Still working to recover. Please don't edit quite yet.

Difference between revisions of "Tor (anonymity network)"

From Anarchopedia
Jump to: navigation, search
(Removing all content from page)
(See also)
 
(3 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 +
'''Tor''' is an implementation of second-generation [[onion routing]] - an anonymity system enabling its users to communicate [[Anonymity|anonymously]] on the Internet. Originally sponsored by the [[US Naval Research Laboratory]], Tor became an [[Electronic Frontier Foundation]] (EFF) project in late 2004. The EFF supported Tor financially until [[November 2005]] [http://tor.eff.org/people.html], and continues to provide web hosting for the project.
  
 +
Tor aims to protect its users against [[traffic analysis]] attacks. Tor operates an overlay network of ''onion routers'' that enables two things: anonymous outgoing connections, and anonymous ''hidden'' services.
 +
 +
The network is currently only [[client-server|partially decentralized]], with some nodes acting as [[server]]s (routers) and others acting as [[client]]s, and, recently, with some servers acting as guard nodes. [http://archives.seul.org/or/announce/Jan-2006/msg00001.html]
 +
 +
== Anonymous outgoing connections ==
 +
Users of the Tor network run an ''onion proxy'' on their machine. This software connects out to Tor, periodically negotiating a ''virtual circuit'' through the Tor network. Tor employs cryptography in a layered manner (hence the 'onion' analogy),  ensuring perfect forward secrecy between routers. At the same time, the onion proxy software presents a [[SOCKS]] interface to its clients. SOCKS-aware applications may be pointed at Tor, which then multiplexes the traffic through a Tor virtual circuit.
 +
 +
Once inside the Tor network, the traffic is sent from router to router, ultimately reaching an ''exit node'' at which point the cleartext data is available and is forwarded on to its original destination. Viewed from the destination, the traffic appears to originate at the Tor exit node.
 +
 +
Tor's application independence separates it apart from most other anonymity networks: it works at the TCP stream level. Applications commonly anonymised using Tor include [[IRC]], [[instant messaging]] and browsing the [[World Wide Web|Web]]. When browsing the Web, Tor is often coupled with [[Privoxy]] - a filtering [[proxy server]] - that aims to add privacy at the application layer.
 +
 +
=== Etiquette and abuse ===
 +
Because Tor is capable of anonymising arbitrary TCP traffic, it attracts its fair share of abuse. Routers maintain an ''exit policy'' of what traffic is and is not permitted to leave the Tor network through that node. Using a combination of addresses and ports, it is possible to combat most major abuses of the Tor network. Potential abuses include:
 +
 +
;P2P : It is considered impolite to transfer massive amounts of data across the Tor network - the onion routers are run by volunteers using their own bandwidth at their own cost. 
 +
;E-mail : Anonymity and [[SMTP]] usually results in [[Spam (electronic)|spam]]. Consequently the default exit policy of Tor nodes rejects outgoing connections to port 25.
 +
;Vandalism : Safe in the knowledge that they cannot be traced, users are occasionally tempted to vandalise collaborative web sites. As a result, many sites take the decision to block Tor traffic.
 +
 +
 +
== Anonymous hidden services ==
 +
Although Tor's most popular feature is its provision of anonymity to clients, it can also provide anonymity to servers. By using the Tor network, it is possible to host servers in such a way that their network location is unknown. In order to access a hidden service, Tor must also be used by the client.
 +
 +
Hidden services are accessed through the Tor-specific <code>[[.onion]]</code> [[top level domain]]. The Tor network understands this TLD and routes, anonymously, to the hidden service. The hidden service then hands over to standard server software, which should be configured to listen only on non-public interfaces. Services that are reachable through Tor hidden services ''and'' the public Internet are susceptible to correlation attacks, and consequently are not really hidden.
 +
 +
An added advantage of Tor hidden services is that, because no public [[IP address]] is required, services may be hosted behind [[Firewall (networking)|Firewall]]s and [[NAT]].
 +
 +
==Using Tor with Firefox==
 +
 +
In order to use Tor with any application, you must [http://tor.eff.org/download.html.en download] the software which allows you to connect to the network.
 +
 +
These are the instructions for "Torifying" '''Firefox 1.5.*'''
 +
 +
Click on Tools > Options > General > Connection settings
 +
 +
Add the data "''localhost''" to the "HTTP Proxy" field. Add the data "''8118''" to the "port" field.
 +
 +
Tick the box to make this the default proxy server for all protocols
 +
 +
You can check your IP address by visiting websites such as [http://www.whatismyip.com WhatIsMyIp]
 +
 +
==See also==
 +
*[[Java Anon Proxy|JAP]] - Java Anon Proxy
 +
*[[Mixmaster anonymous remailer]] - Mixmaster [[anonymous remailer]]
 +
*[[Mixminion]] - Mixminion anonymous remailer
 +
<!-- Wikipedia-related, not needed here
 +
*[[Wikipedia]]'s [[Wikipedia:No open proxies|policy]] toward anonymous proxies
 +
-->
 +
*[[Freenet]], [[Entropy (network)]] - Censorship-resistant network
 +
 +
*[[bypassing the Great Firewall of China]]
 +
 +
==External links==
 +
*[https://www.torproject.org/ Tor homepage]
 +
*[http://wiki.noreply.org/noreply/TheOnionRouter Tor wiki with FAQs & HOWTOs]
 +
**[http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Comparison Comparison of Tor with other anonymity networks]
 +
*[http://tor.freehaven.net/cvs/doc/design-paper/tor-design.html Tor design document]
 +
*[http://www.noreply.org/tor-running-routers/ Tor network statistics]
 +
*[http://www.i2p.net/how_networkcomparisons I2P's comparison of anonymity networks]
 +
*[https://tails.boum.org/ Tails live CD] Software suite for anonymous web surfing from a [[Live CD]]
 +
*[http://www.privacylover.com/vpn-and-ssh-tunneling-providers-for-anonymous-internet-surfing/ List of VPN] List of VPN services
 +
 +
===Tor links===
 +
Tor is required to follow these links ("[[.onion]]" domain).
 +
*[http://kio5ei7cuj2bp6z4.onion/blackmarket/ BlackMarket]
 +
*[http://eqt5g4fuenphqinx.onion/ core.onion]
 +
*[http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page Hidden Tor Wiki]
 +
*[http://h2y5qedblrvvpv7v.onion/ Concealed Wiki]
 +
*[http://dppmfxaacucguzpc.onion/ TOR Directory]
 +
*[http://2qrww3nv5w3ue3ir.onion/ Invisiwiki]
 +
*[http://metaq3ayddzzcfzc.onion/wiki/index.php Meta Wiki - yet another wiki in tor land], has a quite useful list of [http://metaq3ayddzzcfzc.onion/wiki/index.php?page=HiddenServices hidden services]
 +
*[http://oqznfi3tdo6nwg3f.onion/ Torgle v3 - Tor network search]
 +
*[http://rjgcfnw4sd2jaqfu.onion/pantawiki/HiddenServices Hidden Services at the Pata Rei Wiki]
 +
 +
{{anonymity}}
 +
 +
{{wikipedia|Tor (anonymity network)}}
 +
 +
[[Category:Anonymous networks]][[Category:Onion routing]]
 +
 +
[[ru:Tor]]
 +
[[it:TOR]]

Latest revision as of 14:24, 9 May 2014

Tor is an implementation of second-generation onion routing - an anonymity system enabling its users to communicate anonymously on the Internet. Originally sponsored by the US Naval Research Laboratory, Tor became an Electronic Frontier Foundation (EFF) project in late 2004. The EFF supported Tor financially until November 2005 [1], and continues to provide web hosting for the project.

Tor aims to protect its users against traffic analysis attacks. Tor operates an overlay network of onion routers that enables two things: anonymous outgoing connections, and anonymous hidden services.

The network is currently only partially decentralized, with some nodes acting as servers (routers) and others acting as clients, and, recently, with some servers acting as guard nodes. [2]

Anonymous outgoing connections[edit]

Users of the Tor network run an onion proxy on their machine. This software connects out to Tor, periodically negotiating a virtual circuit through the Tor network. Tor employs cryptography in a layered manner (hence the 'onion' analogy), ensuring perfect forward secrecy between routers. At the same time, the onion proxy software presents a SOCKS interface to its clients. SOCKS-aware applications may be pointed at Tor, which then multiplexes the traffic through a Tor virtual circuit.

Once inside the Tor network, the traffic is sent from router to router, ultimately reaching an exit node at which point the cleartext data is available and is forwarded on to its original destination. Viewed from the destination, the traffic appears to originate at the Tor exit node.

Tor's application independence separates it apart from most other anonymity networks: it works at the TCP stream level. Applications commonly anonymised using Tor include IRC, instant messaging and browsing the Web. When browsing the Web, Tor is often coupled with Privoxy - a filtering proxy server - that aims to add privacy at the application layer.

Etiquette and abuse[edit]

Because Tor is capable of anonymising arbitrary TCP traffic, it attracts its fair share of abuse. Routers maintain an exit policy of what traffic is and is not permitted to leave the Tor network through that node. Using a combination of addresses and ports, it is possible to combat most major abuses of the Tor network. Potential abuses include:

P2P 
It is considered impolite to transfer massive amounts of data across the Tor network - the onion routers are run by volunteers using their own bandwidth at their own cost.
E-mail 
Anonymity and SMTP usually results in spam. Consequently the default exit policy of Tor nodes rejects outgoing connections to port 25.
Vandalism 
Safe in the knowledge that they cannot be traced, users are occasionally tempted to vandalise collaborative web sites. As a result, many sites take the decision to block Tor traffic.


Anonymous hidden services[edit]

Although Tor's most popular feature is its provision of anonymity to clients, it can also provide anonymity to servers. By using the Tor network, it is possible to host servers in such a way that their network location is unknown. In order to access a hidden service, Tor must also be used by the client.

Hidden services are accessed through the Tor-specific .onion top level domain. The Tor network understands this TLD and routes, anonymously, to the hidden service. The hidden service then hands over to standard server software, which should be configured to listen only on non-public interfaces. Services that are reachable through Tor hidden services and the public Internet are susceptible to correlation attacks, and consequently are not really hidden.

An added advantage of Tor hidden services is that, because no public IP address is required, services may be hosted behind Firewalls and NAT.

Using Tor with Firefox[edit]

In order to use Tor with any application, you must download the software which allows you to connect to the network.

These are the instructions for "Torifying" Firefox 1.5.*

Click on Tools > Options > General > Connection settings

Add the data "localhost" to the "HTTP Proxy" field. Add the data "8118" to the "port" field.

Tick the box to make this the default proxy server for all protocols

You can check your IP address by visiting websites such as WhatIsMyIp

See also[edit]

External links[edit]

Tor links[edit]

Tor is required to follow these links (".onion" domain).

anonymity
anonymity | anonymous web surfing | anonymous e-mail | anonymous usenet posting | proxy server
Anonymous networks: Freenet | I2P | Tor | Entropy | garlic routing | onion routing
Related subjects: outing
This article contains content from Wikipedia. Current versions of the GNU FDL article Tor (anonymity network) on WP may contain information useful to the improvement of this article WP