break torbutton frontpage into three pages. next step is to add a header to the faq that explains what the heck is going on.
Roger Dingledine

Roger Dingledine commited on 2008-07-30 21:12:37
Zeige 3 geänderte Dateien mit 440 Einfügungen und 410 Löschungen.

... ...
@@ -0,0 +1,175 @@
1
+## translation metadata
2
+# Revision: $Revision$
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Torbutton FAQ"
6
+
7
+<div class="main-column">
8
+
9
+<!-- PUT CONTENT AFTER THIS TAG -->
10
+
11
+<h2>Torbutton FAQ</h2>
12
+<hr />
13
+
14
+<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong>
15
+
16
+<p>
17
+Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox
18
+Bug 409737</a>, pages can still open popups and perform Javascript redirects
19
+and history access after Tor has been toggled. These popups and redirects can
20
+be blocked, but unfortunately they are indistinguishable from normal user
21
+interactions with the page (such as clicking on links, opening them in new
22
+tabs/windows, or using the history buttons), and so those are blocked as a
23
+side effect. Once that Firefox bug is fixed, this degree of isolation will
24
+become optional (for people who do not want to accidentally click on links and
25
+give away information via referrers). A workaround is to right click on the
26
+link, and open it in a new tab or window. The tab or window won't load
27
+automatically, but you can hit enter in the URL bar, and it will begin
28
+loading. Hitting enter in the URL bar will also reload the page without
29
+clicking the reload button.
30
+</p>
31
+
32
+<strong>My browser is in some weird state where nothing works right!</strong>
33
+
34
+<p>
35
+Try to disable Tor by clicking on the button, and then open a new window. If
36
+that doesn't fix the issue, go to the preferences page and hit 'Restore
37
+Defaults'. This should reset the extension and Firefox to a known good
38
+configuration.  If you can manage to reproduce whatever issue gets your
39
+Firefox wedged, please file details at <a
40
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5">the
41
+bug tracker</a>.
42
+</p>
43
+
44
+<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong>
45
+
46
+<p>
47
+Javascript can do things like wait until you have disabled Tor before trying
48
+to contact its source site, thus revealing your IP address. As such, Torbutton
49
+must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor
50
+state changes from the state that was used to load a given page. These features 
51
+are re-enabled when Torbutton goes back into the state that was used to load
52
+the page, but in some cases (particularly with Javascript and CSS) it is
53
+sometimes not possible to fully recover from the resulting errors, and the
54
+page is broken. Unfortunately, the only thing you can do (and still remain
55
+safe from having your IP address leak) is to reload the page when you toggle
56
+Tor, or just ensure you do all your work in a page before switching tor state.
57
+</p>
58
+
59
+<strong>When I use Tor, Firefox is no longer filling in logins/search boxes
60
+for me. Why?</strong>
61
+
62
+<p>
63
+Currently, this is tied to the "<b>Block history writes during Tor</b>"
64
+setting. If you have enabled that setting, all formfill functionality (both
65
+saving and reading) is disabled. If this bothers you, you can uncheck that
66
+option, but both history and forms will be saved. To prevent history
67
+disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor
68
+history reads if you allow history writing during Tor.
69
+</p>
70
+
71
+<strong>Which Firefox extensions should I avoid using?</strong>
72
+
73
+<p>
74
+This is a tough one. There are thousands of Firefox extensions: making a
75
+complete list of ones that are bad for anonymity is near impossible. However,
76
+here are a few examples that should get you started as to what sorts of
77
+behavior are dangerous.
78
+</p>
79
+
80
+<ol>
81
+ <li>StumbleUpon, et al</li>
82
+ These extensions will send all sorts of information about the websites you
83
+ visit to the stumbleupon servers, and correlate this information with a
84
+ unique identifier. This is obviously terrible for your anonymity.
85
+ More generally, any sort of extension that requires registration, or even
86
+ extensions that provide information about websites you visit should be
87
+ suspect.
88
+
89
+ <li>FoxyProxy</li>
90
+
91
+While FoxyProxy is a nice idea in theory, in practice it is impossible to
92
+configure securely for Tor usage without Torbutton. Like all vanilla third
93
+party proxy plugins, the main risks are <a
94
+href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a>
95
+and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history
96
+disclosure</a>, followed closely by cookie theft by exit nodes and tracking by
97
+adservers (see the <a href="design/index.html#adversary">Torbutton Adversary
98
+Model</a> for more information). However, even with Torbutton installed in
99
+tandem and always enabled, it is still very difficult (though not impossible)
100
+to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only
101
+applies to specific urls, and not to an entire tab, setting FoxyProxy to only
102
+send specific sites through Tor will still allow adservers to still learn your
103
+real IP. Worse, if those sites use offsite logging services such as Google
104
+Analytics, you may still end up in their logs with your real IP. Malicious
105
+exit nodes can also cooperate with sites to inject images into pages that
106
+bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor
107
+is much more viable, but be very careful with the filters you allow. For
108
+example, something as simple as allowing *google* to go via Non-Tor will still
109
+cause you to end up in all the logs of all websites that use Google Analytics!
110
+See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this
111
+question</a> on the FoxyProxy FAQ for more information.
112
+
113
+ <li>NoScript</li>
114
+ Torbutton currently mitigates all known anonymity issues with Javascript.
115
+ While it may be tempting to get better security by disabling Javascript for
116
+ certain sites, you are far better off with an all-or-nothing approach.
117
+ NoScript is exceedingly complicated, and has many subtleties that can surprise
118
+ even advanced users. For example, addons.mozilla.org verifies extension
119
+ integrity via Javascript over https, but downloads them in the clear. Not 
120
+ adding it to your whitelist effectively
121
+ means you are pulling down unverified extensions. Worse still, using NoScript
122
+ can actually disable protections that Torbutton itself provides via
123
+ Javascript, yet still allow malicious exit nodes to compromise your
124
+ anonymity via the default whitelist (which they can spoof to inject any script  they want). 
125
+
126
+</ol>
127
+
128
+<strong>Which Firefox extensions do you recommend?</strong>
129
+<ol>
130
+ <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li>
131
+ Mentioned above, this extension allows more fine-grained referrer spoofing
132
+than Torbutton currently provides. It should break less sites than Torbutton's
133
+referrer spoofing option.
134
+ <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li>
135
+ If you use Tor excessively, and rarely disable it, you probably want to
136
+install this extension to minimize the ability of sites to store long term
137
+identifiers in your cache. This extension applies same origin policy to the
138
+cache, so that elements are retrieved from the cache only if they are fetched
139
+from a document in the same origin domain as the cached element. 
140
+</ol>
141
+
142
+<strong>Are there any other issues I should be concerned about?</strong>
143
+
144
+<p>
145
+There is currently one known unfixed security issue with Torbutton: it is
146
+possible to unmask the javascript hooks that wrap the Date object to conceal
147
+your timezone in Firefox 2, and the timezone masking code does not work at all
148
+on Firefox 3. We are working with the Firefox team to fix one of <a
149
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or
150
+<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a>
151
+to address this. In the meantime, it is possible to set the <b>TZ</b>
152
+environment variable to <b>UTC</b> to cause the browser to use UTC as your
153
+timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the
154
+/usr/bin/firefox script, or edit your system bashrc to do the same. Under
155
+Windows, you can set either a <a
156
+href="http://support.microsoft.com/kb/310519">User or System Environment
157
+Variable</a> for TZ via My Computer's properties. In MacOS, the situation is
158
+<a
159
+href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a
160
+lot more complicated</a>, unfortunately.
161
+</p>
162
+
163
+<p>
164
+In addition, RSS readers such as Firefox Livemarks can perform
165
+periodic fetches. Due to <a
166
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug
167
+436250</a>, there is no way to disable Livemark fetches during Tor. This can
168
+be a problem if you have a lot of custom Livemark urls that can give away
169
+information about your identity.
170
+</p>
171
+
172
+  </div><!-- #main -->
173
+
174
+#include <foot.wmi>
175
+
... ...
@@ -81,12 +81,11 @@ function install (aEvent)
81 81
 </script>
82 82
 
83 83
 <h2>Torbutton</h2>
84
-<hr>
84
+<hr />
85 85
 
86 86
 <strong>Current version:</strong><version-torbutton><br/>
87 87
 <br/>
88 88
 <strong>Authors:</strong> Scott Squires &amp; Mike Perry<br/>
89
-<strong>Email:</strong> squires at freehaven dot net, mikeperry (o) fscked/org<br/>
90 89
 <br/>
91 90
 <strong>Install:</strong>
92 91
 <a href="http://www.torproject.org/torbutton/torbutton-current.xpi"
... ...
@@ -104,9 +103,6 @@ Google search plugins for
104 103
 <a href="/jsreq.html" title="Ref: 14938 (googleCA)"
105 104
  onClick="addOpenSearch('googleuk_web','png','General','14445','g');return false">Google UK</a>.
106 105
 <br/>
107
-<!--
108
-<strong>Install:</strong> <a href="torbutton-1.0.4.xpi">torbutton-1.0.4.xpi</a><br/>
109
--->
110 106
 <strong>Source:</strong> You can <a
111 107
 href="https://svn.torproject.org/svn/torbutton/trunk/">browse the
112 108
 repository</a> or simply unzip the xpi.
... ...
@@ -116,7 +112,7 @@ repository</a> or simply unzip the xpi.
116 112
 <a href="https://svn.torproject.org/svn/torbutton/trunk/src/CHANGELOG">changelog</a> <b>|</b>
117 113
 <a href="https://svn.torproject.org/svn/torbutton/trunk/src/LICENCE">license</a> <b>|</b>
118 114
 <a href="https://svn.torproject.org/svn/torbutton/trunk/src/CREDITS">credits</a> <b>]</b><br/>
119
-<h2>About</h2>
115
+
120 116
 <p>
121 117
 Torbutton is a 1-click way for Firefox users to enable or disable
122 118
 the browser's use of <a href="<page index>">Tor</a>.
... ...
@@ -124,418 +120,24 @@ It adds a panel to the statusbar that says "Tor Enabled" (in green) or
124 120
 "Tor Disabled" (in red).  The user may click on the panel to toggle
125 121
 the status.  If the user (or some other extension) changes the proxy
126 122
 settings, the change is automatically reflected in the statusbar.
127
-</p><p>
128
-Some users may prefer a toolbar button instead of a statusbar panel.  Such
129
-a button is included, and one adds it to the toolbar by right-clicking
130
-on the desired toolbar, selecting "Customize...", and then dragging the
131
-Torbutton icon onto the toolbar.  There is an option in the preferences
132
-to hide the statusbar panel (Tools-&gt;Extensions, select Torbutton,
133
-and click on Preferences).
134
-</p>
135
-<p>
136
-Newer Firefoxes have the ability to send DNS resolves through the socks
137
-proxy, and Torbutton will make use of this feature if it is available
138
-in your version of Firefox.
139 123
 </p>
140 124
 
141
-<a id="FAQ"></a><h2>FAQ</h2>
142
-
143
-<strong>I can't click on links or hit reload after I toggle Tor! Why?</strong>
144
-
145 125
 <p>
146
-Due to <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=409737">Firefox
147
-Bug 409737</a>, pages can still open popups and perform Javascript redirects
148
-and history access after Tor has been toggled. These popups and redirects can
149
-be blocked, but unfortunately they are indistinguishable from normal user
150
-interactions with the page (such as clicking on links, opening them in new
151
-tabs/windows, or using the history buttons), and so those are blocked as a
152
-side effect. Once that Firefox bug is fixed, this degree of isolation will
153
-become optional (for people who do not want to accidentally click on links and
154
-give away information via referrers). A workaround is to right click on the
155
-link, and open it in a new tab or window. The tab or window won't load
156
-automatically, but you can hit enter in the URL bar, and it will begin
157
-loading. Hitting enter in the URL bar will also reload the page without
158
-clicking the reload button.
126
+To keep you safe, Torbutton disables many types of active content. You
127
+can learn more from the <a href="<page torbutton/faq>">Torbutton FAQ</a>,
128
+or read more details in the <a href="<page torbutton/options>">Torbutton
129
+options</a> list.
159 130
 </p>
160 131
 
161
-<strong>My browser is in some weird state where nothing works right!</strong>
162
-
163
-<p>
164
-Try to disable Tor by clicking on the button, and then open a new window. If
165
-that doesn't fix the issue, go to the preferences page and hit 'Restore
166
-Defaults'. This should reset the extension and Firefox to a known good
167
-configuration.  If you can manage to reproduce whatever issue gets your
168
-Firefox wedged, please file details at <a
169
-href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5">the
170
-bug tracker</a>.
171
-</p>
172
-
173
-<strong>When I toggle Tor, my sites that use javascript stop working. Why?</strong>
174
-
175 132
 <p>
176
-Javascript can do things like wait until you have disabled Tor before trying
177
-to contact its source site, thus revealing your IP address. As such, Torbutton
178
-must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor
179
-state changes from the state that was used to load a given page. These features 
180
-are re-enabled when Torbutton goes back into the state that was used to load
181
-the page, but in some cases (particularly with Javascript and CSS) it is
182
-sometimes not possible to fully recover from the resulting errors, and the
183
-page is broken. Unfortunately, the only thing you can do (and still remain
184
-safe from having your IP address leak) is to reload the page when you toggle
185
-Tor, or just ensure you do all your work in a page before switching tor state.
186
-</p>
187
-
188
-<strong>When I use Tor, Firefox is no longer filling in logins/search boxes
189
-for me. Why?</strong>
190
-
191
-<p>
192
-Currently, this is tied to the "<b>Block history writes during Tor</b>"
193
-setting. If you have enabled that setting, all formfill functionality (both
194
-saving and reading) is disabled. If this bothers you, you can uncheck that
195
-option, but both history and forms will be saved. To prevent history
196
-disclosure attacks via Non-Tor usage, it is recommended you disable Non-Tor
197
-history reads if you allow history writing during Tor.
198
-</p>
199
-
200
-<strong>Which Firefox extensions should I avoid using?</strong>
201
-
202
-<p>
203
-This is a tough one. There are thousands of Firefox extensions: making a
204
-complete list of ones that are bad for anonymity is near impossible. However,
205
-here are a few examples that should get you started as to what sorts of
206
-behavior are dangerous.
207
-</p>
208
-
209
-<ol>
210
- <li>StumbleUpon, et al</li>
211
- These extensions will send all sorts of information about the websites you
212
- visit to the stumbleupon servers, and correlate this information with a
213
- unique identifier. This is obviously terrible for your anonymity.
214
- More generally, any sort of extension that requires registration, or even
215
- extensions that provide information about websites you visit should be
216
- suspect.
217
-
218
- <li>FoxyProxy</li>
219
-
220
-While FoxyProxy is a nice idea in theory, in practice it is impossible to
221
-configure securely for Tor usage without Torbutton. Like all vanilla third
222
-party proxy plugins, the main risks are <a
223
-href="http://www.metasploit.com/research/projects/decloak/">plugin leakage</a>
224
-and <a href="http://ha.ckers.org/weird/CSS-history.cgi">history
225
-disclosure</a>, followed closely by cookie theft by exit nodes and tracking by
226
-adservers (see the <a href="design/index.html#adversary">Torbutton Adversary
227
-Model</a> for more information). However, even with Torbutton installed in
228
-tandem and always enabled, it is still very difficult (though not impossible)
229
-to configure FoxyProxy securely. Since FoxyProxy's 'Patterns' mode only
230
-applies to specific urls, and not to an entire tab, setting FoxyProxy to only
231
-send specific sites through Tor will still allow adservers to still learn your
232
-real IP. Worse, if those sites use offsite logging services such as Google
233
-Analytics, you may still end up in their logs with your real IP. Malicious
234
-exit nodes can also cooperate with sites to inject images into pages that
235
-bypass your filters. Setting FoxyProxy to only send certain URLs via Non-Tor
236
-is much more viable, but be very careful with the filters you allow. For
237
-example, something as simple as allowing *google* to go via Non-Tor will still
238
-cause you to end up in all the logs of all websites that use Google Analytics!
239
-See <a href="http://foxyproxy.mozdev.org/faq.html#privacy-01">this
240
-question</a> on the FoxyProxy FAQ for more information.
241
-
242
- <li>NoScript</li>
243
- Torbutton currently mitigates all known anonymity issues with Javascript.
244
- While it may be tempting to get better security by disabling Javascript for
245
- certain sites, you are far better off with an all-or-nothing approach.
246
- NoScript is exceedingly complicated, and has many subtleties that can surprise
247
- even advanced users. For example, addons.mozilla.org verifies extension
248
- integrity via Javascript over https, but downloads them in the clear. Not 
249
- adding it to your whitelist effectively
250
- means you are pulling down unverified extensions. Worse still, using NoScript
251
- can actually disable protections that Torbutton itself provides via
252
- Javascript, yet still allow malicious exit nodes to compromise your
253
- anonymity via the default whitelist (which they can spoof to inject any script  they want). 
254
-
255
-</ol>
256
-
257
-<strong>Which Firefox extensions do you recommend?</strong>
258
-<ol>
259
- <li><a href="https://addons.mozilla.org/firefox/addon/953">RefControl</a></li>
260
- Mentioned above, this extension allows more fine-grained referrer spoofing
261
-than Torbutton currently provides. It should break less sites than Torbutton's
262
-referrer spoofing option.
263
- <li><a href="https://addons.mozilla.org/firefox/addon/1474">SafeCache</a></li>
264
- If you use Tor excessively, and rarely disable it, you probably want to
265
-install this extension to minimize the ability of sites to store long term
266
-identifiers in your cache. This extension applies same origin policy to the
267
-cache, so that elements are retrieved from the cache only if they are fetched
268
-from a document in the same origin domain as the cached element. 
269
-</ol>
270
-
271
-<strong>Are there any other issues I should be concerned about?</strong>
272
-
273
-<p>
274
-There is currently one known unfixed security issue with Torbutton: it is
275
-possible to unmask the javascript hooks that wrap the Date object to conceal
276
-your timezone in Firefox 2, and the timezone masking code does not work at all
277
-on Firefox 3. We are working with the Firefox team to fix one of <a
278
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=392274">Bug 399274</a> or
279
-<a href="https://bugzilla.mozilla.org/show_bug.cgi?id=419598">Bug 419598</a>
280
-to address this. In the meantime, it is possible to set the <b>TZ</b>
281
-environment variable to <b>UTC</b> to cause the browser to use UTC as your
282
-timezone. Under Linux, you can add an <b>export TZ=UTC</b> to the
283
-/usr/bin/firefox script, or edit your system bashrc to do the same. Under
284
-Windows, you can set either a <a
285
-href="http://support.microsoft.com/kb/310519">User or System Environment
286
-Variable</a> for TZ via My Computer's properties. In MacOS, the situation is
287
-<a
288
-href="http://developer.apple.com/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/EnvironmentVars.html#//apple_ref/doc/uid/20002093-BCIJIJBH">a
289
-lot more complicated</a>, unfortunately.
290
-</p>
291
-
292
-<p>
293
-In addition, RSS readers such as Firefox Livemarks can perform
294
-periodic fetches. Due to <a
295
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=436250">Firefox Bug
296
-436250</a>, there is no way to disable Livemark fetches during Tor. This can
297
-be a problem if you have a lot of custom Livemark urls that can give away
298
-information about your identity.
133
+Some users may prefer a toolbar button instead of a statusbar panel.
134
+Torbutton lets you add a toolbar button by right-clicking
135
+on the desired toolbar, selecting "Customize...", and then dragging the
136
+Torbutton icon onto the toolbar.  There is an option in the preferences
137
+to hide the statusbar panel (Tools-&gt;Extensions, select Torbutton,
138
+and click on Preferences).
299 139
 </p>
300 140
 
301
-<h2>Description of Options</h2>
302
-
303
-<p>The development branch of Torbutton adds several new security features to
304
-protect your anonymity from all the major threats the author is aware of. The
305
-defaults should be fine for most people, but in case you are the tweaker type,
306
-or if you prefer to try to outsource some options to more flexible extensions,
307
-here is the complete list. (In an ideal world, these descriptions should all be
308
-tooltips in the extension itself, but Firefox bugs <a
309
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a
310
-href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently
311
-prevent this).</p>
312
-
313
-<ul>
314
- <li>Disable plugins on Tor Usage (crucial)</li>
315
-
316
-  This option is key to Tor security. Plugins perform their own networking
317
-independent of the browser, and many plugins only partially obey even their own
318
-proxy settings.
319
-
320
-  <li>Isolate Dynamic Content to Tor State (crucial)</li>
321
-
322
-  Another crucial option, this setting causes the plugin to disable Javascript
323
-  on tabs that are loaded during a Tor state different than the current one,
324
-  to prevent delayed fetches of injected URLs that contain unique identifiers,
325
-  and to prevent meta-refresh tags from revealing your IP when you turn off
326
-  Tor. It also prevents all fetches from tabs loaded with an opposite Tor
327
-  state. This serves to block non-Javascript dynamic content such as CSS
328
-  popups from revealing your IP address if you disable Tor.
329
-
330
-  <li>Hook Dangerous Javascript (crucial)</li>
331
-
332
-This setting enables the Javascript hooking code. Javascript is injected into
333
-pages to hook the Date object to mask your timezone, and to hook the navigator
334
-object to mask OS and user agent properties not handled by the standard
335
-Firefox user agent override settings.
336
-
337
-  <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li>
338
-
339
-To cut down on the amount of state available to fingerprint users uniquely, 
340
-this pref causes windows to be resized to a multiple of 50 pixels on each
341
-side when Tor is enabled and pages are loaded.
342
-
343
-  <li>Disable Updates During Tor (recommended)</li>
344
-
345
-Under Firefox 2, many extension authors did not update their extensions from 
346
-SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
347
-existing extensions. Since Firefox 3 now enforces encrypted and/or
348
-authenticated updates, this setting is no longer as important as it once
349
-was (though updates do leak information about which extensions you have, it is
350
-fairly infrequent).
351
-
352
-  <li>Disable Search Suggestions during Tor (optional)</li>
353
-
354
-This optional setting governs if you get Google search suggestions during Tor
355
-usage. Since no cookie is transmitted during search suggestions, this is a
356
-relatively benign behavior.
357
-
358
-  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li>
359
-
360
-These settings prevent local html documents from transmitting local files to
361
-arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
362
-force the browser to save arbitrary pages locally (and also inject script into
363
-arbitrary html files you save to disk via Tor), it is probably a good idea to
364
-leave this setting on.
365
-
366
-  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li>
367
-
368
-These two settings allow you to obtain a greater degree of assurance that
369
-after you toggle out of Tor, the pages are really gone and can't perform any
370
-extra network activity. Currently, there is no known way that pages can still
371
-perform activity after toggle, but these options exist as a backup measure
372
-just in case a flaw is discovered. They can also serve as a handy 'Boss
373
-Button' feature for clearing all Tor browsing off your screen in a hurry.
374
-
375
-  <li>Isolate access to history navigation to Tor state (crucial)</li>
376
-
377
-This setting prevents both Javascript and accidental user clicks from causing
378
-the session history to load pages that were fetched in a different Tor state
379
-than the current one. Since this can be used to correlate Tor and Non-Tor
380
-activity and thus determine your IP address, it is marked as a crucial 
381
-setting.
382
-
383
-  <li>Block History Reads during Tor (crucial)</li>
384
-
385
-  Based on code contributed by <a href="http://www.collinjackson.com/">Collin
386
-  Jackson</a>, when enabled and Tor is enabled, this setting prevents the
387
-rendering engine from knowing if certain links were visited.  This mechanism
388
-defeats all document-based history disclosure attacks, including CSS-only
389
-attacks.
390
-
391
-  <li>Block History Reads during Non-Tor (recommended)</li>
392
-
393
-  This setting accomplishes the same but for your Non-Tor activity.
394
-
395
-  <li>Block History Writes during Tor (recommended)</li>
396
-
397
-  This setting prevents the rendering engine from recording visited URLs, and
398
-also disables download manager history. Note that if you allow writing of Tor history,
399
-it is recommended that you disable non-Tor history reads, since malicious
400
-websites you visit without Tor can query your history for .onion sites and
401
-other history recorded during Tor usage (such as Google queries).
402
-
403
-  <li>Block History Writes during Non-Tor (optional)</li>
404
-
405
-This setting also disables recording any history information during Non-Tor
406
-usage.
407
-
408
-<li>Clear History During Tor Toggle (optional)</li>
409
-
410
-  This is an alternate setting to use instead of (or in addition to) blocking
411
-history reads or writes.
412
-
413
-  <li>Block Password+Form saving during Tor/Non-Tor</li>
414
-
415
-  These options govern if the browser writes your passwords and search
416
-  submissions to disk for the given state.
417
-
418
-  <li>Block Tor disk cache and clear all cache on Tor Toggle</li>
419
-
420
-  Since the browser cache can be leveraged to store unique identifiers, cache
421
-must not persist across Tor sessions. This option keeps the memory cache active
422
-during Tor usage for performance, but blocks disk access for caching.
423
-
424
-  <li>Block disk and memory cache during Tor</li>
425
-
426
-  This setting entirely blocks the cache during Tor, but preserves it for
427
-Non-Tor usage.
428
-
429
-  <li>Clear Cookies on Tor Toggle</li>
430
-
431
-  Fully clears all cookies on Tor toggle.
432
-  
433
-  <li>Store Non-Tor cookies in a protected jar</li>
434
-
435
-  This option stores your persistent Non-Tor cookies in a special cookie jar
436
-  file, in case you wish to preserve some cookies. Based on code contributed
437
-  by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is
438
-  compatible with third party extensions that you use to manage your Non-Tor
439
-  cookies. Your Tor cookies will be cleared on toggle, of course.
440
-
441
-  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li>
442
-
443
-  This option stores your persistent Tor and Non-Tor cookies 
444
-  separate cookie jar files. Note that it is a bad idea to keep Tor
445
-  cookies around for any length of time, as they can be retrieved by exit
446
-  nodes that inject spoofed forms into plaintext pages you fetch.
447
-
448
-  <li>Manage My Own Cookies (dangerous)</li>
449
-
450
-  This setting allows you to manage your own cookies with an alternate
451
-extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
452
-since malicious exit nodes can spoof document elements that appear to be from
453
-sites you have preserved cookies for (and can then do things like fetch your
454
-entire gmail inbox, even if you were not using gmail or visiting any google
455
-pages at the time!).
456
- 
457
-  <li>Do not write Tor/Non-Tor cookies to disk</li>
458
-
459
-  These settings prevent Firefox from writing any cookies to disk during the
460
-  corresponding Tor state. If cookie jars are enabled, those jars will
461
-  exist in memory only, and will be cleared when Firefox exits.
462
-
463
-  <li>Disable DOM Storage during Tor usage (crucial)</li>
464
-
465
-  Firefox has recently added the ability to store additional state and
466
-  identifiers in persistent tables, called <a
467
-  href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>.
468
-  Obviously this can compromise your anonymity if stored content can be
469
-  fetched across Tor-state.
470
-
471
-  <li>Clear HTTP auth sessions (recommended)</li>
472
-
473
-  HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
474
-
475
-  <li>Clear cookies on Tor/Non-Tor shutdown</li>
476
-
477
-  These settings install a shutdown handler to clear cookies on Tor
478
-and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
479
-settings, and does in fact clear the corresponding cookie jars.
480
-
481
-  <li>Prevent session store from saving Tor-loaded tabs (recommended)</li>
482
-
483
-  This option augments the session store to prevent it from writing out
484
-  Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
485
-  undo closed tabs. The reason why this setting is recommended is because
486
-  after a session crash, your browser will be in an undefined Tor state, and
487
-  can potentially load a bunch of Tor tabs without Tor. The following option
488
-  is another alternative to protect against this.
489
-
490
-  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li>
491
-
492
-  This setting allows you to choose which Tor state you want the browser to
493
-  start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
494
-
495
-  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li>
496
-
497
-  When Firefox crashes, the Tor state upon restart usually is completely
498
-  random, and depending on your choice for the above option, may load 
499
-  a bunch of tabs in the wrong state. This setting allows you to choose
500
-  which state the crashed session should always be restored in to.
501
-
502
-  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li>
503
-  
504
-  These two settings allow you to control what the Firefox Session Store
505
-  writes to disk. Since the session store state is used to automatically
506
-  load websites after a crash or upgrade, it is advisable not to allow
507
-  Tor tabs to be written to disk, or they may get loaded in Non-Tor
508
-  after a crash (or the reverse, depending upon the crash recovery setting, 
509
-  of course).
510
-  
511
-  <li>Set user agent during Tor usage (crucial)</li>
512
-
513
-  User agent masking is done with the idea of making all Tor users appear
514
-uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
515
-string and supporting navigator.* properties, and this version will remain the
516
-same for all TorButton versions until such time as specific incompatibility
517
-issues are demonstrated. Uniformity of this value is obviously very important
518
-to anonymity. Note that for this option to have full effectiveness, the user
519
-must also allow Hook Dangerous Javascript ensure that the navigator.*
520
-properties are reset correctly.  The browser does not set some of them via the
521
-exposed user agent override preferences.
522
-
523
-  <li>Spoof US English Browser</li>
524
-
525
-This option causes Firefox to send http headers as if it were an English
526
-browser. Useful for internationalized users.
527
-
528
-  <li>Don't send referrer during Tor Usage</li>
529
-
530
-This option disables the referrer header, preventing sites from determining
531
-where you came from to visit them. This can break some sites, however. <a
532
-href="http://www.digg.com">Digg</a> in particular seemed to be broken by this.
533
-A more streamlined, less intrusive version of this option should be available
534
-eventually. In the meantime, <a
535
-href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can
536
-provide this functionality via a default option of <b>Forge</b>.
537
-</ul>
538
-
539 141
   </div><!-- #main -->
540 142
 
541 143
 #include <foot.wmi>
... ...
@@ -0,0 +1,253 @@
1
+## translation metadata
2
+# Revision: $Revision$
3
+# Translation-Priority: 3-low
4
+
5
+#include "head.wmi" TITLE="Torbutton Options"
6
+
7
+<div class="main-column">
8
+
9
+<!-- PUT CONTENT AFTER THIS TAG -->
10
+
11
+<h2>Torbutton Options</h2>
12
+<hr />
13
+
14
+<p>The development branch of Torbutton adds several new security features to
15
+protect your anonymity from all the major threats the author is aware of. The
16
+defaults should be fine for most people, but in case you are the tweaker type,
17
+or if you prefer to try to outsource some options to more flexible extensions,
18
+here is the complete list. (In an ideal world, these descriptions should all be
19
+tooltips in the extension itself, but Firefox bugs <a
20
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=45375">45375</a> and <a
21
+href="https://bugzilla.mozilla.org/show_bug.cgi?id=218223">218223</a> currently
22
+prevent this).</p>
23
+
24
+<ul>
25
+ <li>Disable plugins on Tor Usage (crucial)</li>
26
+
27
+  This option is key to Tor security. Plugins perform their own networking
28
+independent of the browser, and many plugins only partially obey even their own
29
+proxy settings.
30
+
31
+  <li>Isolate Dynamic Content to Tor State (crucial)</li>
32
+
33
+  Another crucial option, this setting causes the plugin to disable Javascript
34
+  on tabs that are loaded during a Tor state different than the current one,
35
+  to prevent delayed fetches of injected URLs that contain unique identifiers,
36
+  and to prevent meta-refresh tags from revealing your IP when you turn off
37
+  Tor. It also prevents all fetches from tabs loaded with an opposite Tor
38
+  state. This serves to block non-Javascript dynamic content such as CSS
39
+  popups from revealing your IP address if you disable Tor.
40
+
41
+  <li>Hook Dangerous Javascript (crucial)</li>
42
+
43
+This setting enables the Javascript hooking code. Javascript is injected into
44
+pages to hook the Date object to mask your timezone, and to hook the navigator
45
+object to mask OS and user agent properties not handled by the standard
46
+Firefox user agent override settings.
47
+
48
+  <li>Resize window dimensions to multiples of 50px on toggle (recommended)</li>
49
+
50
+To cut down on the amount of state available to fingerprint users uniquely, 
51
+this pref causes windows to be resized to a multiple of 50 pixels on each
52
+side when Tor is enabled and pages are loaded.
53
+
54
+  <li>Disable Updates During Tor (recommended)</li>
55
+
56
+Under Firefox 2, many extension authors did not update their extensions from 
57
+SSL-enabled websites. It is possible for malicious Tor nodes to hijack these extensions and replace them with malicious ones, or add malicious code to 
58
+existing extensions. Since Firefox 3 now enforces encrypted and/or
59
+authenticated updates, this setting is no longer as important as it once
60
+was (though updates do leak information about which extensions you have, it is
61
+fairly infrequent).
62
+
63
+  <li>Disable Search Suggestions during Tor (optional)</li>
64
+
65
+This optional setting governs if you get Google search suggestions during Tor
66
+usage. Since no cookie is transmitted during search suggestions, this is a
67
+relatively benign behavior.
68
+
69
+  <li>Block Tor/Non-Tor access to network from file:// urls (recommended)</li>
70
+
71
+These settings prevent local html documents from transmitting local files to
72
+arbitrary websites <a href="http://www.gnucitizen.org/blog/content-disposition-hacking/">under Firefox 2</a>. Since exit nodes can insert headers that
73
+force the browser to save arbitrary pages locally (and also inject script into
74
+arbitrary html files you save to disk via Tor), it is probably a good idea to
75
+leave this setting on.
76
+
77
+  <li>Close all Non-Tor/Tor windows and tabs on toggle (optional)</li>
78
+
79
+These two settings allow you to obtain a greater degree of assurance that
80
+after you toggle out of Tor, the pages are really gone and can't perform any
81
+extra network activity. Currently, there is no known way that pages can still
82
+perform activity after toggle, but these options exist as a backup measure
83
+just in case a flaw is discovered. They can also serve as a handy 'Boss
84
+Button' feature for clearing all Tor browsing off your screen in a hurry.
85
+
86
+  <li>Isolate access to history navigation to Tor state (crucial)</li>
87
+
88
+This setting prevents both Javascript and accidental user clicks from causing
89
+the session history to load pages that were fetched in a different Tor state
90
+than the current one. Since this can be used to correlate Tor and Non-Tor
91
+activity and thus determine your IP address, it is marked as a crucial 
92
+setting.
93
+
94
+  <li>Block History Reads during Tor (crucial)</li>
95
+
96
+  Based on code contributed by <a href="http://www.collinjackson.com/">Collin
97
+  Jackson</a>, when enabled and Tor is enabled, this setting prevents the
98
+rendering engine from knowing if certain links were visited.  This mechanism
99
+defeats all document-based history disclosure attacks, including CSS-only
100
+attacks.
101
+
102
+  <li>Block History Reads during Non-Tor (recommended)</li>
103
+
104
+  This setting accomplishes the same but for your Non-Tor activity.
105
+
106
+  <li>Block History Writes during Tor (recommended)</li>
107
+
108
+  This setting prevents the rendering engine from recording visited URLs, and
109
+also disables download manager history. Note that if you allow writing of Tor history,
110
+it is recommended that you disable non-Tor history reads, since malicious
111
+websites you visit without Tor can query your history for .onion sites and
112
+other history recorded during Tor usage (such as Google queries).
113
+
114
+  <li>Block History Writes during Non-Tor (optional)</li>
115
+
116
+This setting also disables recording any history information during Non-Tor
117
+usage.
118
+
119
+<li>Clear History During Tor Toggle (optional)</li>
120
+
121
+  This is an alternate setting to use instead of (or in addition to) blocking
122
+history reads or writes.
123
+
124
+  <li>Block Password+Form saving during Tor/Non-Tor</li>
125
+
126
+  These options govern if the browser writes your passwords and search
127
+  submissions to disk for the given state.
128
+
129
+  <li>Block Tor disk cache and clear all cache on Tor Toggle</li>
130
+
131
+  Since the browser cache can be leveraged to store unique identifiers, cache
132
+must not persist across Tor sessions. This option keeps the memory cache active
133
+during Tor usage for performance, but blocks disk access for caching.
134
+
135
+  <li>Block disk and memory cache during Tor</li>
136
+
137
+  This setting entirely blocks the cache during Tor, but preserves it for
138
+Non-Tor usage.
139
+
140
+  <li>Clear Cookies on Tor Toggle</li>
141
+
142
+  Fully clears all cookies on Tor toggle.
143
+  
144
+  <li>Store Non-Tor cookies in a protected jar</li>
145
+
146
+  This option stores your persistent Non-Tor cookies in a special cookie jar
147
+  file, in case you wish to preserve some cookies. Based on code contributed
148
+  by <a href="http://www.collinjackson.com/">Collin Jackson</a>. It is
149
+  compatible with third party extensions that you use to manage your Non-Tor
150
+  cookies. Your Tor cookies will be cleared on toggle, of course.
151
+
152
+  <li>Store both Non-Tor and Tor cookies in a protected jar (dangerous)</li>
153
+
154
+  This option stores your persistent Tor and Non-Tor cookies 
155
+  separate cookie jar files. Note that it is a bad idea to keep Tor
156
+  cookies around for any length of time, as they can be retrieved by exit
157
+  nodes that inject spoofed forms into plaintext pages you fetch.
158
+
159
+  <li>Manage My Own Cookies (dangerous)</li>
160
+
161
+  This setting allows you to manage your own cookies with an alternate
162
+extension, such as <a href="https://addons.mozilla.org/firefox/addon/82">CookieCuller</a>. Note that this is particularly dangerous,
163
+since malicious exit nodes can spoof document elements that appear to be from
164
+sites you have preserved cookies for (and can then do things like fetch your
165
+entire gmail inbox, even if you were not using gmail or visiting any google
166
+pages at the time!).
167
+ 
168
+  <li>Do not write Tor/Non-Tor cookies to disk</li>
169
+
170
+  These settings prevent Firefox from writing any cookies to disk during the
171
+  corresponding Tor state. If cookie jars are enabled, those jars will
172
+  exist in memory only, and will be cleared when Firefox exits.
173
+
174
+  <li>Disable DOM Storage during Tor usage (crucial)</li>
175
+
176
+  Firefox has recently added the ability to store additional state and
177
+  identifiers in persistent tables, called <a
178
+  href="http://developer.mozilla.org/docs/DOM:Storage">DOM Storage</a>.
179
+  Obviously this can compromise your anonymity if stored content can be
180
+  fetched across Tor-state.
181
+
182
+  <li>Clear HTTP auth sessions (recommended)</li>
183
+
184
+  HTTP authentication credentials can be probed by exit nodes and used to both confirm that you visit a certain site that uses HTTP auth, and also impersonate you on this site. 
185
+
186
+  <li>Clear cookies on Tor/Non-Tor shutdown</li>
187
+
188
+  These settings install a shutdown handler to clear cookies on Tor
189
+and/or Non-Tor browser shutdown. It is independent of your Clear Private Data
190
+settings, and does in fact clear the corresponding cookie jars.
191
+
192
+  <li>Prevent session store from saving Tor-loaded tabs (recommended)</li>
193
+
194
+  This option augments the session store to prevent it from writing out
195
+  Tor-loaded tabs to disk. Unfortunately, this also disables your ability to 
196
+  undo closed tabs. The reason why this setting is recommended is because
197
+  after a session crash, your browser will be in an undefined Tor state, and
198
+  can potentially load a bunch of Tor tabs without Tor. The following option
199
+  is another alternative to protect against this.
200
+
201
+  <li>On normal startup, set state to: Tor, Non-Tor, Shutdown State</li>
202
+
203
+  This setting allows you to choose which Tor state you want the browser to
204
+  start in normally: Tor, Non-Tor, or whatever state the browser shut down in.
205
+
206
+  <li>On crash recovery or session restored startup, restore via: Tor, Non-Tor</li>
207
+
208
+  When Firefox crashes, the Tor state upon restart usually is completely
209
+  random, and depending on your choice for the above option, may load 
210
+  a bunch of tabs in the wrong state. This setting allows you to choose
211
+  which state the crashed session should always be restored in to.
212
+
213
+  <li>Prevent session store from saving Non-Tor/Tor-loaded tabs</li>
214
+
215
+  These two settings allow you to control what the Firefox Session Store
216
+  writes to disk. Since the session store state is used to automatically
217
+  load websites after a crash or upgrade, it is advisable not to allow
218
+  Tor tabs to be written to disk, or they may get loaded in Non-Tor
219
+  after a crash (or the reverse, depending upon the crash recovery setting, 
220
+  of course).
221
+
222
+  <li>Set user agent during Tor usage (crucial)</li>
223
+
224
+  User agent masking is done with the idea of making all Tor users appear
225
+uniform. A recent Firefox 2.0.0.4 Windows build was chosen to mimic for this
226
+string and supporting navigator.* properties, and this version will remain the
227
+same for all TorButton versions until such time as specific incompatibility
228
+issues are demonstrated. Uniformity of this value is obviously very important
229
+to anonymity. Note that for this option to have full effectiveness, the user
230
+must also allow Hook Dangerous Javascript ensure that the navigator.*
231
+properties are reset correctly.  The browser does not set some of them via the
232
+exposed user agent override preferences.
233
+
234
+  <li>Spoof US English Browser</li>
235
+
236
+This option causes Firefox to send http headers as if it were an English
237
+browser. Useful for internationalized users.
238
+
239
+  <li>Don't send referrer during Tor Usage</li>
240
+
241
+This option disables the referrer header, preventing sites from determining
242
+where you came from to visit them. This can break some sites, however. <a
243
+href="http://www.digg.com">Digg</a> in particular seemed to be broken by this.
244
+A more streamlined, less intrusive version of this option should be available
245
+eventually. In the meantime, <a
246
+href="https://addons.mozilla.org/firefox/addon/953">RefControl</a> can
247
+provide this functionality via a default option of <b>Forge</b>.
248
+</ul>
249
+
250
+    </div><!-- #main -->
251
+
252
+#include <foot.wmi>
253
+
0 254