Changes between Version 34 and Version 35 of doc/TorBOX/ApplicationWarningsAndNotes


Ignore:
Timestamp:
Mar 4, 2012, 9:29:27 AM (7 years ago)
Author:
proper
Comment:

expanded "Identity correlation through circuit sharing"

Legend:

Unmodified
Added
Removed
Modified
  • doc/TorBOX/ApplicationWarningsAndNotes

    v34 v35  
    3535
    3636= Identity correlation through circuit sharing =
     37This is not exclusively a TorBOX problem. If you used to use only one SocksPort with the [https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO common torification methods], the same thing happened.
     38
    3739By default TorBOX currently routes all applications through TransPort. This means different activities or "identities" in different applications (say browser, IRC, email) end up being routed through the same circuit and exit nodes may easily guess that they all originated from the same Tor client. To protect against this it is advised to set up per-application SOCKS ports in Tor-Gateway (see the shell script comments for how to do that). On Tor-Workstation you'll have to configure your applications to use SOCKS. Some support this out of the box without problems (e.g. TBB) some do not (e.g. apt-get, for a how to see: http://www.switchroot.com/how-to-run-apt-get-wget-whois-etc-via-socks-proxy-using-proxychains) [[BR]]
    38 DNS related [https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#IkeepseeingthesewarningsaboutSOCKSandDNSandinformationleaks.ShouldIworry warnings] probably still apply, though to a lesser extent - an attack could only make correlations but still couldn't figure out your IP.
     40
     41Alternatively you could also use more than one TransPort and redirect all identity you don't want to be linked to another Tor-Workstation.
     42
     43DNS related [https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#IkeepseeingthesewarningsaboutSOCKSandDNSandinformationleaks.ShouldIworry warnings] probably still apply, though to a lesser extent - an attack could only make correlations but still couldn't figure out your IP. (To stop that, you could run your own DNS resolver inside Tor-Workstation. Maybe ttdnsd or [https://www.opendns.com/technology/dnscrypt/ DNSCrypt] may be of help.)
    3944
    4045= Tor inside Tor =