Matt Pagan commited on 2013-12-10 22:46:42
Zeige 3 geänderte Dateien mit 84 Einfügungen und 35 Löschungen.
... | ... |
@@ -77,10 +77,7 @@ allow JavaScript by default in the Tor Browser Bundle? Isn't that |
77 | 77 |
unsafe?</a></li> |
78 | 78 |
<li><a href="#TBBOtherBrowser">I want to use Chrome/IE/Opera/etc |
79 | 79 |
with Tor.</a></li> |
80 |
- <li><a href="#TorbuttonOtherBrowser">Will Torbutton be available |
|
81 |
- for other browsers?</a></li> |
|
82 |
- <li><a href="#NoDataScrubbing">Does Tor remove personal information |
|
83 |
- from the data my application sends?</a></li> |
|
80 |
+ <li><a href="#TorbuttonOtherBrowser">Will Torbutton be available for other browsers?</a></li> |
|
84 | 81 |
<li><a href="#TBBCloseBrowser">I want to leave Tor Browser Bundle |
85 | 82 |
running but close the browser.</a></li> |
86 | 83 |
|
... | ... |
@@ -203,6 +200,10 @@ packets, |
203 | 200 |
websites, not just IP addresses.</a></li> |
204 | 201 |
<li><a href="#BlockContent">You should change Tor to prevent users from |
205 | 202 |
posting certain content.</a></li> |
203 |
+ <li><a href="#SendPadding">You should send padding so it's more secure. |
|
204 |
+ </a></li> |
|
205 |
+ <li><a href="#Steganography">You should use steganography to hide Tor |
|
206 |
+ traffic.</a></li> |
|
206 | 207 |
<li><a href="#IPv6">Tor should support IPv6.</a></li> |
207 | 208 |
</ul> |
208 | 209 |
|
... | ... |
@@ -1235,33 +1236,14 @@ horizon. |
1235 | 1236 |
<hr> |
1236 | 1237 |
|
1237 | 1238 |
<a id="TorbuttonOtherBrowser"></a> |
1238 |
-<h3><a class="anchor" href="#TorbuttonOtherBrowser"> |
|
1239 |
-Will Torbutton be available for other browsers?</a></h3> |
|
1239 |
+<h3><a class="anchor" href="TorbuttonOtherBrowser"> |
|
1240 |
+Will Torbutton be available for other browsers?</a></h3> |
|
1240 | 1241 |
|
1241 | 1242 |
<p> |
1242 |
- We don't support IE, Opera or Safari and never plan to. There are too many |
|
1243 |
- ways that your privacy can go wrong with those browsers, and because of |
|
1244 |
- their closed design it is really hard for us to do anything to change these |
|
1245 |
- privacy problems. |
|
1243 |
+ We don't support IE, Opera or Safari and never plan to. There are too many ways that your privacy can go wrong with those browsers, and because of their closed design it is really hard for us to do anything to change these privacy problems. |
|
1246 | 1244 |
</p> |
1247 | 1245 |
<p> |
1248 |
-We are working with the Chrome people to modify Chrome's internals so that |
|
1249 |
-we can eventually support it. But for now, Firefox is the only safe choice. |
|
1250 |
-</p> |
|
1251 |
- |
|
1252 |
-<hr> |
|
1253 |
- |
|
1254 |
-<a id="NoDataScrubbing"></a> |
|
1255 |
-<h3><a class="anchor" href="#NoDataScrubbing"> |
|
1256 |
-Does Tor remove personal information from the data my application sends? |
|
1257 |
-</a></h3> |
|
1258 |
-<p> |
|
1259 |
-No, it doesn't. You need to use a separate program that understands your |
|
1260 |
-application and protocol and knows how to clean or "scrub" the data it |
|
1261 |
-sends. Privoxy is an example of this for web browsing. But note that even |
|
1262 |
-Privoxy won't protect you completely: you may still fall victim to viruses, |
|
1263 |
-Java Script attacks, etc; and Privoxy can't do anything about text that you |
|
1264 |
-type into forms. Be careful and be smart. |
|
1246 |
+We are working with the Chrome people to modify Chrome's internals so that we can eventually support it. But for now, Firefox is the only safe choice. |
|
1265 | 1247 |
</p> |
1266 | 1248 |
|
1267 | 1249 |
<hr> |
... | ... |
@@ -3568,6 +3550,71 @@ only solution is to have no opinion. |
3568 | 3550 |
|
3569 | 3551 |
<hr> |
3570 | 3552 |
|
3553 |
+ <a id="SendPadding"></a> |
|
3554 |
+ <h3><a class="anchor" href="#SendPadding">You should send padding so it's |
|
3555 |
+ more secure.</a></h3> |
|
3556 |
+ |
|
3557 |
+ <p> |
|
3558 |
+ Like all anonymous communication networks that are fast enough for web |
|
3559 |
+ browsing, Tor is vulnerable to statistical "traffic confirmation" |
|
3560 |
+ attacks, where the adversary watches traffic at both ends of a circuit |
|
3561 |
+ and confirms his guess that they're communicating. It would be really |
|
3562 |
+ nice if we could use cover traffic to confuse this attack. But there |
|
3563 |
+ are three problems here: |
|
3564 |
+ </p> |
|
3565 |
+ |
|
3566 |
+ <ul> |
|
3567 |
+ <li> |
|
3568 |
+ Cover traffic is really expensive. And *every* user needs to be doing |
|
3569 |
+ it. This adds up to a lot of extra bandwidth cost for our volunteer |
|
3570 |
+ operators, and they're already pushed to the limit. |
|
3571 |
+ </li> |
|
3572 |
+ <li> |
|
3573 |
+ You'd need to always be sending traffic, meaning you'd need to always |
|
3574 |
+ be online. Otherwise, you'd need to be sending end-to-end cover |
|
3575 |
+ traffic -- not just to the first hop, but all the way to your final |
|
3576 |
+ destination -- to prevent the adversary from correlating presence of |
|
3577 |
+ traffic at the destination to times when you're online. What does it |
|
3578 |
+ mean to send cover traffic to -- and from -- a web server? That is not |
|
3579 |
+ supported in most protocols. |
|
3580 |
+ </li> |
|
3581 |
+ <li> |
|
3582 |
+ Even if you *could* send full end-to-end padding between all users and |
|
3583 |
+ all destinations all the time, you're *still* vulnerable to active |
|
3584 |
+ attacks that block the padding for a short time at one end and look for |
|
3585 |
+ patterns later in the path. |
|
3586 |
+ </li> |
|
3587 |
+ </ul> |
|
3588 |
+ |
|
3589 |
+ <p> |
|
3590 |
+ In short, for a system like Tor that aims to be fast, we don't see any |
|
3591 |
+ use for padding, and it would definitely be a serious usability problem. |
|
3592 |
+ We hope that one day somebody will prove us wrong, but we are not |
|
3593 |
+ optimistic. |
|
3594 |
+ </p> |
|
3595 |
+ |
|
3596 |
+ <hr> |
|
3597 |
+ |
|
3598 |
+ <a id="Steganography"></a> |
|
3599 |
+ <h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor |
|
3600 |
+ traffic.</a></h3> |
|
3601 |
+ |
|
3602 |
+ <p> |
|
3603 |
+ Many people suggest that we should use steganography to make it hard |
|
3604 |
+ to notice Tor connections on the Internet. There are a few problems |
|
3605 |
+ with this idea though: |
|
3606 |
+ </p> |
|
3607 |
+ |
|
3608 |
+ <p> |
|
3609 |
+ First, in the current network topology, the Tor relays list <a |
|
3610 |
+ href="#HideExits">is public</a> and can be accessed by attackers. |
|
3611 |
+ An attacker who wants to detect or block anonymous users could |
|
3612 |
+ always just notice <b>any connection</b> to or from a Tor relay's |
|
3613 |
+ IP address. |
|
3614 |
+ </p> |
|
3615 |
+ |
|
3616 |
+ <hr> |
|
3617 |
+ |
|
3571 | 3618 |
<a id="IPv6"></a> |
3572 | 3619 |
<h3><a class="anchor" href="#IPv6">Tor should support IPv6.</a></h3> |
3573 | 3620 |
|
... | ... |
@@ -3577,8 +3624,8 @@ only solution is to have no opinion. |
3577 | 3624 |
Second, Tor needs to support Tor relays that only have IPv6 addresses. |
3578 | 3625 |
</p> |
3579 | 3626 |
<p> |
3580 |
-The first is far easier: the protocol changes are relatively simple and isolated. |
|
3581 |
-It would be like another kind of exit policy. |
|
3627 |
+ The first is far easier: the protocol changes are relatively simple and |
|
3628 |
+ isolated. It would be like another kind of exit policy. |
|
3582 | 3629 |
</p> |
3583 | 3630 |
<p> |
3584 | 3631 |
The second is a little harder: right now, we assume that (mostly) every |
... | ... |
@@ -3589,8 +3636,10 @@ makes it possible for the attacker to make some inferences about client |
3589 | 3636 |
paths that it would not be able to make otherwise. |
3590 | 3637 |
</p> |
3591 | 3638 |
<p> |
3592 |
-There is an IPv6 exit proposal to address the first step for anonymous |
|
3593 |
-access to IPv6 resources on the Internet. |
|
3639 |
+ There is an <a |
|
3640 |
+ href="https://gitweb.torproject.org/tor.git/blob/HEAD:/doc/spec/proposals/117-ipv6-exits.txt"> |
|
3641 |
+ IPv6 exit proposal</a> to address the first step for anonymous access to |
|
3642 |
+ IPv6 resources on the Internet. |
|
3594 | 3643 |
</p> |
3595 | 3644 |
<p> |
3596 | 3645 |
Full IPv6 support is definitely on our "someday" list; it will come along |
... | ... |
@@ -167,8 +167,8 @@ Even if your torrent application connects only through Tor, you will |
167 | 167 |
often send out your real IP address in the tracker GET request, |
168 | 168 |
because that's how torrents work. Not only do you <a |
169 | 169 |
href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea"> |
170 |
-deanonymize your torrent traffic and your other simultaneous Tor web traffic |
|
171 |
-</a> this way, you also slow down the entire Tor network for everyone else. |
|
170 |
+deanonymize your torrent traffic and your other simultaneous Tor web |
|
171 |
+traffic</a> this way, you also slow down the entire Tor network for everyone else. |
|
172 | 172 |
</p> |
173 | 173 |
</li> |
174 | 174 |
<li><b>Don't enable or install browser plugins</b> |
... | ... |
@@ -285,8 +285,8 @@ Even if your torrent application connects only through Tor, you will |
285 | 285 |
often send out your real IP address in the tracker GET request, |
286 | 286 |
because that's how torrents work. Not only do you <a |
287 | 287 |
href="https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea"> |
288 |
-deanonymize your torrent traffic and your other simultaneous Tor web traffic |
|
289 |
-</a> this way, you also slow down the entire Tor network for everyone else. |
|
288 |
+deanonymize your torrent traffic and your other simultaneous Tor web |
|
289 |
+traffic</a> this way, you also slow down the entire Tor network for everyone else. |
|
290 | 290 |
</p> |
291 | 291 |
</li> |
292 | 292 |
|
293 | 293 |