall or content filter), please |
1395 |
- explicitly reject them in your exit policy — otherwise Tor users |
|
1635 |
+ explicitly reject them in your exit policy — otherwise Tor |
|
1636 |
+users |
|
1396 | 1637 |
will be impacted too. |
1397 | 1638 |
</p> |
1398 | 1639 |
|
1399 | 1640 |
<hr> |
1400 | 1641 |
|
1401 | 1642 |
<a id="RelayOrBridge"></a> |
1402 |
- <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal relay or bridge relay?</a></h3> |
|
1643 |
+ <h3><a class="anchor" href="#RelayOrBridge">Should I be a normal |
|
1644 |
+relay or bridge relay?</a></h3> |
|
1403 | 1645 |
|
1404 |
- <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for short) |
|
1405 |
- are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't listed |
|
1646 |
+ <p><a href="<page docs/bridges>">Bridge relays</a> (or "bridges" for |
|
1647 |
+short) |
|
1648 |
+ are <a href="<page docs/tor-doc-relay>">Tor relays</a> that aren't |
|
1649 |
+listed |
|
1406 | 1650 |
in the main Tor directory. That means |
1407 |
- that even an ISP or government trying to filter connections to the Tor |
|
1651 |
+ that even an ISP or government trying to filter connections to the |
|
1652 |
+Tor |
|
1408 | 1653 |
network probably won't be able to block all the bridges. |
1409 | 1654 |
</p> |
1410 | 1655 |
|
... | ... |
@@ -1414,14 +1659,17 @@ use the ReachableAddresses config options, e.g.: |
1414 | 1659 |
</p> |
1415 | 1660 |
|
1416 | 1661 |
<p>Right now, China is the main place in the world that filters |
1417 |
- connections to the Tor network. So bridges are useful a) for users in |
|
1418 |
- China, b) as a backup measure in case the Tor network gets blocked in |
|
1662 |
+ connections to the Tor network. So bridges are useful a) for users |
|
1663 |
+in |
|
1664 |
+ China, b) as a backup measure in case the Tor network gets blocked |
|
1665 |
+in |
|
1419 | 1666 |
more places, and c) for people who want an extra layer of security |
1420 | 1667 |
because they're worried somebody will recognize that it's a public |
1421 | 1668 |
Tor relay IP address they're contacting. |
1422 | 1669 |
</p> |
1423 | 1670 |
|
1424 |
- <p>So should you run a normal relay or bridge relay? If you have lots |
|
1671 |
+ <p>So should you run a normal relay or bridge relay? If you have |
|
1672 |
+lots |
|
1425 | 1673 |
of bandwidth, you should definitely run a normal relay — the |
1426 | 1674 |
average bridge doesn't see much load these days. If you're willing |
1427 | 1675 |
to <a href="#ExitPolicies">be an exit</a>, you should definitely |
... | ... |
@@ -1433,7 +1681,8 @@ use the ReachableAddresses config options, e.g.: |
1433 | 1681 |
<hr> |
1434 | 1682 |
|
1435 | 1683 |
<a id="MultipleRelays"></a> |
1436 |
-<h3><a class="anchor" href="#MultipleRelays">I want to run more than one relay.</a></h3> |
|
1684 |
+<h3><a class="anchor" href="#MultipleRelays">I want to run more than one |
|
1685 |
+relay.</a></h3> |
|
1437 | 1686 |
|
1438 | 1687 |
<p> |
1439 | 1688 |
Great. If you want to run several relays to donate more to the network, |
... | ... |
@@ -1454,7 +1703,8 @@ all the relays (comma-separated) that are under your control: |
1454 | 1703 |
|
1455 | 1704 |
<p> |
1456 | 1705 |
where each fingerprint is the 40 character identity fingerprint (without |
1457 |
-spaces). You can also list them by nickname, but fingerprint is safer. Be |
|
1706 |
+spaces). You can also list them by nickname, but fingerprint is safer. |
|
1707 |
+Be |
|
1458 | 1708 |
sure to prefix the digest strings with a dollar sign ('$') so that the |
1459 | 1709 |
digest is not confused with a nickname in the config file. |
1460 | 1710 |
</p> |
... | ... |
@@ -1469,27 +1719,38 @@ the same geographic location. |
1469 | 1719 |
<hr> |
1470 | 1720 |
|
1471 | 1721 |
<a id="RelayMemory"></a> |
1472 |
- <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using so much memory?</a></h3> |
|
1722 |
+ <h3><a class="anchor" href="#RelayMemory">Why is my Tor relay using |
|
1723 |
+so much memory?</a></h3> |
|
1473 | 1724 |
|
1474 |
- <p>If your Tor relay is using more memory than you'd like, here are some |
|
1725 |
+ <p>If your Tor relay is using more memory than you'd like, here are |
|
1726 |
+some |
|
1475 | 1727 |
tips for reducing its footprint: |
1476 | 1728 |
</p> |
1477 | 1729 |
|
1478 | 1730 |
<ol> |
1479 | 1731 |
<li>If you're on Linux, you may be encountering memory fragmentation |
1480 |
- bugs in glibc's malloc implementation. That is, when Tor releases memory |
|
1481 |
- back to the system, the pieces of memory are fragmented so they're hard |
|
1482 |
- to reuse. The Tor tarball ships with OpenBSD's malloc implementation, |
|
1483 |
- which doesn't have as many fragmentation bugs (but the tradeoff is higher |
|
1484 |
- CPU load). You can tell Tor to use this malloc implementation instead: |
|
1732 |
+ bugs in glibc's malloc implementation. That is, when Tor releases |
|
1733 |
+memory |
|
1734 |
+ back to the system, the pieces of memory are fragmented so they're |
|
1735 |
+hard |
|
1736 |
+ to reuse. The Tor tarball ships with OpenBSD's malloc |
|
1737 |
+implementation, |
|
1738 |
+ which doesn't have as many fragmentation bugs (but the tradeoff is |
|
1739 |
+higher |
|
1740 |
+ CPU load). You can tell Tor to use this malloc implementation |
|
1741 |
+instead: |
|
1485 | 1742 |
<tt>./configure --enable-openbsd-malloc</tt></li> |
1486 | 1743 |
|
1487 |
- <li>If you're running a fast relay, meaning you have many TLS connections |
|
1744 |
+ <li>If you're running a fast relay, meaning you have many TLS |
|
1745 |
+connections |
|
1488 | 1746 |
open, you are probably losing a lot of memory to OpenSSL's internal |
1489 | 1747 |
buffers (38KB+ per socket). We've patched OpenSSL to <a |
1490 |
- href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519.html">release |
|
1748 |
+ |
|
1749 |
+href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519. |
|
1750 |
+html">release |
|
1491 | 1751 |
unused buffer memory more aggressively</a>. If you update to OpenSSL |
1492 |
- 1.0.0 or newer, Tor's build process will automatically recognize and use |
|
1752 |
+ 1.0.0 or newer, Tor's build process will automatically recognize and |
|
1753 |
+use |
|
1493 | 1754 |
this feature.</li> |
1494 | 1755 |
|
1495 | 1756 |
<li>If you're running on Solaris, OpenBSD, NetBSD, or |
... | ... |
@@ -1499,7 +1760,8 @@ the same geographic location. |
1499 | 1760 |
operating system</a>.</li> |
1500 | 1761 |
|
1501 | 1762 |
<li>If you still can't handle the memory load, consider reducing the |
1502 |
- amount of bandwidth your relay advertises. Advertising less bandwidth |
|
1763 |
+ amount of bandwidth your relay advertises. Advertising less |
|
1764 |
+bandwidth |
|
1503 | 1765 |
means you will attract fewer users, so your relay shouldn't grow |
1504 | 1766 |
as large. See the <tt>MaxAdvertisedBandwidth</tt> option in the man |
1505 | 1767 |
page.</li> |
... | ... |
@@ -1507,23 +1769,28 @@ the same geographic location. |
1507 | 1769 |
</ol> |
1508 | 1770 |
|
1509 | 1771 |
<p> |
1510 |
- All of this said, fast Tor relays do use a lot of ram. It is not unusual |
|
1772 |
+ All of this said, fast Tor relays do use a lot of ram. It is not |
|
1773 |
+unusual |
|
1511 | 1774 |
for a fast exit relay to use 500-1000 MB of memory. |
1512 | 1775 |
</p> |
1513 | 1776 |
|
1514 | 1777 |
<hr> |
1515 | 1778 |
|
1516 | 1779 |
<a id="WhyNotNamed"></a> |
1517 |
- <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not named?</a></h3> |
|
1780 |
+ <h3><a class="anchor" href="#WhyNotNamed">Why is my Tor relay not |
|
1781 |
+named?</a></h3> |
|
1518 | 1782 |
|
1519 | 1783 |
<p> |
1520 |
- We currently use these metrics to determine if your relay should be named:<br> |
|
1784 |
+ We currently use these metrics to determine if your relay should be |
|
1785 |
+named:<br> |
|
1521 | 1786 |
</p> |
1522 | 1787 |
<ul> |
1523 |
- <li>The name is not currently mapped to a different key. Existing mappings |
|
1788 |
+ <li>The name is not currently mapped to a different key. Existing |
|
1789 |
+mappings |
|
1524 | 1790 |
are removed after 6 months of inactivity from a relay.</li> |
1525 | 1791 |
<li>The relay must have been around for at least two weeks.</li> |
1526 |
- <li>No other router may have wanted the same name in the past month.</li> |
|
1792 |
+ <li>No other router may have wanted the same name in the past |
|
1793 |
+month.</li> |
|
1527 | 1794 |
</ul> |
1528 | 1795 |
|
1529 | 1796 |
<hr> |
... | ... |
@@ -1555,7 +1823,8 @@ the same geographic location. |
1555 | 1823 |
|
1556 | 1824 |
<p> |
1557 | 1825 |
Note that there can be a tradeoff here between anonymity and |
1558 |
- performance. The Tor network's anonymity comes in part from diversity, |
|
1826 |
+ performance. The Tor network's anonymity comes in part from |
|
1827 |
+diversity, |
|
1559 | 1828 |
so if you are in a position to run your own relay, you will be |
1560 | 1829 |
improving Tor's anonymity more than by donating. At the same time |
1561 | 1830 |
though, economies |
... | ... |
@@ -1568,24 +1837,29 @@ the same geographic location. |
1568 | 1837 |
<hr> |
1569 | 1838 |
|
1570 | 1839 |
<a id="KeyManagement"></a> |
1571 |
- <h3><a class="anchor" href="#KeyManagement">Tell me about all the keys Tor uses.</a></h3> |
|
1840 |
+ <h3><a class="anchor" href="#KeyManagement">Tell me about all the |
|
1841 |
+keys Tor uses.</a></h3> |
|
1572 | 1842 |
|
1573 | 1843 |
<p> |
1574 | 1844 |
Tor uses a variety of different keys, with three goals in mind: 1) |
1575 | 1845 |
encryption to ensure privacy of data within the Tor network, 2) |
1576 | 1846 |
authentication so clients know they're |
1577 |
- talking to the relays they meant to talk to, and 3) signatures to make |
|
1847 |
+ talking to the relays they meant to talk to, and 3) signatures to |
|
1848 |
+make |
|
1578 | 1849 |
sure all clients know the same set of relays. |
1579 | 1850 |
</p> |
1580 | 1851 |
|
1581 | 1852 |
<p> |
1582 |
- <b>Encryption</b>: first, all connections in Tor use TLS link encryption, |
|
1853 |
+ <b>Encryption</b>: first, all connections in Tor use TLS link |
|
1854 |
+encryption, |
|
1583 | 1855 |
so observers can't look inside to see which circuit a given cell is |
1584 |
- intended for. Further, the Tor client establishes an ephemeral encryption |
|
1856 |
+ intended for. Further, the Tor client establishes an ephemeral |
|
1857 |
+encryption |
|
1585 | 1858 |
key with each relay in the circuit; these extra layers of encryption |
1586 | 1859 |
mean that only the exit relay can read |
1587 | 1860 |
the cells. Both sides discard the circuit key when the circuit ends, |
1588 |
- so logging traffic and then breaking into the relay to discover the key |
|
1861 |
+ so logging traffic and then breaking into the relay to discover the |
|
1862 |
+key |
|
1589 | 1863 |
won't work. |
1590 | 1864 |
</p> |
1591 | 1865 |
|
... | ... |
@@ -1604,23 +1879,32 @@ the same geographic location. |
1604 | 1879 |
|
1605 | 1880 |
<p> |
1606 | 1881 |
<b>Coordination</b>: |
1607 |
- How do clients know what the relays are, and how do they know that they |
|
1608 |
- have the right keys for them? Each relay has a long-term public signing |
|
1609 |
- key called the "identity key". Each directory authority additionally has a |
|
1882 |
+ How do clients know what the relays are, and how do they know that |
|
1883 |
+they |
|
1884 |
+ have the right keys for them? Each relay has a long-term public |
|
1885 |
+signing |
|
1886 |
+ key called the "identity key". Each directory authority additionally |
|
1887 |
+has a |
|
1610 | 1888 |
"directory signing key". The directory authorities <a |
1611 | 1889 |
href="<specblob>dir-spec.txt">provide a signed list</a> |
1612 |
- of all the known relays, and in that list are a set of certificates from |
|
1613 |
- each relay (self-signed by their identity key) specifying their keys, |
|
1614 |
- locations, exit policies, and so on. So unless the adversary can control |
|
1890 |
+ of all the known relays, and in that list are a set of certificates |
|
1891 |
+from |
|
1892 |
+ each relay (self-signed by their identity key) specifying their |
|
1893 |
+keys, |
|
1894 |
+ locations, exit policies, and so on. So unless the adversary can |
|
1895 |
+control |
|
1615 | 1896 |
a majority of the directory authorities (as of 2012 there are 8 |
1616 | 1897 |
directory authorities), he can't trick the Tor client into using |
1617 | 1898 |
other Tor relays. |
1618 | 1899 |
</p> |
1619 | 1900 |
|
1620 | 1901 |
<p> |
1621 |
- How do clients know what the directory authorities are? The Tor software |
|
1622 |
- comes with a built-in list of location and public key for each directory |
|
1623 |
- authority. So the only way to trick users into using a fake Tor network |
|
1902 |
+ How do clients know what the directory authorities are? The Tor |
|
1903 |
+software |
|
1904 |
+ comes with a built-in list of location and public key for each |
|
1905 |
+directory |
|
1906 |
+ authority. So the only way to trick users into using a fake Tor |
|
1907 |
+network |
|
1624 | 1908 |
is to give them a specially modified version of the software. |
1625 | 1909 |
</p> |
1626 | 1910 |
|
... | ... |
@@ -1633,23 +1917,30 @@ the same geographic location. |
1633 | 1917 |
</p> |
1634 | 1918 |
|
1635 | 1919 |
<p> |
1636 |
- In order to be certain that it's really signed by us, you need to have |
|
1637 |
- met us in person and gotten a copy of our GPG key fingerprint, or you |
|
1638 |
- need to know somebody who has. If you're concerned about an attack on |
|
1639 |
- this level, we recommend you get involved with the security community |
|
1920 |
+ In order to be certain that it's really signed by us, you need to |
|
1921 |
+have |
|
1922 |
+ met us in person and gotten a copy of our GPG key fingerprint, or |
|
1923 |
+you |
|
1924 |
+ need to know somebody who has. If you're concerned about an attack |
|
1925 |
+on |
|
1926 |
+ this level, we recommend you get involved with the security |
|
1927 |
+community |
|
1640 | 1928 |
and start meeting people. |
1641 | 1929 |
</p> |
1642 | 1930 |
|
1643 | 1931 |
<hr> |
1644 | 1932 |
|
1645 | 1933 |
<a id="EntryGuards"></a> |
1646 |
-<h3><a class="anchor" href="#EntryGuards">What are Entry Guards?</a></h3> |
|
1934 |
+<h3><a class="anchor" href="#EntryGuards">What are Entry |
|
1935 |
+Guards?</a></h3> |
|
1647 | 1936 |
|
1648 | 1937 |
<p> |
1649 | 1938 |
Tor (like all current practical low-latency anonymity designs) fails |
1650 | 1939 |
when the attacker can see both ends of the communications channel. For |
1651 |
-example, suppose the attacker controls or watches the Tor relay you choose |
|
1652 |
-to enter the network, and also controls or watches the website you visit. In |
|
1940 |
+example, suppose the attacker controls or watches the Tor relay you |
|
1941 |
+choose |
|
1942 |
+to enter the network, and also controls or watches the website you |
|
1943 |
+visit. In |
|
1653 | 1944 |
this case, the research community knows no practical low-latency design |
1654 | 1945 |
that can reliably stop the attacker from correlating volume and timing |
1655 | 1946 |
information on the two sides. |
... | ... |
@@ -1663,17 +1954,20 @@ will be able to correlate all traffic you send with probability |
1663 | 1954 |
<i>(c/n)<sup>2</sup></i>. But profiling is, for most users, as bad |
1664 | 1955 |
as being traced all the time: they want to do something often without |
1665 | 1956 |
an attacker noticing, and the attacker noticing once is as bad as the |
1666 |
-attacker noticing more often. Thus, choosing many random entries and exits |
|
1957 |
+attacker noticing more often. Thus, choosing many random entries and |
|
1958 |
+exits |
|
1667 | 1959 |
gives the user no chance of escaping profiling by this kind of attacker. |
1668 | 1960 |
</p> |
1669 | 1961 |
|
1670 | 1962 |
<p> |
1671 |
-The solution is "entry guards": each Tor client selects a few relays at random |
|
1963 |
+The solution is "entry guards": each Tor client selects a few relays at |
|
1964 |
+random |
|
1672 | 1965 |
to use as entry points, and uses only those relays for her first hop. If |
1673 | 1966 |
those relays are not controlled or observed, the attacker can't win, |
1674 | 1967 |
ever, and the user is secure. If those relays <i>are</i> observed or |
1675 | 1968 |
controlled by the attacker, the attacker sees a larger <i>fraction</i> |
1676 |
-of the user's traffic — but still the user is no more profiled than |
|
1969 |
+of the user's traffic — but still the user is no more profiled |
|
1970 |
+than |
|
1677 | 1971 |
before. Thus, the user has some chance (on the order of <i>(n-c)/n</i>) |
1678 | 1972 |
of avoiding profiling, whereas she had none before. |
1679 | 1973 |
</p> |
... | ... |
@@ -1699,50 +1993,66 @@ we move to a "directory guard" design as well. |
1699 | 1993 |
<hr> |
1700 | 1994 |
|
1701 | 1995 |
<a id="EverybodyARelay"></a> |
1702 |
- <h3><a class="anchor" href="#EverybodyARelay">You should make every Tor user be a relay.</a></h3> |
|
1996 |
+ <h3><a class="anchor" href="#EverybodyARelay">You should make every |
|
1997 |
+Tor user be a relay.</a></h3> |
|
1703 | 1998 |
|
1704 | 1999 |
<p> |
1705 | 2000 |
Requiring every Tor user to be a relay would help with scaling the |
1706 | 2001 |
network to handle all our users, and <a |
1707 | 2002 |
href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">running a Tor |
1708 |
- relay may help your anonymity</a>. However, many Tor users cannot be good |
|
1709 |
- relays — for example, some Tor clients operate from behind restrictive |
|
1710 |
- firewalls, connect via modem, or otherwise aren't in a position where they |
|
2003 |
+ relay may help your anonymity</a>. However, many Tor users cannot be |
|
2004 |
+good |
|
2005 |
+ relays — for example, some Tor clients operate from behind |
|
2006 |
+restrictive |
|
2007 |
+ firewalls, connect via modem, or otherwise aren't in a position |
|
2008 |
+where they |
|
1711 | 2009 |
can relay traffic. Providing service to these clients is a critical |
1712 |
- part of providing effective anonymity for everyone, since many Tor users |
|
1713 |
- are subject to these or similar constraints and including these clients |
|
2010 |
+ part of providing effective anonymity for everyone, since many Tor |
|
2011 |
+users |
|
2012 |
+ are subject to these or similar constraints and including these |
|
2013 |
+clients |
|
1714 | 2014 |
increases the size of the anonymity set. |
1715 | 2015 |
</p> |
1716 | 2016 |
|
1717 | 2017 |
<p> |
1718 |
- That said, we do want to encourage Tor users to run relays, so what we |
|
1719 |
- really want to do is simplify the process of setting up and maintaining |
|
1720 |
- a relay. We've made a lot of progress with easy configuration in the past |
|
1721 |
- few years: Vidalia has an easy relay configuration interface, and supports |
|
1722 |
- uPnP too. Tor is good at automatically detecting whether it's reachable and |
|
2018 |
+ That said, we do want to encourage Tor users to run relays, so what |
|
2019 |
+we |
|
2020 |
+ really want to do is simplify the process of setting up and |
|
2021 |
+maintaining |
|
2022 |
+ a relay. We've made a lot of progress with easy configuration in the |
|
2023 |
+past |
|
2024 |
+ few years: Vidalia has an easy relay configuration interface, and |
|
2025 |
+supports |
|
2026 |
+ uPnP too. Tor is good at automatically detecting whether it's |
|
2027 |
+reachable and |
|
1723 | 2028 |
how much bandwidth it can offer. |
1724 | 2029 |
</p> |
1725 | 2030 |
|
1726 | 2031 |
<p> |
1727 |
- There are five steps we need to address before we can do this though: |
|
2032 |
+ There are five steps we need to address before we can do this |
|
2033 |
+though: |
|
1728 | 2034 |
</p> |
1729 | 2035 |
|
1730 | 2036 |
<p> |
1731 | 2037 |
First, we need to make Tor stable as a relay on all common |
1732 | 2038 |
operating systems. The main remaining platform is Windows, |
1733 | 2039 |
and we're mostly there. See Section 4.1 of <a |
1734 |
- href="https://www.torproject.org/press/2008-12-19-roadmap-press-release">our |
|
2040 |
+ |
|
2041 |
+href="https://www.torproject.org/press/2008-12-19-roadmap-press-release" |
|
2042 |
+>our |
|
1735 | 2043 |
development roadmap</a>. |
1736 | 2044 |
</p> |
1737 | 2045 |
|
1738 | 2046 |
<p> |
1739 | 2047 |
Second, we still need to get better at automatically estimating |
1740 | 2048 |
the right amount of bandwidth to allow. See item #7 on the |
1741 |
- <a href="<page getinvolved/volunteer>#Research">research section of the |
|
2049 |
+ <a href="<page getinvolved/volunteer>#Research">research section of |
|
2050 |
+the |
|
1742 | 2051 |
volunteer page</a>: "Tor doesn't work very well when relays |
1743 | 2052 |
have asymmetric bandwidth (e.g. cable or DSL)". It might be that <a |
1744 | 2053 |
href="<page docs/faq>#TransportIPnotTCP">switching |
1745 |
- to UDP transport</a> is the simplest answer here — which alas is |
|
2054 |
+ to UDP transport</a> is the simplest answer here — which alas |
|
2055 |
+is |
|
1746 | 2056 |
not a very simple answer at all. |
1747 | 2057 |
</p> |
1748 | 2058 |
|
... | ... |
@@ -1764,17 +2074,25 @@ we move to a "directory guard" design as well. |
1764 | 2074 |
href="http://freehaven.net/anonbib/#clog-the-queue">different</a> |
1765 | 2075 |
<a href="http://freehaven.net/anonbib/#torta05">research</a> papers |
1766 | 2076 |
describe ways to identify the relays in a circuit by running traffic |
1767 |
- through candidate relays and looking for dips in the traffic while the |
|
1768 |
- circuit is active. These clogging attacks are not that scary in the Tor |
|
1769 |
- context so long as relays are never clients too. But if we're trying to |
|
1770 |
- encourage more clients to turn on relay functionality too (whether as |
|
1771 |
- <a href="<page docs/bridges>">bridge relays</a> or as normal relays), then |
|
1772 |
- we need to understand this threat better and learn how to mitigate it. |
|
1773 |
- </p> |
|
1774 |
- |
|
1775 |
- <p> |
|
1776 |
- Fifth, we might need some sort of incentive scheme to encourage people |
|
1777 |
- to relay traffic for others, and/or to become exit nodes. Here are our |
|
2077 |
+ through candidate relays and looking for dips in the traffic while |
|
2078 |
+the |
|
2079 |
+ circuit is active. These clogging attacks are not that scary in the |
|
2080 |
+Tor |
|
2081 |
+ context so long as relays are never clients too. But if we're trying |
|
2082 |
+to |
|
2083 |
+ encourage more clients to turn on relay functionality too (whether |
|
2084 |
+as |
|
2085 |
+ <a href="<page docs/bridges>">bridge relays</a> or as normal |
|
2086 |
+relays), then |
|
2087 |
+ we need to understand this threat better and learn how to mitigate |
|
2088 |
+it. |
|
2089 |
+ </p> |
|
2090 |
+ |
|
2091 |
+ <p> |
|
2092 |
+ Fifth, we might need some sort of incentive scheme to encourage |
|
2093 |
+people |
|
2094 |
+ to relay traffic for others, and/or to become exit nodes. Here are |
|
2095 |
+our |
|
1778 | 2096 |
<a href="<blog>two-incentive-designs-tor">current |
1779 | 2097 |
thoughts on Tor incentives</a>. |
1780 | 2098 |
</p> |
... | ... |
@@ -1786,13 +2104,15 @@ we move to a "directory guard" design as well. |
1786 | 2104 |
<hr> |
1787 | 2105 |
|
1788 | 2106 |
<a id="TransportIPnotTCP"></a> |
1789 |
-<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all IP packets, not just TCP packets.</a></h3> |
|
2107 |
+<h3><a class="anchor" href="#TransportIPnotTCP">You should transport all |
|
2108 |
+IP packets, not just TCP packets.</a></h3> |
|
1790 | 2109 |
|
1791 | 2110 |
<p> |
1792 | 2111 |
This would be handy, because it would make Tor better able to handle |
1793 | 2112 |
new protocols like VoIP, it could solve the whole need to socksify |
1794 | 2113 |
applications, and it would solve the fact that exit relays need to |
1795 |
-allocate a lot of file descriptors to hold open all the exit connections. |
|
2114 |
+allocate a lot of file descriptors to hold open all the exit |
|
2115 |
+connections. |
|
1796 | 2116 |
</p> |
1797 | 2117 |
|
1798 | 2118 |
<p> |
... | ... |
@@ -1820,7 +2140,8 @@ rather than the DNS server at a user's ISP; thus, we must understand |
1820 | 2140 |
the protocols we are transporting. |
1821 | 2141 |
</li> |
1822 | 2142 |
<li><a |
1823 |
-href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS</a> |
|
2143 |
+href="http://crypto.stanford.edu/~nagendra/projects/dtls/dtls.html">DTLS |
|
2144 |
+</a> |
|
1824 | 2145 |
(datagram TLS) basically has no users, and IPsec sure is big. Once we've |
1825 | 2146 |
picked a transport mechanism, we need to design a new end-to-end Tor |
1826 | 2147 |
protocol for avoiding tagging attacks and other potential anonymity and |
... | ... |
@@ -1830,13 +2151,15 @@ integrity issues now that we allow drops, resends, et cetera. |
1830 | 2151 |
IDS. Our node operators tell us that exit policies are one of the main |
1831 | 2152 |
reasons they're willing to run Tor. Adding an Intrusion Detection System |
1832 | 2153 |
to handle exit policies would increase the security complexity of Tor, |
1833 |
-and would likely not work anyway, as evidenced by the entire field of IDS |
|
2154 |
+and would likely not work anyway, as evidenced by the entire field of |
|
2155 |
+IDS |
|
1834 | 2156 |
and counter-IDS papers. Many potential abuse issues are resolved by the |
1835 | 2157 |
fact that Tor only transports valid TCP streams (as opposed to arbitrary |
1836 | 2158 |
IP including malformed packets and IP floods), so exit policies become |
1837 | 2159 |
even <i>more</i> important as we become able to transport IP packets. We |
1838 | 2160 |
also need to compactly describe exit policies in the Tor directory, |
1839 |
-so clients can predict which nodes will allow their packets to exit — |
|
2161 |
+so clients can predict which nodes will allow their packets to exit |
|
2162 |
+— |
|
1840 | 2163 |
and clients need to predict all the packets they will want to send in |
1841 | 2164 |
a session before picking their exit node! |
1842 | 2165 |
</li> |
... | ... |
@@ -1865,10 +2188,12 @@ list of relays directly, somebody could still make a lot of connections |
1865 | 2188 |
through Tor to a test site and build a list of the addresses they see. |
1866 | 2189 |
</li> |
1867 | 2190 |
|
1868 |
-<li>If people want to block us, we believe that they should be allowed to |
|
2191 |
+<li>If people want to block us, we believe that they should be allowed |
|
2192 |
+to |
|
1869 | 2193 |
do so. Obviously, we would prefer for everybody to allow Tor users to |
1870 | 2194 |
connect to them, but people have the right to decide who their services |
1871 |
-should allow connections from, and if they want to block anonymous users, |
|
2195 |
+should allow connections from, and if they want to block anonymous |
|
2196 |
+users, |
|
1872 | 2197 |
they can. |
1873 | 2198 |
</li> |
1874 | 2199 |
|
... | ... |
@@ -1885,7 +2210,8 @@ spend rethinking their overall approach to privacy and anonymity. |
1885 | 2210 |
<hr> |
1886 | 2211 |
|
1887 | 2212 |
<a id="Criminals"></a> |
1888 |
- <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals to do bad things?</a></h3> |
|
2213 |
+ <h3><a class="anchor" href="#Criminals">Doesn't Tor enable criminals |
|
2214 |
+to do bad things?</a></h3> |
|
1889 | 2215 |
|
1890 | 2216 |
<p> |
1891 | 2217 |
For the answer to this question and others, please see our <a |
... | ... |
@@ -1895,7 +2221,8 @@ spend rethinking their overall approach to privacy and anonymity. |
1895 | 2221 |
<hr> |
1896 | 2222 |
|
1897 | 2223 |
<a id="RespondISP"></a> |
1898 |
- <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP about my exit relay?</a></h3> |
|
2224 |
+ <h3><a class="anchor" href="#RespondISP">How do I respond to my ISP |
|
2225 |
+about my exit relay?</a></h3> |
|
1899 | 2226 |
|
1900 | 2227 |
<p> |
1901 | 2228 |
A collection of templates for successfully responding to ISPs is <a |
1902 | 2229 |