Added 4 faq entries: My Tor keeps crashing. What protections does Tor provide? Can exit nodes eavesdrop on communications? Isn't that bad? What is Exit Enclaving?
Matt Pagan

Matt Pagan commited on 2013-12-06 03:57:45
Zeige 1 geänderte Dateien mit 260 Einfügungen und 1 Löschungen.

... ...
@@ -102,6 +102,7 @@ tells
102 102
     <li><a href="#LogLevel">What log level should I use?</a></li>
103 103
     <li><a href="#DoesntWork">Tor is running, but it's not working
104 104
     correctly.</a></li>
105
+    <li><a href="#TorCrash">My Tor keeps crashing.</a></li>
105 106
     <li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at
106 107
     start.</a></li>
107 108
     <li><a href="#ChooseEntryExit">Can I control which nodes (or
... ...
@@ -156,6 +157,11 @@ relay.</a></li>
156 157
 
157 158
     <p>Anonymity and Security:</p>
158 159
     <ul>
160
+    <li><a href="#WhatProtectionsDoesTorProvide">What protections does Tor 
161
+    provide?</a></li>
162
+    <li><a href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop on 
163
+    communications? Isn't that bad? </a></li>
164
+    <li><a href="#ExitEnclaving">What is Exit Enclaving?</a></li>
159 165
     <li><a href="#KeyManagement">Tell me about all the keys Tor
160 166
 uses.</a></li>
161 167
     <li><a href="#EntryGuards">What are Entry Guards?</a></li>
... ...
@@ -1611,6 +1617,91 @@ about what's going wrong?</li>
1611 1617
 
1612 1618
 <hr />
1613 1619
 
1620
+<a id="TorCrash"></a>
1621
+<h3><a class="anchor" href="#TorCrash">My Tor keeps crashing.</a></h3>
1622
+<p>
1623
+ We want to hear from you! There are supposed to be zero crash bugs in Tor. 
1624
+ This FAQ entry describes the best way for you to be helpful to us. But even 
1625
+ if you can't work out all the details, we still want to hear about it, so 
1626
+ we can help you track it down. 
1627
+</p>
1628
+<p>
1629
+First, make sure you're using the latest version of Tor (either the latest 
1630
+stable or the latest development version). 
1631
+</p>
1632
+<p>
1633
+Second, make sure your version of libevent is new enough. We recommend at 
1634
+least libevent 1.3a. 
1635
+</p>
1636
+<p>
1637
+Third, see if there's already an entry for your bug in the <a 
1638
+href="https://bugs.torproject.org/">Tor bugtracker</a>. If so, 
1639
+check if there are any new details that you can add. 
1640
+</p>
1641
+<p>
1642
+Fourth, is the crash repeatable? Can you cause the crash? Can 
1643
+you isolate some of the circumstances or config options that 
1644
+make it happen? How quickly or often does the bug show up? 
1645
+Can you check if it happens with other versions of Tor, for 
1646
+example the latest stable release? 
1647
+</p>
1648
+<p>
1649
+Fifth, what sort of crash do you get? 
1650
+</p>
1651
+<ul>
1652
+<li>
1653
+Does your Tor log include an "assert failure"? If so, please 
1654
+tell us that line, since it helps us figure out what's going on. 
1655
+Tell us the previous couple of log messages as well, especially 
1656
+if they seem important. 
1657
+</li>
1658
+<li>
1659
+If it says "Segmentation fault - core dumped" then you need to 
1660
+do a bit more to track it down. Look for a file like "core" or 
1661
+"tor.core" or "core.12345" in your current directory, or in your 
1662
+Data Directory. If it's there, run "gdb tor core" and then "bt", 
1663
+and include the output. If you can't find a core, run "ulimit -c 
1664
+unlimited", restart Tor, and try to make it crash again. (This core 
1665
+thing will only work on Unix -- alas, tracking down bugs on Windows 
1666
+is harder. If you're on Windows, can you get somebody to duplicate 
1667
+your bug on Unix?)
1668
+</li>
1669
+<li>
1670
+If Tor simply vanishes mysteriously, it probably is a segmentation 
1671
+fault but you're running Tor in the background (as a daemon) so you 
1672
+won't notice. Go look at the end of your log file, and look for a 
1673
+core file as above. If you don't find any good hints, you should 
1674
+consider running Tor in the foreground (from a shell) so you can 
1675
+see how it dies. Warning: if you switch to running Tor in the foreground, 
1676
+you might start using a different torrc file, with a different default 
1677
+Data Directory; see the <a href="#UpgradeOrMove">relay-upgrade FAQ entry</a> 
1678
+for details. 
1679
+</li>
1680
+<li>
1681
+If it's still vanishing mysteriously, perhaps something else is killing it? 
1682
+Do you have resource limits (ulimits) configured that kill off processes 
1683
+sometimes? (This is especially common on OpenBSD.) On Linux, try running 
1684
+"dmesg" to see if the out-of-memory killer removed your process. (Tor will 
1685
+exit cleanly if it notices that it's run out of memory, but in some cases 
1686
+it might not have time to notice.) In very rare circumstances, hardware 
1687
+problems could also be the culprit. 
1688
+</li>
1689
+</ul>
1690
+<p>
1691
+Sixth, if the above ideas don't point out the bug, consider increasing your 
1692
+log level to "loglevel debug". You can look at the log-configuration FAQ 
1693
+entry for instructions on what to put in your torrc file. If it usually 
1694
+takes a long time for the crash to show up, you will want to reserve a whole 
1695
+lot of disk space for the debug log. Alternatively, you could just send 
1696
+debug-level logs to the screen (it's called "stdout" in the torrc), and then 
1697
+when it crashes you'll see the last couple of log lines it had printed. 
1698
+(Note that running with verbose logging like this will slow Tor down 
1699
+considerably, and note also that it's generally not a good idea security-wise 
1700
+to keep logs like this sitting around.) 
1701
+</p>
1702
+
1703
+<hr />
1704
+
1614 1705
 <a id="VidaliaPassword"></a>
1615 1706
 <h3><a class="anchor" href="#VidaliaPassword">Tor/Vidalia prompts for a
1616 1707
 password at start.</a></h3>
... ...
@@ -2610,12 +2701,180 @@ diversity,
2610 2701
     hidden service?</a></h3>
2611 2702
     
2612 2703
     <p>
2613
-    See the ​<a href="https://www.torproject.org/docs/tor-hidden-service.html.en">
2704
+    See the <a href="https://www.torproject.org/docs/tor-hidden-service.html.en">
2614 2705
     official hidden service configuration instructions</a>.
2615 2706
     </p>
2616 2707
 
2617 2708
     <hr>
2618 2709
     
2710
+    <a id="WhatProtectionsDoesTorProvide"></a>
2711
+    <h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What 
2712
+    protections does Tor provide?</a></h3>
2713
+    
2714
+    <p>
2715
+     Internet communication is based on a store-and-forward model that 
2716
+     can be understood in analogy to postal mail: Data is transmitted in 
2717
+     blocks called IP datagrams or packets. Every packet includes a source 
2718
+     IP address (of the sender) and a destination IP address (of the 
2719
+     receiver), just as ordinary letters contain postal addresses of sender 
2720
+     and receiver. The way from sender to receiver involves multiple hops of 
2721
+     routers, where each router inspects the destination IP address and 
2722
+     forwards the packet closer to its destination. Thus, every router 
2723
+     between sender and receiver learns that the sender is communicating 
2724
+     with the receiver. In particular, your local ISP is in the position to 
2725
+     build a complete profile of your Internet usage. In addition, every 
2726
+     server in the Internet that can see any of the packets can profile your 
2727
+     behaviour. 
2728
+    </p>
2729
+    
2730
+    <p>
2731
+    The aim of Tor is to improve your privacy by sending your traffic through 
2732
+    a series of proxies. Your communication is encrypted in multiple layers 
2733
+    and routed via multiple hops through the Tor network to the final 
2734
+    receiver. More details on this process can be found in the <a 
2735
+    href="https://www.torproject.org/about/overview">Tor overview</a>. 
2736
+    Note that all your local ISP can observe now is that you are 
2737
+    communicating with Tor nodes. Similarly, servers in the Internet just 
2738
+    see that they are being contacted by Tor nodes.
2739
+    </p>
2740
+    
2741
+    <p>
2742
+    Generally speaking, Tor aims to solve three privacy problems: 
2743
+    </p>
2744
+    
2745
+    <p>
2746
+    First, Tor prevents websites and other services from learning 
2747
+    your location, which they can use to build databases about your 
2748
+    habits and interests. With Tor, your Internet connections don't 
2749
+    give you away by default -- now you can have the ability to choose, 
2750
+    for each connection, how much information to reveal. 
2751
+    </p>
2752
+    
2753
+    <p>
2754
+    Second, Tor prevents people watching your traffic locally (such as 
2755
+    your ISP) from learning what information you're fetching and where 
2756
+    you're fetching it from. It also stops them from deciding what you're 
2757
+    allowed to learn and publish -- if you can get to any part of the Tor 
2758
+    network, you can reach any site on the Internet.     
2759
+    </p>
2760
+
2761
+    <p>
2762
+    Third, Tor routes your connection through more than one Tor relay 
2763
+    so no single relay can learn what you're up to. Because these relays 
2764
+    are run by different individuals or organizations, distributing trust 
2765
+    provides more security than the old <a href="#Torisdifferent">one hop proxy
2766
+    </a> approach. 
2767
+    </p>
2768
+    
2769
+    <p>
2770
+    Note, however, that there are situations where Tor fails to solve these 
2771
+    privacy problems entirely: see the entry below on <a 
2772
+    href="#AttacksOnOnionRouting">remaining attacks</a>.    
2773
+    </p>
2774
+    
2775
+    <hr>
2776
+    
2777
+    <a id="CanExitNodesEavesdrop"></a>
2778
+    <h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop 
2779
+    on communications? Isn't that bad?</a></h3>
2780
+    
2781
+    <p>
2782
+    Yes, the guy running the exit node can read the bytes that come in and 
2783
+    out there. Tor anonymizes the origin of your traffic, and it makes sure 
2784
+    to encrypt everything inside the Tor network, but it does not magically 
2785
+    encrypt all traffic throughout the Internet. 
2786
+    </p>
2787
+    
2788
+    <p>
2789
+    This is why you should always use end-to-end encryption such as SSL for 
2790
+    sensitive Internet connections. (The corollary to this answer is that if 
2791
+    you are worried about somebody intercepting your traffic and you're 
2792
+    *not* using end-to-end encryption at the application layer, then something 
2793
+    has already gone wrong and you shouldn't be thinking that Tor is the problem.) 
2794
+    </p>
2795
+    
2796
+    <p>
2797
+    Tor does provide a partial solution in a very specific situation, though. 
2798
+    When you make a connection to a destination that also runs a Tor relay, 
2799
+    Tor will automatically extend your circuit so you exit from that circuit. 
2800
+    So for example if Indymedia ran a Tor relay on the same IP address as 
2801
+    their website, people using Tor to get to the Indymedia website would 
2802
+    automatically exit from their Tor relay, thus getting *better* encryption 
2803
+    and authentication properties than just browsing there the normal way. 
2804
+    </p>
2805
+
2806
+    <p>
2807
+    We'd like to make it still work even if the service is nearby the Tor 
2808
+    relay but not on the same IP address. But there are a variety of 
2809
+    technical problems we need to overcome first (the main one being "how 
2810
+    does the Tor client learn which relays are associated with which 
2811
+    websites in a decentralized yet non-gamable way?"). 
2812
+    </p>
2813
+            
2814
+    <hr>
2815
+    
2816
+    <a id="ExitEnclaving"></a>
2817
+    <h3><a class="anchor" href="#ExitEnclaving">What is Exit Enclaving?</a></h3>
2818
+
2819
+    <p>
2820
+    When a machine that runs a Tor relay also runs a public service, such as 
2821
+    a webserver, you can configure Tor to offer Exit Enclaving to that 
2822
+    service. Running an Exit Enclave for all of your services you wish to 
2823
+    be accessible via Tor provides your users the assurance that they will 
2824
+    exit through your server, rather than exiting from a randomly selected 
2825
+    exit node that could be watched. Normally, a tor circuit would end at 
2826
+    an exit node and then that node would make a connection to your service. 
2827
+    Anyone watching that exit node could see the connection to your service, 
2828
+    and be able to snoop on the contents if it were an unencrypted 
2829
+    connection. If you run an Exit Enclave for your service, then the exit 
2830
+    from the Tor network happens on the machine that runs your service, 
2831
+    rather than on an untrusted random node. This works when Tor clients 
2832
+    wishing to connect to this public service extend their their circuit 
2833
+    to exit from the Tor relay running on that same host. For example, if 
2834
+    the server at 1.2.3.4 runs a web server on port 80 and also acts as a 
2835
+    Tor relay configured for Exit Enclaving, then Tor clients wishing to 
2836
+    connect to the webserver will extend their circuit a fourth hop to exit 
2837
+    to port 80 on the Tor relay running on 1.2.3.4. 
2838
+    </p>
2839
+    <p>
2840
+    Exit Enclaving is disabled by default to prevent attackers from 
2841
+    exploiting trust relationships with locally bound services. For 
2842
+    example, often 127.0.0.1 will run services that are not designed to 
2843
+    be shared with the entire world. Sometimes these services will also 
2844
+    be bound to the public IP address, but will only allow connections if 
2845
+    the source address is something trusted, such as 127.0.0.1. 
2846
+    </p>
2847
+    <p>
2848
+    As a result of possible trust issues, relay operators must configure 
2849
+    their exit policy to allow connections to themselves, but they should 
2850
+    do so only when they are certain that this is a feature that they would 
2851
+    like. Once certain, turning off the ExitPolicyRejectPrivate option will 
2852
+    enable Exit Enclaving. An example configuration would be as follows: 
2853
+    </p>
2854
+    <pre>
2855
+    ExitPolicy accept 1.2.3.4:80
2856
+    ExitPolicy reject 127.0.0.1/8
2857
+    ExitPolicyRejectPrivate 0
2858
+    </pre>
2859
+    <p>
2860
+    This option should be used with care as it may expose internal network 
2861
+    blocks that are not meant to be accessible from the outside world or 
2862
+    the Tor network. Please tailor your ExitPolicy to reflect all netblocks 
2863
+    that you want to prohibit access. 
2864
+    </p>
2865
+    <p>
2866
+    This option should be used with care as it may expose internal network 
2867
+    blocks that are not meant to be accessible from the outside world or 
2868
+    the Tor network. Please tailor your ExitPolicy to reflect all netblocks 
2869
+    that you want to prohibit access. 
2870
+    </p>
2871
+    <p>
2872
+    While useful, this behavior may go away in the future because it is 
2873
+    imperfect. A great idea but not such a great implementation. 
2874
+    </p>
2875
+
2876
+    <hr>
2877
+    
2619 2878
     <a id="KeyManagement"></a>
2620 2879
     <h3><a class="anchor" href="#KeyManagement">Tell me about all the
2621 2880
 keys Tor uses.</a></h3>
2622 2881