Changes between Version 43 and Version 44 of doc/FAQUnanswered

Apr 23, 2010, 4:48:48 AM (11 years ago)



  • doc/FAQUnanswered

    v43 v44  
    11This is a list of questions people wish were answered in the [:../TorFAQ]; please add some more.  Better yet answer one and move it to [:../TorFAQ].  Finally you can vote for a question to be answered by incrementing the number after the question in parens.
    3 '''Please do not report bugs here; instead, use the [ bug tracker].'''  Soon, we'll designate one of the proposed bug servers as official, and you'll be able to post bugs there too.
     3Do I need both Tor AND Privoxy to browse hidden sites? Why? (votes: 1)
    5 Also, this is '''not the place''' for random ''it doesn't work'' or ''how do I do foo'' questions.  Support questions are really better asked and answered on the
    6 [ or-talk mailinglist].  Also, always a good read: [ How To Ask Questions The Smart Way].
     5Who's doing this? (votes: 1)
    8 = Unanswered FAQ Questions =
     7Can I help? (votes: 2)
    10 '''Why does Firefox/Privoxy/Tor return Privoxy 404 pages so frequently -- almost every time -- when properly configured, even on sites like  How to mitigate?''' (Votes: 2)
     9I've got a bug, now what? (votes: 2)
    12 Maybe it's just my Mac but I find that Tor has a habit of dying and staying dead which leaves privoxy and firefox non-functional. The work around I've found is that you can open Terminal directly and just start Tor by typing "Tor". I also find that if I start getting a lot of 403's or 504's then I can just kill the Tor instance running in Terminal and re-start it. More often than not, that fixes the problem.
     11So I'm totally anonymous if I use Tor? (votes: 1)
    14 '''Is the reason that gmail rarely works: gmail, tor, privoxy, firefox, your own bandwidth/latency, tor's bw/latency, or some combination?  Is it fixable?'''
     13Where can I learn more about anonymity? (votes: 1)
    16 '''Why is the argument against more than 3 hops that both-ends attacks are the enemy?  Wouldn't it be better to have more than 3 if the enemy cannot mount a both-ends attack?'''
     15What attacks remain against onion routing? (votes: 1)
    18 '''How can I be sure that sending DNS through tor doesn't get spoofed sites?'''
     17What projects are comparable? (votes: 1)
    20 '''How does tor relate to ipv6 and how should typical applications handle ipv6 if they use tor (or tor via Privoxy)?'''
     19What's Onion Routing? (votes: 1)
    22 '''What version of libevent should I be using?'''
     21How does Tor relate to the Freedom Project? (votes: 1)
    24 the latest.  at least 1.1
    26 '''How to use Tor in squid? For using Tor on a network using Squid as proxy, for example...
    28 '''How to use Tor with PF (Packet Filter, found in OpenBSD, NetBSD, DragonFlyBSD and FreeBSD)?
    30 '''How does Tor work with tabbed browsing, say with Firefox? "Works fine for me. ProBastion" Do these requests all follow the same circuit through the Tor network? Can an eavesdropper link a user across all sites opened simultaneously in tabs?'''
    32 They will most likely all use the same circuit.
    34 '''When using the Tor/Privoxy configuration, is there an easy way to switch Privoxy between using Tor and using the standard connection (to allow for secure browsing, but also allowing a more direct connection when needed to keep large file transfers from bogging down in Tor)?'''
    36 It is possible to do this - however, it involves manually editing the config files for Privoxy, as well as possessing administrative/sudo access for your machine.  Also, once Privoxy is toggled to use a direct connection instead of Tor, your IP will be visible, and Privoxy does n ot provide as much security alone as it does with Tor.
    38 If you wish to do this, you will need to make a copy of your Privoxy config file, and comment out the line that causes Privoxy to use the Tor service.  Once you have done this, to switch over, just stop Privoxy, swap the config files, and restart it. You can also automate the process with a very simple shell script - an OSX version including sample config files and a shell script can be found [ here], and the script can be used as an example for other *nix systems.
    40 '''Tor works fine for POP3 email. But, Whistle-blowers and others who need anonymous
    41 political free speech must have reliable SSL smtp email services. How can Tor be used
    42 by them when *all* smtp ports, eg, ports 25, 465, 587, etc are now blocked by Tor exit
    43 servers? Blocking port 25 helps to defeat spammers, but the smtp SSL/TLS ports are not
    44 generally not used by them. Is there any solution with Tor to help the free speech folk
    45 and others who need to use secure, reliable smtp services? (votes: 6)'''
    48 '''How would one route his email through Tor? My email client (Microsoft Entourage for Mac OS X) has support for SOCKS and TUNNEL proxies, but setting my mail proxy for SOCKS port 9050 or 8118 both produces errors when trying to proxy to SSL SMTP servers via port 25. What am I missing here? Also, setting this proxy doesn't seem to affect incoming POP3 SSL mail, but only affects outgoing mail, albeit without success. A little guidance on how to configure POP3 email clients to use Tor would be much appreciated!'''
    50 An attempt to answer the smtp email questions above: The Tor exit servers are likely blocking smtp port 25 in an attempt to stop spammers. Some Tor exit servers *sporadically* allow TLS/SSL smtp over ports 587, 995, etc., but at the present time there is no consistent, reliable policy or service.  (Also your remote email provider must support the use of alternate smtp ports such as those above.) You could use the remailer network but there can be reliability problems with them. Of greater importance is the fact that the remailer network does NOT accept large messages, e.g., scanned documents which can easily be many MB each. If you are a whistleblower or other person who needs to send large documents quickly and anonymously, you have a real problem. At this moment, Tor is not the answer.
    53 '''Can Tor be used in a network that has NO DEFAULT ROUTE?  The only access method from this network is to use a traditional proxy.  Is there a way to chain proxies so that TOR requests are sent outbound via the standard proxy? (votes: 1)'''
    57 '''Can I help? (votes: 2)'''
    61 '''I've got a bug, now what? (votes: 2)'''
    63 '''How does Tor relate to the Freedom Project? (votes: 1)'''
    65 '''Is there any way to forward an ident response via TOR so that the ident doesn't come back as whatever the end server wants, but your normal response? (votes: 1)'''
    67 no.
    69 '''How can I uninstall tor? (votes: 1)'''
    71 '''I have legal questions about running Tor. Is there anybody I can contact? Added 2.1.06- The Developers do not provide Legal advice. period! Over at the Tor Legal FAQ there is a written section by EFF lawyers. It aims to give you an overview of some of the legal issues that arise from the Tor project. Read the Disclaimer. The FAQ does provide a dialougue on the legalality & posssible scenarios of operating a Tor Server. They also provide you with contact information to a EFF Lawyer. The Tor FAQ also provides a links to an Abuse FAQ, & Tor Technical FAQ Wiki.  See this address for more information along these lines. 1)'''
    73 '''If I set up Tor to only act as a router node (reject *:* in torrc) can I still be a contact point for hidden services?'''
    75 yes.
    77 '''Can anonymity be broken if all Tor servers in the chain are compromised/malicious and so are keeping logs to trace the chain?'''
    80 '''What system resources does a TOR server use?  The FAQ already dicusses memory a bit.  What about CPU?  Encryption is CPU-intensive.  Specific question I'd like answered: I'll be setting up a TOR node bandwidth-limited to about 256kbps (half my upstream bandwidth).  Will an old 300MHz G3 Mac easily handle this, or will a faster processor be needed? How 'bout a P90?  Presumably, TOR's disk usage and I/O is minimal.''' (Votes: 1)
    83 == Cannot resolve Foo.onion/Resolve requests to hidden services not allowed ==
    85 tor-resolve doesnt seem to work, i get this:
    86 {{{connection_ap_handshake_process_socks():  Resolve requests to hidden services not allowed. Failing.}}}
    87 from the copy of tor running locally. Please help!
    89 (from original questioner: thank you.  I got the mistaken idea that this would work because it is suggested in the 'how to torrify an application' article on this wiki.  It makes more sense now.  Someone who understands better might want to upate that document)
    91 This question is answered; see 'How Do I Access Tor Hidden Servers.'  You get this message when you try to use tor-resolve to resolve the address of a hidden service.  But hidden services are ''hidden'' - they don't *have* an IP address you can use.  Instead, you need to pass the hostnames to Tor directly.
    93 == Clock Skew ==
    94 My system clock is behind 3 days and I don't have permission to change it.
    95 Therefore all the certificates are invalid.
    96 Is there a runtime option to skew the time?
    98 This should not a problem as of 0.0.9pre6.
    100 == Does not connect to port xyz ==
    101 All of a sudden, Tor will no longer let me connect to my distant smtp server.
    102 The smtp port used is 587 and the connection is SSL. Why is this now happening?
    104 587 isn't in the default exit policy. The tor node known as bollox had an
    105 accept everything policy so your port 587 requests would have always gone through that.
    106 As bollox is no longer around there are no exit nodes that allow port 587. If you
    107 control this smtp server, try changing it's port number to something over 1024.
    109 == Debian and how to use the package management system ==
    111 Also would recomend posting default config files for debian online since apt will not reinstall them if they are removed (/etc/init.d/tor and /etc/torrc for example)
    113 '''Answer''': RTFM.  dpkg differentiatea between two states of package removal.
    114 There's ''remove'', which will just remove the normal files a package comes with,
    115 and there's ''purge'', which will remove configuration files also.  Changes to your
    116 configuration (like you removing them) are kept over a remove/install cycle.  If
    117 you want them to installed anyway, you should install with
    118 {{dpkg --force-confmiss --install tor...deb}}
    119 or just purge tor (which will delete /var/lib/tor with its keys if you are a server!), and then install it again.
    121 == . ==
    122 After uninstalling everything then reinstalling on debian (using apt-get of course) nothing loads in a browser or anything, eventually a 503 will come up.  Tor is running and privoxy is running, both correctly configured(I think).  If this is a configuration problem, where can I find more information about configuration in debian?
    124 '''Answer''': Duh.  Have you checked out {{{/etc/tor}}}?  What about {{{/var/log/tor}}} and {{{/usr/share/doc/tor}}}?  Why do you think it would be any different than on other OSs?
    126 == Privoxy config ==
    128 Similar to above, on brand new install of sarge with tor and privoxy browser, gaim, etc will spend a long time trying to connect eventually failing with 503, if tor is not running a 503 is instant.
    130 '''Answer''': Privoxy by default does not allow CONNECT to ports other than 443.  Fix your privoxy config.
    132 {{{weasel@galaxy:/etc/privoxy$ grep limit.con default.action | grep -v '^#'
    133 +limit-connect{1-} \
    134 }}}
    136 (If someone writes a proper question, this might actually go into the FAQ)
    138 == How To Configure One's Web Browser So Tor Is Only Used For Some Sites But Not Others ==
    139 '''Question''': Can I configure Tor so it will only use the onion routing network for some sites but not others?
    141 '''Answer''': No, Tor itself is all or nothing, a request either goes through it or it does not.
    143 Privoxy is also all or nothing in the sense that if a request has made it to Privoxy then either Privoxy is set up to go through Tor or it's not, there does not appear to be a way to program Privoxy so it will use Tor for some requests but not others.
    145 There is a script for OS X, available [ here], that will make it such that Privoxy never uses Tor but this is an 'all or nothing' mechanism. The script will either start Privoxy such that all requests go through Tor or no requests go through Tor.
    147 There is one mechanism that is at least useful for web browsers, it's called a pac file. It was invented by Netscape, the original documentation is available [ here], but it is now supported by all major browsers. One can use a pac file to program the browser to use the Privoxy proxy for certain requests but not others. For example, the following pac file will cause all requests to Google or to the special Privoxy configuration addresses to be sent to Privoxy (and hence Tor) but will allow other other requests to go out without Privoxy/Tor being used:
    149 {{{
    150 function FindProxyForURL(url, host) {
    151         if (shExpMatch(host,"*google.*") ||
    152             shExpMatch(host,"") ||
    153             shExpMatch(host,"p.p"))
    154                 return "PROXY";
    155         return "DIRECT";
    156 }
    157 }}}
    159 To configure Firefox to use a pac file under OS X go to Firefox->preferences->General->Connection Settings...->Automatic proxy configuration URL:. Enter in a URL (you can use file:// to point to a local file) that points to your pac file and click reload.
    161 It's probably not a good idea to use pac files with Safari on OS X as its pac file support seems to be more than a little buggy.
    163 The pac file solution is far from ideal. It won't apply to non-web access and it runs into problems such as the bad pac file support in Safari. It also is not secure. A malicious website can trivially bypass this mechanism by placing pictures on its website from domains that it controls but are unlikely to be on a 'black list'. Therefore this mechanism is only useful with Websites that are not in and of themselves malicious but rather, due to their nature, can collect substantial amounts of personal information that one would rather not release. A search engine is a classic example. If and when privacy is a critical concern then the only proper course of action is to get rid of the pac file and instead configure all connections to go through privoxy/tor.
     23Protocol and application support - http? ftp? udp? socks? mozilla? (votes: 1)