Roger Dingledine commited on 2008-07-30 21:12:37
Zeige 3 geänderte Dateien mit 440 Einfügungen und 410 Löschungen.
| ... | ... |
@@ -0,0 +1,175 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+# Translation-Priority: 3-low |
|
| 4 |
+ |
|
| 5 |
+#include "head.wmi" TITLE="Torbutton FAQ" |
|
| 6 |
+ |
|
| 7 |
+<div class="main-column"> |
|
| 8 |
+ |
|
| 9 |
+<!-- PUT CONTENT AFTER THIS TAG --> |
|
| 10 |
+ |
|
| 11 |
+<h2>Torbutton FAQ</h2> |
|
| 12 |
+<hr /> |
|
| 13 |
+ |
|
| 14 |
+<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong> |
|
| 15 |
+ |
|
| 16 |
+<p> |
|
| 17 |
+Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
| 18 |
+Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
| 19 |
+and history access after Tor has been toggled. These popups and redirects can |
|
| 20 |
+be blocked, but unfortunately they are indistinguishable from normal user |
|
| 21 |
+interactions with the page (such as clicking on links, opening them in new |
|
| 22 |
+tabs/windows, or using the history buttons), and so those are blocked as a |
|
| 23 |
+side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
| 24 |
+become optional (for people who do not want to accidentally click on links and |
|
| 25 |
+give away information via referrers). A workaround is to right click on the |
|
| 26 |
+link, and open it in a new tab or window. The tab or window won't load |
|
| 27 |
+automatically, but you can hit enter in the URL bar, and it will begin |
|
| 28 |
+loading. Hitting enter in the URL bar will also reload the page without |
|
| 29 |
+clicking the reload button. |
|
| 30 |
+</p> |
|
| 31 |
+ |
|
| 32 |
+<strong>My browser is in some weird state where nothing works right!</strong> |
|
| 33 |
+ |
|
| 34 |
+<p> |
|
| 35 |
+Try to disable Tor by clicking on the button, and then open a new window. If |
|
| 36 |
+that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
| 37 |
+Defaults'. This should reset the extension and Firefox to a known good |
|
| 38 |
+configuration. If you can manage to reproduce whatever issue gets your |
|
| 39 |
+Firefox wedged, please file details at <a |
|
| 40 |
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the |
|
| 41 |
+bug tracker</a>. |
|
| 42 |
+</p> |
|
| 43 |
+ |
|
| 44 |
+<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong> |
|
| 45 |
+ |
|
| 46 |
+<p> |
|
| 47 |
+Javascript can do things like wait until you have disabled Tor before trying |
|
| 48 |
+to contact its source site, thus revealing your IP address. As such, Torbutton |
|
| 49 |
+must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
| 50 |
+state changes from the state that was used to load a given page. These features |
|
| 51 |
+are re-enabled when Torbutton goes back into the state that was used to load |
|
| 52 |
+the page, but in some cases (particularly with Javascript and CSS) it is |
|
| 53 |
+sometimes not possible to fully recover from the resulting errors, and the |
|
| 54 |
+page is broken. Unfortunately, the only thing you can do (and still remain |
|
| 55 |
+safe from having your IP address leak) is to reload the page when you toggle |
|
| 56 |
+Tor, or just ensure you do all your work in a page before switching tor state. |
|
| 57 |
+</p> |
|
| 58 |
+ |
|
| 59 |
+<strong>When I use Tor, Firefox is no longer filling in logins/search boxes |
|
| 60 |
+for me. Why?</strong> |
|
| 61 |
+ |
|
| 62 |
+<p> |
|
| 63 |
+Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
| 64 |
+setting. If you have enabled that setting, all formfill functionality (both |
|
| 65 |
+saving and reading) is disabled. If this bothers you, you can uncheck that |
|
| 66 |
+option, but both history and forms will be saved. To prevent history |
|
| 67 |
+disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
| 68 |
+history reads if you allow history writing during Tor. |
|
| 69 |
+</p> |
|
| 70 |
+ |
|
| 71 |
+<strong>Which Firefox extensions should I avoid using?</strong> |
|
| 72 |
+ |
|
| 73 |
+<p> |
|
| 74 |
+This is a tough one. There are thousands of Firefox extensions: making a |
|
| 75 |
+complete list of ones that are bad for anonymity is near impossible. However, |
|
| 76 |
+here are a few examples that should get you started as to what sorts of |
|
| 77 |
+behavior are dangerous. |
|
| 78 |
+</p> |
|
| 79 |
+ |
|
| 80 |
+<ol> |
|
| 81 |
+ <li>StumbleUpon, et al</li> |
|
| 82 |
+ These extensions will send all sorts of information about the websites you |
|
| 83 |
+ visit to the stumbleupon servers, and correlate this information with a |
|
| 84 |
+ unique identifier. This is obviously terrible for your anonymity. |
|
| 85 |
+ More generally, any sort of extension that requires registration, or even |
|
| 86 |
+ extensions that provide information about websites you visit should be |
|
| 87 |
+ suspect. |
|
| 88 |
+ |
|
| 89 |
+ <li>FoxyProxy</li> |
|
| 90 |
+ |
|
| 91 |
+While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
| 92 |
+configure securely for Tor usage without Torbutton. Like all vanilla third |
|
| 93 |
+party proxy plugins, the main risks are <a |
|
| 94 |
+href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
| 95 |
+and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
| 96 |
+disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
| 97 |
+adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
| 98 |
+Model</a> for more information). However, even with Torbutton installed in |
|
| 99 |
+tandem and always enabled, it is still very difficult (though not impossible) |
|
| 100 |
+to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only |
|
| 101 |
+applies to specific urls, and not to an entire tab, setting FoxyProxy to only |
|
| 102 |
+send specific sites through Tor will still allow adservers to still learn your |
|
| 103 |
+real IP. Worse, if those sites use offsite logging services such as Google |
|
| 104 |
+Analytics, you may still end up in their logs with your real IP. Malicious |
|
| 105 |
+exit nodes can also cooperate with sites to inject images into pages that |
|
| 106 |
+bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor |
|
| 107 |
+is much more viable, but be very careful with the filters you allow. For |
|
| 108 |
+example, something as simple as allowing *google* to go via Non-Tor will still |
|
| 109 |
+cause you to end up in all the logs of all websites that use Google Analytics! |
|
| 110 |
+See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this |
|
| 111 |
+question</a> on the FoxyProxy FAQ for more information. |
|
| 112 |
+ |
|
| 113 |
+ <li>NoScript</li> |
|
| 114 |
+ Torbutton currently mitigates all known anonymity issues with Javascript. |
|
| 115 |
+ While it may be tempting to get better security by disabling Javascript for |
|
| 116 |
+ certain sites, you are far better off with an all-or-nothing approach. |
|
| 117 |
+ NoScript is exceedingly complicated, and has many subtleties that can surprise |
|
| 118 |
+ even advanced users. For example, addons.mozilla.org verifies extension |
|
| 119 |
+ integrity via Javascript over https, but downloads them in the clear. Not |
|
| 120 |
+ adding it to your whitelist effectively |
|
| 121 |
+ means you are pulling down unverified extensions. Worse still, using NoScript |
|
| 122 |
+ can actually disable protections that Torbutton itself provides via |
|
| 123 |
+ Javascript, yet still allow malicious exit nodes to compromise your |
|
| 124 |
+ anonymity via the default whitelist (which they can spoof to inject any script they want). |
|
| 125 |
+ |
|
| 126 |
+</ol> |
|
| 127 |
+ |
|
| 128 |
+<strong>Which Firefox extensions do you recommend?</strong> |
|
| 129 |
+<ol> |
|
| 130 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li> |
|
| 131 |
+ Mentioned above, this extension allows more fine-grained referrer spoofing |
|
| 132 |
+than Torbutton currently provides. It should break less sites than Torbutton's |
|
| 133 |
+referrer spoofing option. |
|
| 134 |
+ <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li> |
|
| 135 |
+ If you use Tor excessively, and rarely disable it, you probably want to |
|
| 136 |
+install this extension to minimize the ability of sites to store long term |
|
| 137 |
+identifiers in your cache. This extension applies same origin policy to the |
|
| 138 |
+cache, so that elements are retrieved from the cache only if they are fetched |
|
| 139 |
+from a document in the same origin domain as the cached element. |
|
| 140 |
+</ol> |
|
| 141 |
+ |
|
| 142 |
+<strong>Are there any other issues I should be concerned about?</strong> |
|
| 143 |
+ |
|
| 144 |
+<p> |
|
| 145 |
+There is currently one known unfixed security issue with Torbutton: it is |
|
| 146 |
+possible to unmask the javascript hooks that wrap the Date object to conceal |
|
| 147 |
+your timezone in Firefox 2, and the timezone masking code does not work at all |
|
| 148 |
+on Firefox 3. We are working with the Firefox team to fix one of <a |
|
| 149 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or |
|
| 150 |
+<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a> |
|
| 151 |
+to address this. In the meantime, it is possible to set the <b>TZ</b> |
|
| 152 |
+environment variable to <b>UTC</b> to cause the browser to use UTC as your |
|
| 153 |
+timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the |
|
| 154 |
+/usr/bin/firefox script, or edit your system bashrc to do the same. Under |
|
| 155 |
+Windows, you can set either a <a |
|
| 156 |
+href="http://support.microsoft.com/kb/310519">User or System Environment |
|
| 157 |
+Variable</a> for TZ via My Computer's properties. In MacOS, the situation is |
|
| 158 |
+<a |
|
| 159 |
+href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a |
|
| 160 |
+lot more complicated</a>, unfortunately. |
|
| 161 |
+</p> |
|
| 162 |
+ |
|
| 163 |
+<p> |
|
| 164 |
+In addition, RSS readers such as Firefox Livemarks can perform |
|
| 165 |
+periodic fetches. Due to <a |
|
| 166 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug |
|
| 167 |
+436250</a>, there is no way to disable Livemark fetches during Tor. This can |
|
| 168 |
+be a problem if you have a lot of custom Livemark urls that can give away |
|
| 169 |
+information about your identity. |
|
| 170 |
+</p> |
|
| 171 |
+ |
|
| 172 |
+ </div><!-- #main --> |
|
| 173 |
+ |
|
| 174 |
+#include <foot.wmi> |
|
| 175 |
+ |
| ... | ... |
@@ -81,12 +81,11 @@ function install (aEvent) |
| 81 | 81 |
</script> |
| 82 | 82 |
|
| 83 | 83 |
<h2>Torbutton</h2> |
| 84 |
-<hr> |
|
| 84 |
+<hr /> |
|
| 85 | 85 |
|
| 86 | 86 |
<strong>Current version:</strong><version-torbutton><br/> |
| 87 | 87 |
<br/> |
| 88 | 88 |
<strong>Authors:</strong> Scott Squires & Mike Perry<br/> |
| 89 |
-<strong>Email:</strong> squires at freehaven dot net, mikeperry (o) fscked/org<br/> |
|
| 90 | 89 |
<br/> |
| 91 | 90 |
<strong>Install:</strong> |
| 92 | 91 |
<a href="http://www.torproject.org/torbutton/torbutton-current.xpi" |
| ... | ... |
@@ -104,9 +103,6 @@ Google search plugins for |
| 104 | 103 |
<a href="/jsreq.html" title="Ref: 14938 (googleCA)" |
| 105 | 104 |
onClick="addOpenSearch('googleuk_web','png','General','14445','g');return false">Google UK</a>.
|
| 106 | 105 |
<br/> |
| 107 |
-<!-- |
|
| 108 |
-<strong>Install:</strong> <a href="torbutton-1.0.4.xpi">torbutton-1.0.4.xpi</a><br/> |
|
| 109 |
---> |
|
| 110 | 106 |
<strong>Source:</strong> You can <a |
| 111 | 107 |
href="https://svn.torproject.org/svn/torbutton/trunk/">browse the |
| 112 | 108 |
repository</a> or simply unzip the xpi. |
| ... | ... |
@@ -116,7 +112,7 @@ repository</a> or simply unzip the xpi. |
| 116 | 112 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CHANGELOG">changelog</a> <b>|</b> |
| 117 | 113 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/LICENCE">license</a> <b>|</b> |
| 118 | 114 |
<a href="https://svn.torproject.org/svn/torbutton/trunk/src/CREDITS">credits</a> <b>]</b><br/> |
| 119 |
-<h2>About</h2> |
|
| 115 |
+ |
|
| 120 | 116 |
<p> |
| 121 | 117 |
Torbutton is a 1-click way for Firefox users to enable or disable |
| 122 | 118 |
the browser's use of <a href="<page index>">Tor</a>. |
| ... | ... |
@@ -124,418 +120,24 @@ It adds a panel to the statusbar that says "Tor Enabled" (in green) or |
| 124 | 120 |
"Tor Disabled" (in red). The user may click on the panel to toggle |
| 125 | 121 |
the status. If the user (or some other extension) changes the proxy |
| 126 | 122 |
settings, the change is automatically reflected in the statusbar. |
| 127 |
-</p><p> |
|
| 128 |
-Some users may prefer a toolbar button instead of a statusbar panel. Such |
|
| 129 |
-a button is included, and one adds it to the toolbar by right-clicking |
|
| 130 |
-on the desired toolbar, selecting "Customize...", and then dragging the |
|
| 131 |
-Torbutton icon onto the toolbar. There is an option in the preferences |
|
| 132 |
-to hide the statusbar panel (Tools->Extensions, select Torbutton, |
|
| 133 |
-and click on Preferences). |
|
| 134 |
-</p> |
|
| 135 |
-<p> |
|
| 136 |
-Newer Firefoxes have the ability to send DNS resolves through the socks |
|
| 137 |
-proxy, and Torbutton will make use of this feature if it is available |
|
| 138 |
-in your version of Firefox. |
|
| 139 | 123 |
</p> |
| 140 | 124 |
|
| 141 |
-<a id="FAQ"></a><h2>FAQ</h2> |
|
| 142 |
- |
|
| 143 |
-<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong> |
|
| 144 |
- |
|
| 145 | 125 |
<p> |
| 146 |
-Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox |
|
| 147 |
-Bug 409737</a>, pages can still open popups and perform Javascript redirects |
|
| 148 |
-and history access after Tor has been toggled. These popups and redirects can |
|
| 149 |
-be blocked, but unfortunately they are indistinguishable from normal user |
|
| 150 |
-interactions with the page (such as clicking on links, opening them in new |
|
| 151 |
-tabs/windows, or using the history buttons), and so those are blocked as a |
|
| 152 |
-side effect. Once that Firefox bug is fixed, this degree of isolation will |
|
| 153 |
-become optional (for people who do not want to accidentally click on links and |
|
| 154 |
-give away information via referrers). A workaround is to right click on the |
|
| 155 |
-link, and open it in a new tab or window. The tab or window won't load |
|
| 156 |
-automatically, but you can hit enter in the URL bar, and it will begin |
|
| 157 |
-loading. Hitting enter in the URL bar will also reload the page without |
|
| 158 |
-clicking the reload button. |
|
| 126 |
+To keep you safe, Torbutton disables many types of active content. You |
|
| 127 |
+can learn more from the <a href="<page torbutton/faq>">Torbutton FAQ</a>, |
|
| 128 |
+or read more details in the <a href="<page torbutton/options>">Torbutton |
|
| 129 |
+options</a> list. |
|
| 159 | 130 |
</p> |
| 160 | 131 |
|
| 161 |
-<strong>My browser is in some weird state where nothing works right!</strong> |
|
| 162 |
- |
|
| 163 |
-<p> |
|
| 164 |
-Try to disable Tor by clicking on the button, and then open a new window. If |
|
| 165 |
-that doesn't fix the issue, go to the preferences page and hit 'Restore |
|
| 166 |
-Defaults'. This should reset the extension and Firefox to a known good |
|
| 167 |
-configuration. If you can manage to reproduce whatever issue gets your |
|
| 168 |
-Firefox wedged, please file details at <a |
|
| 169 |
-href="https://bugs.torproject.org/flyspray/index.php?tasks=all&project=5">the |
|
| 170 |
-bug tracker</a>. |
|
| 171 |
-</p> |
|
| 172 |
- |
|
| 173 |
-<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong> |
|
| 174 |
- |
|
| 175 | 132 |
<p> |
| 176 |
-Javascript can do things like wait until you have disabled Tor before trying |
|
| 177 |
-to contact its source site, thus revealing your IP address. As such, Torbutton |
|
| 178 |
-must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor |
|
| 179 |
-state changes from the state that was used to load a given page. These features |
|
| 180 |
-are re-enabled when Torbutton goes back into the state that was used to load |
|
| 181 |
-the page, but in some cases (particularly with Javascript and CSS) it is |
|
| 182 |
-sometimes not possible to fully recover from the resulting errors, and the |
|
| 183 |
-page is broken. Unfortunately, the only thing you can do (and still remain |
|
| 184 |
-safe from having your IP address leak) is to reload the page when you toggle |
|
| 185 |
-Tor, or just ensure you do all your work in a page before switching tor state. |
|
| 186 |
-</p> |
|
| 187 |
- |
|
| 188 |
-<strong>When I use Tor, Firefox is no longer filling in logins/search boxes |
|
| 189 |
-for me. Why?</strong> |
|
| 190 |
- |
|
| 191 |
-<p> |
|
| 192 |
-Currently, this is tied to the "<b>Block history writes during Tor</b>" |
|
| 193 |
-setting. If you have enabled that setting, all formfill functionality (both |
|
| 194 |
-saving and reading) is disabled. If this bothers you, you can uncheck that |
|
| 195 |
-option, but both history and forms will be saved. To prevent history |
|
| 196 |
-disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor |
|
| 197 |
-history reads if you allow history writing during Tor. |
|
| 198 |
-</p> |
|
| 199 |
- |
|
| 200 |
-<strong>Which Firefox extensions should I avoid using?</strong> |
|
| 201 |
- |
|
| 202 |
-<p> |
|
| 203 |
-This is a tough one. There are thousands of Firefox extensions: making a |
|
| 204 |
-complete list of ones that are bad for anonymity is near impossible. However, |
|
| 205 |
-here are a few examples that should get you started as to what sorts of |
|
| 206 |
-behavior are dangerous. |
|
| 207 |
-</p> |
|
| 208 |
- |
|
| 209 |
-<ol> |
|
| 210 |
- <li>StumbleUpon, et al</li> |
|
| 211 |
- These extensions will send all sorts of information about the websites you |
|
| 212 |
- visit to the stumbleupon servers, and correlate this information with a |
|
| 213 |
- unique identifier. This is obviously terrible for your anonymity. |
|
| 214 |
- More generally, any sort of extension that requires registration, or even |
|
| 215 |
- extensions that provide information about websites you visit should be |
|
| 216 |
- suspect. |
|
| 217 |
- |
|
| 218 |
- <li>FoxyProxy</li> |
|
| 219 |
- |
|
| 220 |
-While FoxyProxy is a nice idea in theory, in practice it is impossible to |
|
| 221 |
-configure securely for Tor usage without Torbutton. Like all vanilla third |
|
| 222 |
-party proxy plugins, the main risks are <a |
|
| 223 |
-href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a> |
|
| 224 |
-and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history |
|
| 225 |
-disclosure</a>, followed closely by cookie theft by exit nodes and tracking by |
|
| 226 |
-adservers (see the <a href="design/index.html#adversary">Torbutton Adversary |
|
| 227 |
-Model</a> for more information). However, even with Torbutton installed in |
|
| 228 |
-tandem and always enabled, it is still very difficult (though not impossible) |
|
| 229 |
-to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only |
|
| 230 |
-applies to specific urls, and not to an entire tab, setting FoxyProxy to only |
|
| 231 |
-send specific sites through Tor will still allow adservers to still learn your |
|
| 232 |
-real IP. Worse, if those sites use offsite logging services such as Google |
|
| 233 |
-Analytics, you may still end up in their logs with your real IP. Malicious |
|
| 234 |
-exit nodes can also cooperate with sites to inject images into pages that |
|
| 235 |
-bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor |
|
| 236 |
-is much more viable, but be very careful with the filters you allow. For |
|
| 237 |
-example, something as simple as allowing *google* to go via Non-Tor will still |
|
| 238 |
-cause you to end up in all the logs of all websites that use Google Analytics! |
|
| 239 |
-See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this |
|
| 240 |
-question</a> on the FoxyProxy FAQ for more information. |
|
| 241 |
- |
|
| 242 |
- <li>NoScript</li> |
|
| 243 |
- Torbutton currently mitigates all known anonymity issues with Javascript. |
|
| 244 |
- While it may be tempting to get better security by disabling Javascript for |
|
| 245 |
- certain sites, you are far better off with an all-or-nothing approach. |
|
| 246 |
- NoScript is exceedingly complicated, and has many subtleties that can surprise |
|
| 247 |
- even advanced users. For example, addons.mozilla.org verifies extension |
|
| 248 |
- integrity via Javascript over https, but downloads them in the clear. Not |
|
| 249 |
- adding it to your whitelist effectively |
|
| 250 |
- means you are pulling down unverified extensions. Worse still, using NoScript |
|
| 251 |
- can actually disable protections that Torbutton itself provides via |
|
| 252 |
- Javascript, yet still allow malicious exit nodes to compromise your |
|
| 253 |
- anonymity via the default whitelist (which they can spoof to inject any script they want). |
|
| 254 |
- |
|
| 255 |
-</ol> |
|
| 256 |
- |
|
| 257 |
-<strong>Which Firefox extensions do you recommend?</strong> |
|
| 258 |
-<ol> |
|
| 259 |
- <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li> |
|
| 260 |
- Mentioned above, this extension allows more fine-grained referrer spoofing |
|
| 261 |
-than Torbutton currently provides. It should break less sites than Torbutton's |
|
| 262 |
-referrer spoofing option. |
|
| 263 |
- <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li> |
|
| 264 |
- If you use Tor excessively, and rarely disable it, you probably want to |
|
| 265 |
-install this extension to minimize the ability of sites to store long term |
|
| 266 |
-identifiers in your cache. This extension applies same origin policy to the |
|
| 267 |
-cache, so that elements are retrieved from the cache only if they are fetched |
|
| 268 |
-from a document in the same origin domain as the cached element. |
|
| 269 |
-</ol> |
|
| 270 |
- |
|
| 271 |
-<strong>Are there any other issues I should be concerned about?</strong> |
|
| 272 |
- |
|
| 273 |
-<p> |
|
| 274 |
-There is currently one known unfixed security issue with Torbutton: it is |
|
| 275 |
-possible to unmask the javascript hooks that wrap the Date object to conceal |
|
| 276 |
-your timezone in Firefox 2, and the timezone masking code does not work at all |
|
| 277 |
-on Firefox 3. We are working with the Firefox team to fix one of <a |
|
| 278 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or |
|
| 279 |
-<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a> |
|
| 280 |
-to address this. In the meantime, it is possible to set the <b>TZ</b> |
|
| 281 |
-environment variable to <b>UTC</b> to cause the browser to use UTC as your |
|
| 282 |
-timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the |
|
| 283 |
-/usr/bin/firefox script, or edit your system bashrc to do the same. Under |
|
| 284 |
-Windows, you can set either a <a |
|
| 285 |
-href="http://support.microsoft.com/kb/310519">User or System Environment |
|
| 286 |
-Variable</a> for TZ via My Computer's properties. In MacOS, the situation is |
|
| 287 |
-<a |
|
| 288 |
-href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a |
|
| 289 |
-lot more complicated</a>, unfortunately. |
|
| 290 |
-</p> |
|
| 291 |
- |
|
| 292 |
-<p> |
|
| 293 |
-In addition, RSS readers such as Firefox Livemarks can perform |
|
| 294 |
-periodic fetches. Due to <a |
|
| 295 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug |
|
| 296 |
-436250</a>, there is no way to disable Livemark fetches during Tor. This can |
|
| 297 |
-be a problem if you have a lot of custom Livemark urls that can give away |
|
| 298 |
-information about your identity. |
|
| 133 |
+Some users may prefer a toolbar button instead of a statusbar panel. |
|
| 134 |
+Torbutton lets you add a toolbar button by right-clicking |
|
| 135 |
+on the desired toolbar, selecting "Customize...", and then dragging the |
|
| 136 |
+Torbutton icon onto the toolbar. There is an option in the preferences |
|
| 137 |
+to hide the statusbar panel (Tools->Extensions, select Torbutton, |
|
| 138 |
+and click on Preferences). |
|
| 299 | 139 |
</p> |
| 300 | 140 |
|
| 301 |
-<h2>Description of Options</h2> |
|
| 302 |
- |
|
| 303 |
-<p>The development branch of Torbutton adds several new security features to |
|
| 304 |
-protect your anonymity from all the major threats the author is aware of. The |
|
| 305 |
-defaults should be fine for most people, but in case you are the tweaker type, |
|
| 306 |
-or if you prefer to try to outsource some options to more flexible extensions, |
|
| 307 |
-here is the complete list. (In an ideal world, these descriptions should all be |
|
| 308 |
-tooltips in the extension itself, but Firefox bugs <a |
|
| 309 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
| 310 |
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
| 311 |
-prevent this).</p> |
|
| 312 |
- |
|
| 313 |
-<ul> |
|
| 314 |
- <li>Disable plugins on Tor Usage (crucial)</li> |
|
| 315 |
- |
|
| 316 |
- This option is key to Tor security. Plugins perform their own networking |
|
| 317 |
-independent of the browser, and many plugins only partially obey even their own |
|
| 318 |
-proxy settings. |
|
| 319 |
- |
|
| 320 |
- <li>Isolate Dynamic Content to Tor State (crucial)</li> |
|
| 321 |
- |
|
| 322 |
- Another crucial option, this setting causes the plugin to disable Javascript |
|
| 323 |
- on tabs that are loaded during a Tor state different than the current one, |
|
| 324 |
- to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
| 325 |
- and to prevent meta-refresh tags from revealing your IP when you turn off |
|
| 326 |
- Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
| 327 |
- state. This serves to block non-Javascript dynamic content such as CSS |
|
| 328 |
- popups from revealing your IP address if you disable Tor. |
|
| 329 |
- |
|
| 330 |
- <li>Hook Dangerous Javascript (crucial)</li> |
|
| 331 |
- |
|
| 332 |
-This setting enables the Javascript hooking code. Javascript is injected into |
|
| 333 |
-pages to hook the Date object to mask your timezone, and to hook the navigator |
|
| 334 |
-object to mask OS and user agent properties not handled by the standard |
|
| 335 |
-Firefox user agent override settings. |
|
| 336 |
- |
|
| 337 |
- <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li> |
|
| 338 |
- |
|
| 339 |
-To cut down on the amount of state available to fingerprint users uniquely, |
|
| 340 |
-this pref causes windows to be resized to a multiple of 50 pixels on each |
|
| 341 |
-side when Tor is enabled and pages are loaded. |
|
| 342 |
- |
|
| 343 |
- <li>Disable Updates During Tor (recommended)</li> |
|
| 344 |
- |
|
| 345 |
-Under Firefox 2, many extension authors did not update their extensions from |
|
| 346 |
-SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
| 347 |
-existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
| 348 |
-authenticated updates, this setting is no longer as important as it once |
|
| 349 |
-was (though updates do leak information about which extensions you have, it is |
|
| 350 |
-fairly infrequent). |
|
| 351 |
- |
|
| 352 |
- <li>Disable Search Suggestions during Tor (optional)</li> |
|
| 353 |
- |
|
| 354 |
-This optional setting governs if you get Google search suggestions during Tor |
|
| 355 |
-usage. Since no cookie is transmitted during search suggestions, this is a |
|
| 356 |
-relatively benign behavior. |
|
| 357 |
- |
|
| 358 |
- <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li> |
|
| 359 |
- |
|
| 360 |
-These settings prevent local html documents from transmitting local files to |
|
| 361 |
-arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
| 362 |
-force the browser to save arbitrary pages locally (and also inject script into |
|
| 363 |
-arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
| 364 |
-leave this setting on. |
|
| 365 |
- |
|
| 366 |
- <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li> |
|
| 367 |
- |
|
| 368 |
-These two settings allow you to obtain a greater degree of assurance that |
|
| 369 |
-after you toggle out of Tor, the pages are really gone and can't perform any |
|
| 370 |
-extra network activity. Currently, there is no known way that pages can still |
|
| 371 |
-perform activity after toggle, but these options exist as a backup measure |
|
| 372 |
-just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
| 373 |
-Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
| 374 |
- |
|
| 375 |
- <li>Isolate access to history navigation to Tor state (crucial)</li> |
|
| 376 |
- |
|
| 377 |
-This setting prevents both Javascript and accidental user clicks from causing |
|
| 378 |
-the session history to load pages that were fetched in a different Tor state |
|
| 379 |
-than the current one. Since this can be used to correlate Tor and Non-Tor |
|
| 380 |
-activity and thus determine your IP address, it is marked as a crucial |
|
| 381 |
-setting. |
|
| 382 |
- |
|
| 383 |
- <li>Block History Reads during Tor (crucial)</li> |
|
| 384 |
- |
|
| 385 |
- Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
| 386 |
- Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
| 387 |
-rendering engine from knowing if certain links were visited. This mechanism |
|
| 388 |
-defeats all document-based history disclosure attacks, including CSS-only |
|
| 389 |
-attacks. |
|
| 390 |
- |
|
| 391 |
- <li>Block History Reads during Non-Tor (recommended)</li> |
|
| 392 |
- |
|
| 393 |
- This setting accomplishes the same but for your Non-Tor activity. |
|
| 394 |
- |
|
| 395 |
- <li>Block History Writes during Tor (recommended)</li> |
|
| 396 |
- |
|
| 397 |
- This setting prevents the rendering engine from recording visited URLs, and |
|
| 398 |
-also disables download manager history. Note that if you allow writing of Tor history, |
|
| 399 |
-it is recommended that you disable non-Tor history reads, since malicious |
|
| 400 |
-websites you visit without Tor can query your history for .onion sites and |
|
| 401 |
-other history recorded during Tor usage (such as Google queries). |
|
| 402 |
- |
|
| 403 |
- <li>Block History Writes during Non-Tor (optional)</li> |
|
| 404 |
- |
|
| 405 |
-This setting also disables recording any history information during Non-Tor |
|
| 406 |
-usage. |
|
| 407 |
- |
|
| 408 |
-<li>Clear History During Tor Toggle (optional)</li> |
|
| 409 |
- |
|
| 410 |
- This is an alternate setting to use instead of (or in addition to) blocking |
|
| 411 |
-history reads or writes. |
|
| 412 |
- |
|
| 413 |
- <li>Block Password+Form saving during Tor/Non-Tor</li> |
|
| 414 |
- |
|
| 415 |
- These options govern if the browser writes your passwords and search |
|
| 416 |
- submissions to disk for the given state. |
|
| 417 |
- |
|
| 418 |
- <li>Block Tor disk cache and clear all cache on Tor Toggle</li> |
|
| 419 |
- |
|
| 420 |
- Since the browser cache can be leveraged to store unique identifiers, cache |
|
| 421 |
-must not persist across Tor sessions. This option keeps the memory cache active |
|
| 422 |
-during Tor usage for performance, but blocks disk access for caching. |
|
| 423 |
- |
|
| 424 |
- <li>Block disk and memory cache during Tor</li> |
|
| 425 |
- |
|
| 426 |
- This setting entirely blocks the cache during Tor, but preserves it for |
|
| 427 |
-Non-Tor usage. |
|
| 428 |
- |
|
| 429 |
- <li>Clear Cookies on Tor Toggle</li> |
|
| 430 |
- |
|
| 431 |
- Fully clears all cookies on Tor toggle. |
|
| 432 |
- |
|
| 433 |
- <li>Store Non-Tor cookies in a protected jar</li> |
|
| 434 |
- |
|
| 435 |
- This option stores your persistent Non-Tor cookies in a special cookie jar |
|
| 436 |
- file, in case you wish to preserve some cookies. Based on code contributed |
|
| 437 |
- by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
| 438 |
- compatible with third party extensions that you use to manage your Non-Tor |
|
| 439 |
- cookies. Your Tor cookies will be cleared on toggle, of course. |
|
| 440 |
- |
|
| 441 |
- <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li> |
|
| 442 |
- |
|
| 443 |
- This option stores your persistent Tor and Non-Tor cookies |
|
| 444 |
- separate cookie jar files. Note that it is a bad idea to keep Tor |
|
| 445 |
- cookies around for any length of time, as they can be retrieved by exit |
|
| 446 |
- nodes that inject spoofed forms into plaintext pages you fetch. |
|
| 447 |
- |
|
| 448 |
- <li>Manage My Own Cookies (dangerous)</li> |
|
| 449 |
- |
|
| 450 |
- This setting allows you to manage your own cookies with an alternate |
|
| 451 |
-extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
| 452 |
-since malicious exit nodes can spoof document elements that appear to be from |
|
| 453 |
-sites you have preserved cookies for (and can then do things like fetch your |
|
| 454 |
-entire gmail inbox, even if you were not using gmail or visiting any google |
|
| 455 |
-pages at the time!). |
|
| 456 |
- |
|
| 457 |
- <li>Do not write Tor/Non-Tor cookies to disk</li> |
|
| 458 |
- |
|
| 459 |
- These settings prevent Firefox from writing any cookies to disk during the |
|
| 460 |
- corresponding Tor state. If cookie jars are enabled, those jars will |
|
| 461 |
- exist in memory only, and will be cleared when Firefox exits. |
|
| 462 |
- |
|
| 463 |
- <li>Disable DOM Storage during Tor usage (crucial)</li> |
|
| 464 |
- |
|
| 465 |
- Firefox has recently added the ability to store additional state and |
|
| 466 |
- identifiers in persistent tables, called <a |
|
| 467 |
- href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
| 468 |
- Obviously this can compromise your anonymity if stored content can be |
|
| 469 |
- fetched across Tor-state. |
|
| 470 |
- |
|
| 471 |
- <li>Clear HTTP auth sessions (recommended)</li> |
|
| 472 |
- |
|
| 473 |
- HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
| 474 |
- |
|
| 475 |
- <li>Clear cookies on Tor/Non-Tor shutdown</li> |
|
| 476 |
- |
|
| 477 |
- These settings install a shutdown handler to clear cookies on Tor |
|
| 478 |
-and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
| 479 |
-settings, and does in fact clear the corresponding cookie jars. |
|
| 480 |
- |
|
| 481 |
- <li>Prevent session store from saving Tor-loaded tabs (recommended)</li> |
|
| 482 |
- |
|
| 483 |
- This option augments the session store to prevent it from writing out |
|
| 484 |
- Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
| 485 |
- undo closed tabs. The reason why this setting is recommended is because |
|
| 486 |
- after a session crash, your browser will be in an undefined Tor state, and |
|
| 487 |
- can potentially load a bunch of Tor tabs without Tor. The following option |
|
| 488 |
- is another alternative to protect against this. |
|
| 489 |
- |
|
| 490 |
- <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li> |
|
| 491 |
- |
|
| 492 |
- This setting allows you to choose which Tor state you want the browser to |
|
| 493 |
- start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
| 494 |
- |
|
| 495 |
- <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li> |
|
| 496 |
- |
|
| 497 |
- When Firefox crashes, the Tor state upon restart usually is completely |
|
| 498 |
- random, and depending on your choice for the above option, may load |
|
| 499 |
- a bunch of tabs in the wrong state. This setting allows you to choose |
|
| 500 |
- which state the crashed session should always be restored in to. |
|
| 501 |
- |
|
| 502 |
- <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li> |
|
| 503 |
- |
|
| 504 |
- These two settings allow you to control what the Firefox Session Store |
|
| 505 |
- writes to disk. Since the session store state is used to automatically |
|
| 506 |
- load websites after a crash or upgrade, it is advisable not to allow |
|
| 507 |
- Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
| 508 |
- after a crash (or the reverse, depending upon the crash recovery setting, |
|
| 509 |
- of course). |
|
| 510 |
- |
|
| 511 |
- <li>Set user agent during Tor usage (crucial)</li> |
|
| 512 |
- |
|
| 513 |
- User agent masking is done with the idea of making all Tor users appear |
|
| 514 |
-uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
| 515 |
-string and supporting navigator.* properties, and this version will remain the |
|
| 516 |
-same for all TorButton versions until such time as specific incompatibility |
|
| 517 |
-issues are demonstrated. Uniformity of this value is obviously very important |
|
| 518 |
-to anonymity. Note that for this option to have full effectiveness, the user |
|
| 519 |
-must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
| 520 |
-properties are reset correctly. The browser does not set some of them via the |
|
| 521 |
-exposed user agent override preferences. |
|
| 522 |
- |
|
| 523 |
- <li>Spoof US English Browser</li> |
|
| 524 |
- |
|
| 525 |
-This option causes Firefox to send http headers as if it were an English |
|
| 526 |
-browser. Useful for internationalized users. |
|
| 527 |
- |
|
| 528 |
- <li>Don't send referrer during Tor Usage</li> |
|
| 529 |
- |
|
| 530 |
-This option disables the referrer header, preventing sites from determining |
|
| 531 |
-where you came from to visit them. This can break some sites, however. <a |
|
| 532 |
-href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
| 533 |
-A more streamlined, less intrusive version of this option should be available |
|
| 534 |
-eventually. In the meantime, <a |
|
| 535 |
-href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
| 536 |
-provide this functionality via a default option of <b>Forge</b>. |
|
| 537 |
-</ul> |
|
| 538 |
- |
|
| 539 | 141 |
</div><!-- #main --> |
| 540 | 142 |
|
| 541 | 143 |
#include <foot.wmi> |
| ... | ... |
@@ -0,0 +1,253 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+# Translation-Priority: 3-low |
|
| 4 |
+ |
|
| 5 |
+#include "head.wmi" TITLE="Torbutton Options" |
|
| 6 |
+ |
|
| 7 |
+<div class="main-column"> |
|
| 8 |
+ |
|
| 9 |
+<!-- PUT CONTENT AFTER THIS TAG --> |
|
| 10 |
+ |
|
| 11 |
+<h2>Torbutton Options</h2> |
|
| 12 |
+<hr /> |
|
| 13 |
+ |
|
| 14 |
+<p>The development branch of Torbutton adds several new security features to |
|
| 15 |
+protect your anonymity from all the major threats the author is aware of. The |
|
| 16 |
+defaults should be fine for most people, but in case you are the tweaker type, |
|
| 17 |
+or if you prefer to try to outsource some options to more flexible extensions, |
|
| 18 |
+here is the complete list. (In an ideal world, these descriptions should all be |
|
| 19 |
+tooltips in the extension itself, but Firefox bugs <a |
|
| 20 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a |
|
| 21 |
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently |
|
| 22 |
+prevent this).</p> |
|
| 23 |
+ |
|
| 24 |
+<ul> |
|
| 25 |
+ <li>Disable plugins on Tor Usage (crucial)</li> |
|
| 26 |
+ |
|
| 27 |
+ This option is key to Tor security. Plugins perform their own networking |
|
| 28 |
+independent of the browser, and many plugins only partially obey even their own |
|
| 29 |
+proxy settings. |
|
| 30 |
+ |
|
| 31 |
+ <li>Isolate Dynamic Content to Tor State (crucial)</li> |
|
| 32 |
+ |
|
| 33 |
+ Another crucial option, this setting causes the plugin to disable Javascript |
|
| 34 |
+ on tabs that are loaded during a Tor state different than the current one, |
|
| 35 |
+ to prevent delayed fetches of injected URLs that contain unique identifiers, |
|
| 36 |
+ and to prevent meta-refresh tags from revealing your IP when you turn off |
|
| 37 |
+ Tor. It also prevents all fetches from tabs loaded with an opposite Tor |
|
| 38 |
+ state. This serves to block non-Javascript dynamic content such as CSS |
|
| 39 |
+ popups from revealing your IP address if you disable Tor. |
|
| 40 |
+ |
|
| 41 |
+ <li>Hook Dangerous Javascript (crucial)</li> |
|
| 42 |
+ |
|
| 43 |
+This setting enables the Javascript hooking code. Javascript is injected into |
|
| 44 |
+pages to hook the Date object to mask your timezone, and to hook the navigator |
|
| 45 |
+object to mask OS and user agent properties not handled by the standard |
|
| 46 |
+Firefox user agent override settings. |
|
| 47 |
+ |
|
| 48 |
+ <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li> |
|
| 49 |
+ |
|
| 50 |
+To cut down on the amount of state available to fingerprint users uniquely, |
|
| 51 |
+this pref causes windows to be resized to a multiple of 50 pixels on each |
|
| 52 |
+side when Tor is enabled and pages are loaded. |
|
| 53 |
+ |
|
| 54 |
+ <li>Disable Updates During Tor (recommended)</li> |
|
| 55 |
+ |
|
| 56 |
+Under Firefox 2, many extension authors did not update their extensions from |
|
| 57 |
+SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to |
|
| 58 |
+existing extensions. Since Firefox 3 now enforces encrypted and/or |
|
| 59 |
+authenticated updates, this setting is no longer as important as it once |
|
| 60 |
+was (though updates do leak information about which extensions you have, it is |
|
| 61 |
+fairly infrequent). |
|
| 62 |
+ |
|
| 63 |
+ <li>Disable Search Suggestions during Tor (optional)</li> |
|
| 64 |
+ |
|
| 65 |
+This optional setting governs if you get Google search suggestions during Tor |
|
| 66 |
+usage. Since no cookie is transmitted during search suggestions, this is a |
|
| 67 |
+relatively benign behavior. |
|
| 68 |
+ |
|
| 69 |
+ <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li> |
|
| 70 |
+ |
|
| 71 |
+These settings prevent local html documents from transmitting local files to |
|
| 72 |
+arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that |
|
| 73 |
+force the browser to save arbitrary pages locally (and also inject script into |
|
| 74 |
+arbitrary html files you save to disk via Tor), it is probably a good idea to |
|
| 75 |
+leave this setting on. |
|
| 76 |
+ |
|
| 77 |
+ <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li> |
|
| 78 |
+ |
|
| 79 |
+These two settings allow you to obtain a greater degree of assurance that |
|
| 80 |
+after you toggle out of Tor, the pages are really gone and can't perform any |
|
| 81 |
+extra network activity. Currently, there is no known way that pages can still |
|
| 82 |
+perform activity after toggle, but these options exist as a backup measure |
|
| 83 |
+just in case a flaw is discovered. They can also serve as a handy 'Boss |
|
| 84 |
+Button' feature for clearing all Tor browsing off your screen in a hurry. |
|
| 85 |
+ |
|
| 86 |
+ <li>Isolate access to history navigation to Tor state (crucial)</li> |
|
| 87 |
+ |
|
| 88 |
+This setting prevents both Javascript and accidental user clicks from causing |
|
| 89 |
+the session history to load pages that were fetched in a different Tor state |
|
| 90 |
+than the current one. Since this can be used to correlate Tor and Non-Tor |
|
| 91 |
+activity and thus determine your IP address, it is marked as a crucial |
|
| 92 |
+setting. |
|
| 93 |
+ |
|
| 94 |
+ <li>Block History Reads during Tor (crucial)</li> |
|
| 95 |
+ |
|
| 96 |
+ Based on code contributed by <a href="http://www.collinjackson.com/">Collin |
|
| 97 |
+ Jackson</a>, when enabled and Tor is enabled, this setting prevents the |
|
| 98 |
+rendering engine from knowing if certain links were visited. This mechanism |
|
| 99 |
+defeats all document-based history disclosure attacks, including CSS-only |
|
| 100 |
+attacks. |
|
| 101 |
+ |
|
| 102 |
+ <li>Block History Reads during Non-Tor (recommended)</li> |
|
| 103 |
+ |
|
| 104 |
+ This setting accomplishes the same but for your Non-Tor activity. |
|
| 105 |
+ |
|
| 106 |
+ <li>Block History Writes during Tor (recommended)</li> |
|
| 107 |
+ |
|
| 108 |
+ This setting prevents the rendering engine from recording visited URLs, and |
|
| 109 |
+also disables download manager history. Note that if you allow writing of Tor history, |
|
| 110 |
+it is recommended that you disable non-Tor history reads, since malicious |
|
| 111 |
+websites you visit without Tor can query your history for .onion sites and |
|
| 112 |
+other history recorded during Tor usage (such as Google queries). |
|
| 113 |
+ |
|
| 114 |
+ <li>Block History Writes during Non-Tor (optional)</li> |
|
| 115 |
+ |
|
| 116 |
+This setting also disables recording any history information during Non-Tor |
|
| 117 |
+usage. |
|
| 118 |
+ |
|
| 119 |
+<li>Clear History During Tor Toggle (optional)</li> |
|
| 120 |
+ |
|
| 121 |
+ This is an alternate setting to use instead of (or in addition to) blocking |
|
| 122 |
+history reads or writes. |
|
| 123 |
+ |
|
| 124 |
+ <li>Block Password+Form saving during Tor/Non-Tor</li> |
|
| 125 |
+ |
|
| 126 |
+ These options govern if the browser writes your passwords and search |
|
| 127 |
+ submissions to disk for the given state. |
|
| 128 |
+ |
|
| 129 |
+ <li>Block Tor disk cache and clear all cache on Tor Toggle</li> |
|
| 130 |
+ |
|
| 131 |
+ Since the browser cache can be leveraged to store unique identifiers, cache |
|
| 132 |
+must not persist across Tor sessions. This option keeps the memory cache active |
|
| 133 |
+during Tor usage for performance, but blocks disk access for caching. |
|
| 134 |
+ |
|
| 135 |
+ <li>Block disk and memory cache during Tor</li> |
|
| 136 |
+ |
|
| 137 |
+ This setting entirely blocks the cache during Tor, but preserves it for |
|
| 138 |
+Non-Tor usage. |
|
| 139 |
+ |
|
| 140 |
+ <li>Clear Cookies on Tor Toggle</li> |
|
| 141 |
+ |
|
| 142 |
+ Fully clears all cookies on Tor toggle. |
|
| 143 |
+ |
|
| 144 |
+ <li>Store Non-Tor cookies in a protected jar</li> |
|
| 145 |
+ |
|
| 146 |
+ This option stores your persistent Non-Tor cookies in a special cookie jar |
|
| 147 |
+ file, in case you wish to preserve some cookies. Based on code contributed |
|
| 148 |
+ by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is |
|
| 149 |
+ compatible with third party extensions that you use to manage your Non-Tor |
|
| 150 |
+ cookies. Your Tor cookies will be cleared on toggle, of course. |
|
| 151 |
+ |
|
| 152 |
+ <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li> |
|
| 153 |
+ |
|
| 154 |
+ This option stores your persistent Tor and Non-Tor cookies |
|
| 155 |
+ separate cookie jar files. Note that it is a bad idea to keep Tor |
|
| 156 |
+ cookies around for any length of time, as they can be retrieved by exit |
|
| 157 |
+ nodes that inject spoofed forms into plaintext pages you fetch. |
|
| 158 |
+ |
|
| 159 |
+ <li>Manage My Own Cookies (dangerous)</li> |
|
| 160 |
+ |
|
| 161 |
+ This setting allows you to manage your own cookies with an alternate |
|
| 162 |
+extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous, |
|
| 163 |
+since malicious exit nodes can spoof document elements that appear to be from |
|
| 164 |
+sites you have preserved cookies for (and can then do things like fetch your |
|
| 165 |
+entire gmail inbox, even if you were not using gmail or visiting any google |
|
| 166 |
+pages at the time!). |
|
| 167 |
+ |
|
| 168 |
+ <li>Do not write Tor/Non-Tor cookies to disk</li> |
|
| 169 |
+ |
|
| 170 |
+ These settings prevent Firefox from writing any cookies to disk during the |
|
| 171 |
+ corresponding Tor state. If cookie jars are enabled, those jars will |
|
| 172 |
+ exist in memory only, and will be cleared when Firefox exits. |
|
| 173 |
+ |
|
| 174 |
+ <li>Disable DOM Storage during Tor usage (crucial)</li> |
|
| 175 |
+ |
|
| 176 |
+ Firefox has recently added the ability to store additional state and |
|
| 177 |
+ identifiers in persistent tables, called <a |
|
| 178 |
+ href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>. |
|
| 179 |
+ Obviously this can compromise your anonymity if stored content can be |
|
| 180 |
+ fetched across Tor-state. |
|
| 181 |
+ |
|
| 182 |
+ <li>Clear HTTP auth sessions (recommended)</li> |
|
| 183 |
+ |
|
| 184 |
+ HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. |
|
| 185 |
+ |
|
| 186 |
+ <li>Clear cookies on Tor/Non-Tor shutdown</li> |
|
| 187 |
+ |
|
| 188 |
+ These settings install a shutdown handler to clear cookies on Tor |
|
| 189 |
+and/or Non-Tor browser shutdown. It is independent of your Clear Private Data |
|
| 190 |
+settings, and does in fact clear the corresponding cookie jars. |
|
| 191 |
+ |
|
| 192 |
+ <li>Prevent session store from saving Tor-loaded tabs (recommended)</li> |
|
| 193 |
+ |
|
| 194 |
+ This option augments the session store to prevent it from writing out |
|
| 195 |
+ Tor-loaded tabs to disk. Unfortunately, this also disables your ability to |
|
| 196 |
+ undo closed tabs. The reason why this setting is recommended is because |
|
| 197 |
+ after a session crash, your browser will be in an undefined Tor state, and |
|
| 198 |
+ can potentially load a bunch of Tor tabs without Tor. The following option |
|
| 199 |
+ is another alternative to protect against this. |
|
| 200 |
+ |
|
| 201 |
+ <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li> |
|
| 202 |
+ |
|
| 203 |
+ This setting allows you to choose which Tor state you want the browser to |
|
| 204 |
+ start in normally: Tor, Non-Tor, or whatever state the browser shut down in. |
|
| 205 |
+ |
|
| 206 |
+ <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li> |
|
| 207 |
+ |
|
| 208 |
+ When Firefox crashes, the Tor state upon restart usually is completely |
|
| 209 |
+ random, and depending on your choice for the above option, may load |
|
| 210 |
+ a bunch of tabs in the wrong state. This setting allows you to choose |
|
| 211 |
+ which state the crashed session should always be restored in to. |
|
| 212 |
+ |
|
| 213 |
+ <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li> |
|
| 214 |
+ |
|
| 215 |
+ These two settings allow you to control what the Firefox Session Store |
|
| 216 |
+ writes to disk. Since the session store state is used to automatically |
|
| 217 |
+ load websites after a crash or upgrade, it is advisable not to allow |
|
| 218 |
+ Tor tabs to be written to disk, or they may get loaded in Non-Tor |
|
| 219 |
+ after a crash (or the reverse, depending upon the crash recovery setting, |
|
| 220 |
+ of course). |
|
| 221 |
+ |
|
| 222 |
+ <li>Set user agent during Tor usage (crucial)</li> |
|
| 223 |
+ |
|
| 224 |
+ User agent masking is done with the idea of making all Tor users appear |
|
| 225 |
+uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this |
|
| 226 |
+string and supporting navigator.* properties, and this version will remain the |
|
| 227 |
+same for all TorButton versions until such time as specific incompatibility |
|
| 228 |
+issues are demonstrated. Uniformity of this value is obviously very important |
|
| 229 |
+to anonymity. Note that for this option to have full effectiveness, the user |
|
| 230 |
+must also allow Hook Dangerous Javascript ensure that the navigator.* |
|
| 231 |
+properties are reset correctly. The browser does not set some of them via the |
|
| 232 |
+exposed user agent override preferences. |
|
| 233 |
+ |
|
| 234 |
+ <li>Spoof US English Browser</li> |
|
| 235 |
+ |
|
| 236 |
+This option causes Firefox to send http headers as if it were an English |
|
| 237 |
+browser. Useful for internationalized users. |
|
| 238 |
+ |
|
| 239 |
+ <li>Don't send referrer during Tor Usage</li> |
|
| 240 |
+ |
|
| 241 |
+This option disables the referrer header, preventing sites from determining |
|
| 242 |
+where you came from to visit them. This can break some sites, however. <a |
|
| 243 |
+href="http://www.digg.com">Digg</a> in particular seemed to be broken by this. |
|
| 244 |
+A more streamlined, less intrusive version of this option should be available |
|
| 245 |
+eventually. In the meantime, <a |
|
| 246 |
+href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can |
|
| 247 |
+provide this functionality via a default option of <b>Forge</b>. |
|
| 248 |
+</ul> |
|
| 249 |
+ |
|
| 250 |
+ </div><!-- #main --> |
|
| 251 |
+ |
|
| 252 |
+#include <foot.wmi> |
|
| 253 |
+ |
|
| 0 | 254 |