FAQ 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. The Onion Routing (TOR) Frequently Asked Questions
  2. --------------------------------------------------
  3. 1. General.
  4. 1.1. What is Tor?
  5. Tor is an implementation of version 2 of Onion Routing.
  6. Go read the tor-design.pdf for the details.
  7. In brief, Onion Routing is a connection-oriented anonymizing communication
  8. service. Users choose a source-routed path through a set of nodes, and
  9. negotiate a "virtual circuit" through the network, in which each node
  10. knows its predecessor and successor, but no others. Traffic flowing down
  11. the circuit is unwrapped by a symmetric key at each node, which reveals
  12. the downstream node.
  13. Basically Tor provides a distributed network of servers ("onion
  14. routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
  15. around the routers, and recipients, observers, and even the routers
  16. themselves have difficulty tracking the source of the stream.
  17. 1.2. Why's it called Tor?
  18. Because Tor is the onion routing system. I kept telling people I was
  19. working on onion routing, and they said "Neat. Which one?" Even if onion
  20. routing has become a standard household term, this is the actual onion
  21. routing project, started out of the Naval Research Lab.
  22. (Theories about recursive acronyms are ok too. It's also got a fine
  23. translation into German.)
  24. 1.3 Is there a backdoor in Tor?
  25. Not right now, but if this answer changes we probably won't be allowed
  26. to tell you. You should always check the source (or at least the diffs
  27. since the last release) for suspicious things; and if we don't give you
  28. source, that's a sure sign something funny could be going on.
  29. 2. Compiling and installing.
  30. [Read the README file for now; check back here once we've got packages/etc
  31. for you.]
  32. 3. Running Tor.
  33. 3.1. What kind of server should I run?
  34. The same executable functions as both client and server, depending on
  35. which ports are specified in the configuration file. You can specify:
  36. * SocksPort: client applications (eg privoxy, Mozilla) can speak socks to
  37. this port.
  38. * ORPort: other onion routers connect to this port
  39. * DirPort: onion proxies and onion routers speak http to this port, to
  40. pull down a directory of which nodes are currently available.
  41. 3.2. So I can just run a full onion router and join the network?
  42. No. Users should run just an onion proxy. If you start up a full onion
  43. router, the rest of the routers in the system won't recognize you,
  44. so they will reject your handshake attempts.
  45. 3.3. How do I join the network then?
  46. If you just want to use the onion routing network, you can run a proxy
  47. and you're all set. If you want to run a router, you must convince
  48. the directory server operators (currently arma@mit.edu) that you're a
  49. trustworthy and reliable person. From there, the operators add you to
  50. the directory, which propagates out to the rest of the network. All
  51. nodes will know about you within a half hour.
  52. 3.4. I want to run a directory server too.
  53. If you run a very reliable node, you plan to be around for a long time,
  54. and you want to spend some time ensuring that router operators are
  55. people we know and like, we may want you to run a directory server
  56. too. We must manually add you to the 'dirservers' file that's part of
  57. the distribution; users will only know about you when they upgrade to
  58. a new version. Of course, you can always just start up your router as a
  59. directory server too --- but users won't know to ask you for directories,
  60. and more importantly, you'll never learn from the real directory servers
  61. about recently joined routers.
  62. 4. Development.
  63. 4.1. Who's doing this?
  64. 4.2. Can I help?
  65. 4.3. I've got a bug.
  66. 5. Anonymity.
  67. 5.1. So I'm totally anonymous if I use Tor?
  68. 5.2. Where can I learn more about anonymity?
  69. 5.3. What attacks remain against onion routing?
  70. 6. Comparison to related projects.
  71. 6.1. Onion Routing.
  72. Tor *is* onion routing.
  73. 6.2. Freedom.
  74. 7. Protocol and application support.
  75. 7.1. http? ftp? udp? socks? mozilla?