Roger Dingledine commited on 2011-09-27 09:24:45
Zeige 1 geänderte Dateien mit 93 Einfügungen und 93 Löschungen.
... | ... |
@@ -48,26 +48,26 @@ |
48 | 48 |
<li><a href="#LiveCD">Is there a LiveCD or other bundle that includes Tor?</a></li> |
49 | 49 |
</ul> |
50 | 50 |
|
51 |
- <p>Running Tor:</p> |
|
51 |
+ <p>Tor Browser Bundle:</p> |
|
52 |
+ <ul> |
|
53 |
+ <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
54 |
+ me I have spyware installed.</a></li> |
|
55 |
+ <li><a href="#GmailWarning">Gmail warns me that my account may have |
|
56 |
+ been compromised.</a></li> |
|
57 |
+ </ul> |
|
58 |
+ |
|
59 |
+ <p>Advanced Tor usage:</p> |
|
52 | 60 |
<ul> |
53 | 61 |
<li><a href="#torrc">I'm supposed to "edit my torrc". What does |
54 | 62 |
that mean?</a></li> |
55 | 63 |
<li><a href="#Logs">How do I set up logging, or see Tor's |
56 | 64 |
logs?</a></li> |
57 |
- </ul> |
|
58 |
- |
|
59 |
- <p>Running a Tor client:</p> |
|
60 |
- <ul> |
|
61 | 65 |
<li><a href="#DoesntWork">I installed Tor and Polipo but it's not |
62 | 66 |
working.</a></li> |
63 | 67 |
<li><a href="#VidaliaPassword">Tor/Vidalia prompts for a password at |
64 | 68 |
start.</a></li> |
65 | 69 |
<li><a href="#ChooseEntryExit">Can I control which nodes (or country) |
66 | 70 |
are used for entry/exit?</a></li> |
67 |
- <li><a href="#GoogleCaptcha">Google makes me solve a Captcha or tells |
|
68 |
- me I have spyware installed.</a></li> |
|
69 |
- <li><a href="#GmailWarning">Gmail warns me that my account may have |
|
70 |
- been compromised.</a></li> |
|
71 | 71 |
<li><a href="#FirewallPorts">My firewall only allows a few outgoing |
72 | 72 |
ports.</a></li> |
73 | 73 |
</ul> |
... | ... |
@@ -727,6 +727,90 @@ other than our official HTTPS website. |
727 | 727 |
|
728 | 728 |
<hr> |
729 | 729 |
|
730 |
+<a id="GoogleCaptcha"></a> |
|
731 |
+<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
732 |
+ |
|
733 |
+<p> |
|
734 |
+This is a known and intermittent problem; it does not mean that Google |
|
735 |
+considers Tor to be spyware. |
|
736 |
+</p> |
|
737 |
+ |
|
738 |
+<p> |
|
739 |
+When you use Tor, you are sending queries through exit relays that are also |
|
740 |
+shared by thousands of other users. Tor users typically see this message |
|
741 |
+when many Tor users are querying Google in a short period of time. Google |
|
742 |
+interprets the high volume of traffic from a single IP address (the exit |
|
743 |
+relay you happened to pick) as somebody trying to "crawl" their website, |
|
744 |
+so it slows down traffic from that IP address for a short time. |
|
745 |
+</p> |
|
746 |
+<p> |
|
747 |
+An alternate explanation is that Google tries to detect certain |
|
748 |
+kinds of spyware or viruses that send distinctive queries to Google |
|
749 |
+Search. It notes the IP addresses from which those queries are received |
|
750 |
+(not realizing that they are Tor exit relays), and tries to warn any |
|
751 |
+connections coming from those IP addresses that recent queries indicate |
|
752 |
+an infection. |
|
753 |
+</p> |
|
754 |
+ |
|
755 |
+<p> |
|
756 |
+To our knowledge, Google is not doing anything intentionally specifically |
|
757 |
+to deter or block Tor use. The error message about an infected machine |
|
758 |
+should clear up again after a short time. |
|
759 |
+</p> |
|
760 |
+ |
|
761 |
+<p> |
|
762 |
+Torbutton 1.2.5 (released in mid 2010) detects Google captchas and can |
|
763 |
+automatically redirect you to a more Tor-friendly search engine such as |
|
764 |
+Ixquick or Bing. |
|
765 |
+</p> |
|
766 |
+ |
|
767 |
+<hr /> |
|
768 |
+ |
|
769 |
+<a id="GmailWarning"></a> |
|
770 |
+<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account may have been compromised.</a></h3> |
|
771 |
+ |
|
772 |
+<p> |
|
773 |
+Sometimes, after you've used Gmail over Tor, Google presents a |
|
774 |
+pop-up notification that your account may have been compromised. |
|
775 |
+The notification window lists a series of IP addresses and locations |
|
776 |
+throughout the world recently used to access your account. |
|
777 |
+</p> |
|
778 |
+ |
|
779 |
+<p> |
|
780 |
+In general this is a false alarm: Google saw a bunch of logins from |
|
781 |
+different places, as a result of running the service via Tor, and decided |
|
782 |
+it was a good idea to confirm the account was being accessed by it's |
|
783 |
+rightful owner. |
|
784 |
+</p> |
|
785 |
+ |
|
786 |
+<p> |
|
787 |
+Even though this may be a biproduct of using the service via tor, |
|
788 |
+that doesn't mean you can entirely ignore the warning. It is |
|
789 |
+<i>probably</i> a false positive, but it might not be since it is |
|
790 |
+possible for someone to hijack your Google cookie. |
|
791 |
+</p> |
|
792 |
+ |
|
793 |
+<p> |
|
794 |
+Cookie hijacking is possible by either physical access to your computer |
|
795 |
+or by watching your network traffic. In theory only physical access |
|
796 |
+should compromise your system because Gmail and similar services |
|
797 |
+should only send the cookie over an SSL link. In practice, alas, it's <a |
|
798 |
+href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
799 |
+way more complex than that</a>. |
|
800 |
+</p> |
|
801 |
+ |
|
802 |
+<p> |
|
803 |
+And if somebody <i>did</i> steal your google cookie, they might end |
|
804 |
+up logging in from unusual places (though of course they also might |
|
805 |
+not). So the summary is that since you're using Tor, this security |
|
806 |
+measure that Google uses isn't so useful for you, because it's full of |
|
807 |
+false positives. You'll have to use other approaches, like seeing if |
|
808 |
+anything looks weird on the account, or looking at the timestamps for |
|
809 |
+recent logins and wondering if you actually logged in at those times. |
|
810 |
+</p> |
|
811 |
+ |
|
812 |
+<hr> |
|
813 |
+ |
|
730 | 814 |
<a id="torrc"></a> |
731 | 815 |
<h3><a class="anchor" href="#torrc">I'm supposed to "edit my torrc". What does that mean?</a></h3> |
732 | 816 |
|
... | ... |
@@ -1045,90 +1129,6 @@ for more information on how to remove the Tor service. |
1045 | 1129 |
|
1046 | 1130 |
<hr> |
1047 | 1131 |
|
1048 |
-<a id="GoogleCaptcha"></a> |
|
1049 |
-<h3><a class="anchor" href="#GoogleCaptcha">Google makes me solve a Captcha or tells me I have spyware installed.</a></h3> |
|
1050 |
- |
|
1051 |
-<p> |
|
1052 |
-This is a known and intermittent problem; it does not mean that Google |
|
1053 |
-considers Tor to be spyware. |
|
1054 |
-</p> |
|
1055 |
- |
|
1056 |
-<p> |
|
1057 |
-When you use Tor, you are sending queries through exit relays that are also |
|
1058 |
-shared by thousands of other users. Tor users typically see this message |
|
1059 |
-when many Tor users are querying Google in a short period of time. Google |
|
1060 |
-interprets the high volume of traffic from a single IP address (the exit |
|
1061 |
-relay you happened to pick) as somebody trying to "crawl" their website, |
|
1062 |
-so it slows down traffic from that IP address for a short time. |
|
1063 |
-</p> |
|
1064 |
-<p> |
|
1065 |
-An alternate explanation is that Google tries to detect certain |
|
1066 |
-kinds of spyware or viruses that send distinctive queries to Google |
|
1067 |
-Search. It notes the IP addresses from which those queries are received |
|
1068 |
-(not realizing that they are Tor exit relays), and tries to warn any |
|
1069 |
-connections coming from those IP addresses that recent queries indicate |
|
1070 |
-an infection. |
|
1071 |
-</p> |
|
1072 |
- |
|
1073 |
-<p> |
|
1074 |
-To our knowledge, Google is not doing anything intentionally specifically |
|
1075 |
-to deter or block Tor use. The error message about an infected machine |
|
1076 |
-should clear up again after a short time. |
|
1077 |
-</p> |
|
1078 |
- |
|
1079 |
-<p> |
|
1080 |
-Torbutton 1.2.5 (released in mid 2010) detects Google captchas and can |
|
1081 |
-automatically redirect you to a more Tor-friendly search engine such as |
|
1082 |
-Ixquick or Bing. |
|
1083 |
-</p> |
|
1084 |
- |
|
1085 |
-<hr /> |
|
1086 |
- |
|
1087 |
-<a id="GmailWarning"></a> |
|
1088 |
-<h3><a class="anchor" href="#GmailWarning">Gmail warns me that my account may have been compromised.</a></h3> |
|
1089 |
- |
|
1090 |
-<p> |
|
1091 |
-Sometimes, after you've used Gmail over Tor, Google presents a |
|
1092 |
-pop-up notification that your account may have been compromised. |
|
1093 |
-The notification window lists a series of IP addresses and locations |
|
1094 |
-throughout the world recently used to access your account. |
|
1095 |
-</p> |
|
1096 |
- |
|
1097 |
-<p> |
|
1098 |
-In general this is a false alarm: Google saw a bunch of logins from |
|
1099 |
-different places, as a result of running the service via Tor, and decided |
|
1100 |
-it was a good idea to confirm the account was being accessed by it's |
|
1101 |
-rightful owner. |
|
1102 |
-</p> |
|
1103 |
- |
|
1104 |
-<p> |
|
1105 |
-Even though this may be a biproduct of using the service via tor, |
|
1106 |
-that doesn't mean you can entirely ignore the warning. It is |
|
1107 |
-<i>probably</i> a false positive, but it might not be since it is |
|
1108 |
-possible for someone to hijack your Google cookie. |
|
1109 |
-</p> |
|
1110 |
- |
|
1111 |
-<p> |
|
1112 |
-Cookie hijacking is possible by either physical access to your computer |
|
1113 |
-or by watching your network traffic. In theory only physical access |
|
1114 |
-should compromise your system because Gmail and similar services |
|
1115 |
-should only send the cookie over an SSL link. In practice, alas, it's <a |
|
1116 |
-href="http://fscked.org/blog/fully-automated-active-https-cookie-hijacking"> |
|
1117 |
-way more complex than that</a>. |
|
1118 |
-</p> |
|
1119 |
- |
|
1120 |
-<p> |
|
1121 |
-And if somebody <i>did</i> steal your google cookie, they might end |
|
1122 |
-up logging in from unusual places (though of course they also might |
|
1123 |
-not). So the summary is that since you're using Tor, this security |
|
1124 |
-measure that Google uses isn't so useful for you, because it's full of |
|
1125 |
-false positives. You'll have to use other approaches, like seeing if |
|
1126 |
-anything looks weird on the account, or looking at the timestamps for |
|
1127 |
-recent logins and wondering if you actually logged in at those times. |
|
1128 |
-</p> |
|
1129 |
- |
|
1130 |
-<hr> |
|
1131 |
- |
|
1132 | 1132 |
<a id="FirewallPorts"></a> |
1133 | 1133 |
<h3><a class="anchor" href="#FirewallPorts">My firewall only allows a few outgoing ports.</a></h3> |
1134 | 1134 |
|
1135 | 1135 |