remove the exit enclaving faq entry
Roger Dingledine

Roger Dingledine commited on 2014-07-12 12:56:02
Zeige 1 geänderte Dateien mit 0 Einfügungen und 64 Löschungen.


(exit enclaving doesn't work for most users now, since most users only
see the summary exit policy, which describes ports but not addresses.)

this would be a good candidate for an ifaq, if we had one, to explain
what this feature used to be.

... ...
@@ -237,7 +237,6 @@ relay.</a></li>
237 237
     communications? Isn't that bad? </a></li>
238 238
     <li><a href="#AmITotallyAnonymous">So I'm totally anonymous if I use
239 239
     Tor?</a></li>
240
-    <li><a href="#ExitEnclaving">What is Exit Enclaving?</a></li>
241 240
     <li><a href="#KeyManagement">Tell me about all the keys Tor
242 241
 uses.</a></li>
243 242
     <li><a href="#EntryGuards">What are Entry Guards?</a></li>
... ...
@@ -3563,69 +3562,6 @@ diversity,
3563 3562
 
3564 3563
     <hr>
3565 3564
 
3566
-    <a id="ExitEnclaving"></a>
3567
-    <h3><a class="anchor" href="#ExitEnclaving">What is Exit Enclaving?</a>
3568
-    </h3>
3569
-
3570
-    <p>
3571
-    When a machine that runs a Tor relay also runs a public service, such as
3572
-    a webserver, you can configure Tor to offer Exit Enclaving to that
3573
-    service. Running an Exit Enclave for all of your services you wish to
3574
-    be accessible via Tor provides your users the assurance that they will
3575
-    exit through your server, rather than exiting from a randomly selected
3576
-    exit node that could be watched. Normally, a tor circuit would end at
3577
-    an exit node and then that node would make a connection to your service.
3578
-    Anyone watching that exit node could see the connection to your service,
3579
-    and be able to snoop on the contents if it were an unencrypted
3580
-    connection. If you run an Exit Enclave for your service, then the exit
3581
-    from the Tor network happens on the machine that runs your service,
3582
-    rather than on an untrusted random node. This works when Tor clients
3583
-    wishing to connect to this public service extend their circuit
3584
-    to exit from the Tor relay running on that same host. For example, if
3585
-    the server at 1.2.3.4 runs a web server on port 80 and also acts as a
3586
-    Tor relay configured for Exit Enclaving, then Tor clients wishing to
3587
-    connect to the webserver will extend their circuit a fourth hop to exit
3588
-    to port 80 on the Tor relay running on 1.2.3.4.
3589
-    </p>
3590
-    <p>
3591
-    Exit Enclaving is disabled by default to prevent attackers from
3592
-    exploiting trust relationships with locally bound services. For
3593
-    example, often 127.0.0.1 will run services that are not designed to
3594
-    be shared with the entire world. Sometimes these services will also
3595
-    be bound to the public IP address, but will only allow connections if
3596
-    the source address is something trusted, such as 127.0.0.1.
3597
-    </p>
3598
-    <p>
3599
-    As a result of possible trust issues, relay operators must configure
3600
-    their exit policy to allow connections to themselves, but they should
3601
-    do so only when they are certain that this is a feature that they would
3602
-    like. Once certain, turning off the ExitPolicyRejectPrivate option will
3603
-    enable Exit Enclaving. An example configuration would be as follows:
3604
-    </p>
3605
-    <pre>
3606
-    ExitPolicy accept 1.2.3.4:80
3607
-    ExitPolicy reject 127.0.0.1/8
3608
-    ExitPolicyRejectPrivate 0
3609
-    </pre>
3610
-    <p>
3611
-    This option should be used with care as it may expose internal network
3612
-    blocks that are not meant to be accessible from the outside world or
3613
-    the Tor network. Please tailor your ExitPolicy to reflect all netblocks
3614
-    that you want to prohibit access.
3615
-    </p>
3616
-    <p>
3617
-    This option should be used with care as it may expose internal network
3618
-    blocks that are not meant to be accessible from the outside world or
3619
-    the Tor network. Please tailor your ExitPolicy to reflect all netblocks
3620
-    that you want to prohibit access.
3621
-    </p>
3622
-    <p>
3623
-    While useful, this behavior may go away in the future because it is
3624
-    imperfect. A great idea but not such a great implementation.
3625
-    </p>
3626
-
3627
-    <hr>
3628
-
3629 3565
     <a id="KeyManagement"></a>
3630 3566
     <h3><a class="anchor" href="#KeyManagement">Tell me about all the
3631 3567
 keys Tor uses.</a></h3>
3632 3568