Roger Dingledine commited on 2011-09-27 09:24:45
Zeige 1 geänderte Dateien mit 93 Einfügungen und 93 Löschungen.
| ... | ... |
@@ -48,26 +48,26 @@ |
| 48 | 48 |
<li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li> |
| 49 | 49 |
</ul> |
| 50 | 50 |
|
| 51 |
- <p>Running Tor:</p> |
|
| 51 |
+ <p>Tor Browser Bundle:</p> |
|
| 52 |
+ <ul> |
|
| 53 |
+ <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
| 54 |
+ me I have spyware installed.</a></li> |
|
| 55 |
+ <li><a href="#GmailWarning">Gmail warns me that my account may have |
|
| 56 |
+ been compromised.</a></li> |
|
| 57 |
+ </ul> |
|
| 58 |
+ |
|
| 59 |
+ <p>Advanced Tor usage:</p> |
|
| 52 | 60 |
<ul> |
| 53 | 61 |
<li><a href="#torrc">I'm supposed to "edit my torrc". What does |
| 54 | 62 |
that mean?</a></li> |
| 55 | 63 |
<li><a href="#Logs">How do I set up logging, or see Tor's |
| 56 | 64 |
logs?</a></li> |
| 57 |
- </ul> |
|
| 58 |
- |
|
| 59 |
- <p>Running a Tor client:</p> |
|
| 60 |
- <ul> |
|
| 61 | 65 |
<li><a href="#DoesntWork">I installed Tor and Polipo but it's not |
| 62 | 66 |
working.</a></li> |
| 63 | 67 |
<li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at |
| 64 | 68 |
start.</a></li> |
| 65 | 69 |
<li><a href="#ChooseEntryExit">Can I control which nodes (or country) |
| 66 | 70 |
are used for entry/exit?</a></li> |
| 67 |
- <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
| 68 |
- me I have spyware installed.</a></li> |
|
| 69 |
- <li><a href="#GmailWarning">Gmail warns me that my account may have |
|
| 70 |
- been compromised.</a></li> |
|
| 71 | 71 |
<li><a href="#FirewallPorts">My firewall only allows a few outgoing |
| 72 | 72 |
ports.</a></li> |
| 73 | 73 |
</ul> |
| ... | ... |
@@ -727,6 +727,90 @@ other than our official HTTPS website. |
| 727 | 727 |
|
| 728 | 728 |
<hr> |
| 729 | 729 |
|
| 730 |
+<a id="GoogleCaptcha"></a> |
|
| 731 |
+<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
| 732 |
+ |
|
| 733 |
+<p> |
|
| 734 |
+This is a known and intermittent problem; it does not mean that Google |
|
| 735 |
+considers Tor to be spyware. |
|
| 736 |
+</p> |
|
| 737 |
+ |
|
| 738 |
+<p> |
|
| 739 |
+When you use Tor, you are sending queries through exit relays that are also |
|
| 740 |
+shared by thousands of other users. Tor users typically see this message |
|
| 741 |
+when many Tor users are querying Google in a short period of time. Google |
|
| 742 |
+interprets the high volume of traffic from a single IP address (the exit |
|
| 743 |
+relay you happened to pick) as somebody trying to "crawl" their website, |
|
| 744 |
+so it slows down traffic from that IP address for a short time. |
|
| 745 |
+</p> |
|
| 746 |
+<p> |
|
| 747 |
+An alternate explanation is that Google tries to detect certain |
|
| 748 |
+kinds of spyware or viruses that send distinctive queries to Google |
|
| 749 |
+Search. It notes the IP addresses from which those queries are received |
|
| 750 |
+(not realizing that they are Tor exit relays), and tries to warn any |
|
| 751 |
+connections coming from those IP addresses that recent queries indicate |
|
| 752 |
+an infection. |
|
| 753 |
+</p> |
|
| 754 |
+ |
|
| 755 |
+<p> |
|
| 756 |
+To our knowledge, Google is not doing anything intentionally specifically |
|
| 757 |
+to deter or block Tor use. The error message about an infected machine |
|
| 758 |
+should clear up again after a short time. |
|
| 759 |
+</p> |
|
| 760 |
+ |
|
| 761 |
+<p> |
|
| 762 |
+Torbutton 1.2.5 (released in mid 2010) detects Google captchas and can |
|
| 763 |
+automatically redirect you to a more Tor-friendly search engine such as |
|
| 764 |
+Ixquick or Bing. |
|
| 765 |
+</p> |
|
| 766 |
+ |
|
| 767 |
+<hr /> |
|
| 768 |
+ |
|
| 769 |
+<a id="GmailWarning"></a> |
|
| 770 |
+<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account may have been compromised.</a></h3> |
|
| 771 |
+ |
|
| 772 |
+<p> |
|
| 773 |
+Sometimes, after you've used Gmail over Tor, Google presents a |
|
| 774 |
+pop-up notification that your account may have been compromised. |
|
| 775 |
+The notification window lists a series of IP addresses and locations |
|
| 776 |
+throughout the world recently used to access your account. |
|
| 777 |
+</p> |
|
| 778 |
+ |
|
| 779 |
+<p> |
|
| 780 |
+In general this is a false alarm: Google saw a bunch of logins from |
|
| 781 |
+different places, as a result of running the service via Tor, and decided |
|
| 782 |
+it was a good idea to confirm the account was being accessed by it's |
|
| 783 |
+rightful owner. |
|
| 784 |
+</p> |
|
| 785 |
+ |
|
| 786 |
+<p> |
|
| 787 |
+Even though this may be a biproduct of using the service via tor, |
|
| 788 |
+that doesn't mean you can entirely ignore the warning. It is |
|
| 789 |
+<i>probably</i> a false positive, but it might not be since it is |
|
| 790 |
+possible for someone to hijack your Google cookie. |
|
| 791 |
+</p> |
|
| 792 |
+ |
|
| 793 |
+<p> |
|
| 794 |
+Cookie hijacking is possible by either physical access to your computer |
|
| 795 |
+or by watching your network traffic. In theory only physical access |
|
| 796 |
+should compromise your system because Gmail and similar services |
|
| 797 |
+should only send the cookie over an SSL link. In practice, alas, it's <a |
|
| 798 |
+href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
| 799 |
+way more complex than that</a>. |
|
| 800 |
+</p> |
|
| 801 |
+ |
|
| 802 |
+<p> |
|
| 803 |
+And if somebody <i>did</i> steal your google cookie, they might end |
|
| 804 |
+up logging in from unusual places (though of course they also might |
|
| 805 |
+not). So the summary is that since you're using Tor, this security |
|
| 806 |
+measure that Google uses isn't so useful for you, because it's full of |
|
| 807 |
+false positives. You'll have to use other approaches, like seeing if |
|
| 808 |
+anything looks weird on the account, or looking at the timestamps for |
|
| 809 |
+recent logins and wondering if you actually logged in at those times. |
|
| 810 |
+</p> |
|
| 811 |
+ |
|
| 812 |
+<hr> |
|
| 813 |
+ |
|
| 730 | 814 |
<a id="torrc"></a> |
| 731 | 815 |
<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". What does that mean?</a></h3> |
| 732 | 816 |
|
| ... | ... |
@@ -1045,90 +1129,6 @@ for more information on how to remove the Tor service. |
| 1045 | 1129 |
|
| 1046 | 1130 |
<hr> |
| 1047 | 1131 |
|
| 1048 |
-<a id="GoogleCaptcha"></a> |
|
| 1049 |
-<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
| 1050 |
- |
|
| 1051 |
-<p> |
|
| 1052 |
-This is a known and intermittent problem; it does not mean that Google |
|
| 1053 |
-considers Tor to be spyware. |
|
| 1054 |
-</p> |
|
| 1055 |
- |
|
| 1056 |
-<p> |
|
| 1057 |
-When you use Tor, you are sending queries through exit relays that are also |
|
| 1058 |
-shared by thousands of other users. Tor users typically see this message |
|
| 1059 |
-when many Tor users are querying Google in a short period of time. Google |
|
| 1060 |
-interprets the high volume of traffic from a single IP address (the exit |
|
| 1061 |
-relay you happened to pick) as somebody trying to "crawl" their website, |
|
| 1062 |
-so it slows down traffic from that IP address for a short time. |
|
| 1063 |
-</p> |
|
| 1064 |
-<p> |
|
| 1065 |
-An alternate explanation is that Google tries to detect certain |
|
| 1066 |
-kinds of spyware or viruses that send distinctive queries to Google |
|
| 1067 |
-Search. It notes the IP addresses from which those queries are received |
|
| 1068 |
-(not realizing that they are Tor exit relays), and tries to warn any |
|
| 1069 |
-connections coming from those IP addresses that recent queries indicate |
|
| 1070 |
-an infection. |
|
| 1071 |
-</p> |
|
| 1072 |
- |
|
| 1073 |
-<p> |
|
| 1074 |
-To our knowledge, Google is not doing anything intentionally specifically |
|
| 1075 |
-to deter or block Tor use. The error message about an infected machine |
|
| 1076 |
-should clear up again after a short time. |
|
| 1077 |
-</p> |
|
| 1078 |
- |
|
| 1079 |
-<p> |
|
| 1080 |
-Torbutton 1.2.5 (released in mid 2010) detects Google captchas and can |
|
| 1081 |
-automatically redirect you to a more Tor-friendly search engine such as |
|
| 1082 |
-Ixquick or Bing. |
|
| 1083 |
-</p> |
|
| 1084 |
- |
|
| 1085 |
-<hr /> |
|
| 1086 |
- |
|
| 1087 |
-<a id="GmailWarning"></a> |
|
| 1088 |
-<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account may have been compromised.</a></h3> |
|
| 1089 |
- |
|
| 1090 |
-<p> |
|
| 1091 |
-Sometimes, after you've used Gmail over Tor, Google presents a |
|
| 1092 |
-pop-up notification that your account may have been compromised. |
|
| 1093 |
-The notification window lists a series of IP addresses and locations |
|
| 1094 |
-throughout the world recently used to access your account. |
|
| 1095 |
-</p> |
|
| 1096 |
- |
|
| 1097 |
-<p> |
|
| 1098 |
-In general this is a false alarm: Google saw a bunch of logins from |
|
| 1099 |
-different places, as a result of running the service via Tor, and decided |
|
| 1100 |
-it was a good idea to confirm the account was being accessed by it's |
|
| 1101 |
-rightful owner. |
|
| 1102 |
-</p> |
|
| 1103 |
- |
|
| 1104 |
-<p> |
|
| 1105 |
-Even though this may be a biproduct of using the service via tor, |
|
| 1106 |
-that doesn't mean you can entirely ignore the warning. It is |
|
| 1107 |
-<i>probably</i> a false positive, but it might not be since it is |
|
| 1108 |
-possible for someone to hijack your Google cookie. |
|
| 1109 |
-</p> |
|
| 1110 |
- |
|
| 1111 |
-<p> |
|
| 1112 |
-Cookie hijacking is possible by either physical access to your computer |
|
| 1113 |
-or by watching your network traffic. In theory only physical access |
|
| 1114 |
-should compromise your system because Gmail and similar services |
|
| 1115 |
-should only send the cookie over an SSL link. In practice, alas, it's <a |
|
| 1116 |
-href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
| 1117 |
-way more complex than that</a>. |
|
| 1118 |
-</p> |
|
| 1119 |
- |
|
| 1120 |
-<p> |
|
| 1121 |
-And if somebody <i>did</i> steal your google cookie, they might end |
|
| 1122 |
-up logging in from unusual places (though of course they also might |
|
| 1123 |
-not). So the summary is that since you're using Tor, this security |
|
| 1124 |
-measure that Google uses isn't so useful for you, because it's full of |
|
| 1125 |
-false positives. You'll have to use other approaches, like seeing if |
|
| 1126 |
-anything looks weird on the account, or looking at the timestamps for |
|
| 1127 |
-recent logins and wondering if you actually logged in at those times. |
|
| 1128 |
-</p> |
|
| 1129 |
- |
|
| 1130 |
-<hr> |
|
| 1131 |
- |
|
| 1132 | 1132 |
<a id="FirewallPorts"></a> |
| 1133 | 1133 |
<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a few outgoing ports.</a></h3> |
| 1134 | 1134 |
|
| 1135 | 1135 |