tor-doc.html 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394
  1. <html>
  2. <head>
  3. <title>Tor: an anonymizing overlay network for TCP</title>
  4. <meta name="Author" content="Roger Dingledine">
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  6. <meta http-equiv="Content-Style-Type" content="text/css">
  7. <link rel="stylesheet" type="text/css" href="tor-doc.css">
  8. </head>
  9. <body>
  10. <h1><a href="http://tor.freehaven.net/">Tor</a> documentation</h1>
  11. <p>The simple version: Tor provides a distributed network of servers
  12. ("onion routers"). Users bounce their TCP streams (web traffic, FTP, SSH,
  13. etc.) around the routers. This makes it hard for recipients, observers, and
  14. even the onion routers themselves to track the source of the stream.</p>
  15. <p>The complex version: Onion Routing is a connection-oriented anonymizing
  16. communication service. Users choose a source-routed path through a set of
  17. nodes, and negotiate a "virtual circuit" through the network, in which
  18. each node knows its predecessor and successor, but no others. Traffic
  19. flowing down the circuit is unwrapped by a symmetric key at each node,
  20. which reveals the downstream node.</p>
  21. <a name="why"></a>
  22. <h2>Why should I use Tor?</h2>
  23. <p>Individuals need Tor for privacy:
  24. <ul>
  25. <li>Privacy in web browsing -- both from the remote website (so it can't
  26. track and sell your behavior), and similarly from your local ISP.
  27. <li>Safety in web browsing: if your local government doesn't approve
  28. of its citizens visiting certain websites, they may monitor the sites
  29. and put readers on a list of suspicious persons.
  30. <li>Circumvention of local censorship: connect to resources (news
  31. sites, instant messaging, etc) that are restricted from your
  32. ISP/school/company/government.
  33. <li>Socially sensitive communication: chat rooms and web forums for
  34. rape and abuse survivors, or people with illnesses.
  35. </ul>
  36. <p>Journalists and NGOs need Tor for safety:
  37. <ul>
  38. <li>Allowing dissidents and whistleblowers to communicate more safely.
  39. <li>Censorship-resistant publication, such as making available your
  40. home-made movie anonymously via a Tor <a href="#hidden-service">hidden
  41. service</a>; and reading, e.g. of news sites not permitted in some
  42. countries.
  43. <li>Allowing your workers to check back with your home website while
  44. they're in a foreign country, without notifying everybody nearby that
  45. they're working with your organization.
  46. </ul>
  47. <p>Companies need Tor for business security:
  48. <ul>
  49. <li>Competitive analysis: browse the competition's website safely.
  50. <li>Protecting collaborations of sensitive business units or partners.
  51. <li>Protecting procurement suppliers or patterns.
  52. <li>Putting the "P" back in "VPN": traditional VPNs reveal the exact
  53. amount and frequency of communication. Which locations have employees
  54. working late? Which locations have employees consulting job-hunting
  55. websites? Which research groups are communicating with your company's
  56. patent lawyers?
  57. </ul>
  58. <p>Governments need Tor for traffic-analysis-resistant communication:
  59. <ul>
  60. <li>Open source intelligence gathering (hiding individual analysts is
  61. not enough -- the organization itself may be sensitive).
  62. <li>Defense in depth on open <em>and classified</em> networks -- networks
  63. with a million users (even if they're all cleared) can't be made safe just
  64. by hardening them to external threat.
  65. <li>Dynamic and semi-trusted international coalitions: the network can
  66. be shared without revealing the existence or amount of communication
  67. between all parties.
  68. <li>Networks partially under known hostile control: to block
  69. communications, the enemy must take down the whole network.
  70. <li>Politically sensitive negotiations.
  71. <li>Road warriors.
  72. <li>Protecting procurement patterns.
  73. <li>Anonymous tips.
  74. </ul>
  75. <p>Law enforcement needs Tor for safety:
  76. <ul>
  77. <li>Allowing anonymous tips or crime reporting
  78. <li>Allowing agents to observe websites without notifying them that
  79. they're being observed (or, more broadly, without having it be an
  80. official visit from law enforcement).
  81. <li>Surveillance and honeypots (sting operations)
  82. </ul>
  83. <p>Does the idea of sharing the Tor network with
  84. all of these groups bother you? It shouldn't -- <a
  85. href="http://freehaven.net/doc/fc03/econymics.pdf">you need them for
  86. your security</a>.</p>
  87. <a name="client-or-server"></a>
  88. <h2>Should I run a client or a server?</h2>
  89. <p>You can run Tor in either client mode or server mode. By default,
  90. everybody is a <i>client</i>. This means you don't relay traffic for
  91. anybody but yourself.</p>
  92. <p>If your computer doesn't have a routable IP address or you're using
  93. a modem, you should stay a client. Otherwise, please consider being
  94. a server, to help out the network. (Currently each server uses 20-500
  95. gigabytes of traffic per month, depending on its capacity and its rate
  96. limiting configuration.)</p>
  97. <p>Note that you can be a server without allowing users to make
  98. connections from your computer to the outside world. This is called being
  99. a middleman server.</p>
  100. <p> Benefits of running a server include:
  101. <ul>
  102. <li>You may get stronger anonymity, since your destination can't know
  103. whether connections relayed through your computer originated at your
  104. computer or not.
  105. <li>You can also get stronger anonymity by configuring your Tor clients
  106. to use your Tor server for entry or for exit.
  107. <li>You're helping me with development and scalability testing.
  108. <li>You're helping your fellow Internet users by providing a larger
  109. network. Also, having servers in many different pieces of the Internet
  110. gives users more robustness against curious telcos and brute force
  111. attacks.
  112. </ul>
  113. <p>You can read more about setting up Tor as a
  114. server <a href="#server">below</a>.</p>
  115. <a name="installing"></a>
  116. <h2>Installing Tor</h2>
  117. <p>You can get the latest releases <a
  118. href="http://tor.freehaven.net/dist/">here</a>.</p>
  119. <p>If you got Tor from a tarball, unpack it: <tt>tar xzf
  120. tor-0.0.9.tar.gz; cd tor-0.0.9</tt>. Run <tt>./configure</tt>, then
  121. <tt>make</tt>, and then <tt>make install</tt> (as root if necessary). Then
  122. you can launch tor from the command-line by running <tt>tor</tt>.
  123. Otherwise, if you got it prepackaged (e.g. in the <a
  124. href="http://packages.debian.org/tor">Debian package</a> or <a
  125. href="http://packages.gentoo.org/packages/?category=net-misc;name=tor">Gentoo
  126. package</a>), these steps are already done for you, and you may
  127. even already have Tor started in the background (logging to
  128. /var/log/something).</p>
  129. <p>Win32 users can use our Tor installer. It will run Tor in a dos window
  130. so you can see its logs and errors. (You can minimize this window, but
  131. do not close it.)
  132. </p>
  133. <p>In any case, see the <a href="#client">next section</a> for what to
  134. <i>do</i> with it now that you've got it running.</p>
  135. <a name="client"></a>
  136. <h2>Configuring a client</h2>
  137. <p>Tor comes configured as a client by default. It uses a built-in
  138. default configuration file, and most people won't need to change any of
  139. the settings.</p>
  140. <!--
  141. <p>The only setting you might need to change is "SocksBindAddress".
  142. By default, your Tor client only listens for applications that connect
  143. from localhost. Connections from other computers are refused. If you
  144. want to torify applications on different computers than the Tor client,
  145. you should copy torrc.sample to torrc (it's installed by default
  146. to /usr/local/etc/tor/), change the SocksBindAddress line to
  147. 0.0.0.0, and then hup or restart Tor.</p>
  148. -->
  149. <p>After installing Tor, you should install <a
  150. href="http://www.privoxy.org/">privoxy</a>, which is a filtering web
  151. proxy that integrates well with Tor. Add the line <br>
  152. <tt>forward-socks4a / localhost:9050 .</tt><br>
  153. (don't forget the dot) to privoxy's config file (you can just add it to the
  154. top). Then change your browser to http proxy at localhost port 8118.
  155. (In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's
  156. Tools|Internet Options|Connections|LAN Settings|Advanced.)
  157. You should also set your SSL proxy (IE calls it "Secure") to the same
  158. thing, to hide your SSL traffic. Using privoxy is <b>necessary</b> because
  159. <a href="http://tor.freehaven.net/cvs/tor/doc/CLIENTS">Mozilla leaks your
  160. DNS requests when it uses a socks proxy directly</a>. Privoxy also gives
  161. you good html scrubbing.</p>
  162. <p>To test if it's working, go to <a
  163. href="http://www.junkbusters.com/cgi-bin/privacy">http://www.junkbusters.com/cgi-bin/privacy</a>
  164. and see what IP it says you're coming from.
  165. </p>
  166. <p>
  167. If you have a personal firewall, be sure to allow local connections to
  168. port 8118 and port 9050. If your firewall blocks outgoing connections,
  169. punch a hole so it can connect to TCP ports 80, 443, and 9001-9033.
  170. <!--If you're
  171. using Safari as your browser, keep in mind that OS X before 10.3 claims
  172. to support socks but does not. -->
  173. For more troubleshooting suggestions, see <a
  174. href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ</a>.
  175. </p>
  176. <p>To Torify an application that supports http, just point it at
  177. Privoxy. To use socks directly, point it at localhost port 9050. For
  178. applications that support neither socks nor http, you should look at
  179. using <a href="http://tsocks.sourceforge.net/">tsocks</a>
  180. to dynamically replace the system calls in your program to
  181. route through Tor. If you want to use socks4a, consider using <a
  182. href="http://www.dest-unreach.org/socat/">socat</a> (specific instructions
  183. are on <a href="http://6sxoyfb3h2nvok2d.onion/tor/SocatHelp">this hidden
  184. service url</a>).</p>
  185. <p>(Windows doesn't have tsocks; instead, you can try
  186. <a
  187. href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a>
  188. or the <a href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>
  189. SOCKS client.)</p>
  190. <a name="server"></a>
  191. <h2>Configuring a server</h2>
  192. <p>We're looking for people with reasonably reliable Internet connections,
  193. that have at least 20 kilobytes/s each way. If you frequently have a
  194. lot of packet loss or really high latency, we can't handle your server
  195. yet. Otherwise, please help out!
  196. </p>
  197. <p>Other things to note:
  198. <ul>
  199. <li>Tor has built-in support for rate limiting; see BandwidthRate
  200. and BandwidthBurst config options. Further, if you have
  201. lots of capacity but don't want to spend that many bytes per
  202. month, check out the Accounting and Hibernation features. See <a
  203. href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ</a>
  204. for details.</li>
  205. <li>It's fine if the server goes offline sometimes. The directories
  206. notice this quickly and stop advertising the server. Just try to make
  207. sure it's not too often, since connections using the server when it
  208. disconnects will break.</li>
  209. <li>We can handle servers with dynamic IPs just fine, as long as the
  210. server itself knows its IP. If your server is behind a NAT and it doesn't
  211. know its public IP (e.g. it has an IP of 192.168.x.y), then we can't use it
  212. as a server yet. (If you want to port forward and set your Address
  213. config option to use dyndns DNS voodoo to get around this, feel free. If
  214. you write a howto, <a href="mailto:tor-volunteer@freehaven.net">even
  215. better</a>.)</li>
  216. <li>Your server will passively estimate and advertise its recent
  217. bandwidth capacity.
  218. Clients choose paths weighted by this capacity, so high-bandwidth
  219. servers will attract more paths than low-bandwidth ones. That's why
  220. having even low-bandwidth servers is useful too.</li>
  221. </ul>
  222. </p>
  223. <p>To set up a Tor server, do the following steps after installing Tor.
  224. (These instructions are Unix-centric; if you're excited about working
  225. with us to get a Tor server working on Windows, let us know and we'll
  226. work with you to fix whatever bugs come up.)
  227. </p>
  228. <ul>
  229. <li>1. Copy torrc.sample to torrc (in the default configuration this
  230. means copy /usr/local/etc/tor/torrc.sample to /usr/local/etc/tor/torrc),
  231. and edit the bottom part. Create the DataDirectory, and make sure it's
  232. owned by the uid/gid that will be running tor. Fix your system clock so
  233. it's not too far off. Make sure name resolution works.
  234. <!--Make sure each
  235. process can get to 1024 file descriptors (this should be already done
  236. for everybody but some BSD folks). -->
  237. <li>2. Run tor to generate keys and then exit: <tt>tor
  238. --list-fingerprint</tt>. Send mail to tor-ops@freehaven.net including
  239. a) this key fingerprint, b) who you are, so we know whom to contact if
  240. there's any problem, and c) what kind of connectivity the new server
  241. will have. If possible, PGP sign your mail.
  242. <li>3. If you are using a firewall, open a hole in your firewall so
  243. incoming connections can reach the ports you configured (i.e. ORPort,
  244. plus DirPort if you enabled it). Make sure outgoing connections can reach
  245. at least ports 80, 443, and 9001-9033 (to get to other onion routers),
  246. plus any other addresses or ports your exit policy allows.
  247. <li>4. Start your server: <tt>tor</tt>. If it logs any warnings,
  248. address them.
  249. </ul>
  250. <p>
  251. Optionally, we recommend the following steps as well:
  252. </p>
  253. <ul>
  254. <li>1. Make a separate user to run the server. If you
  255. installed the deb or the rpm, this is already done. Otherwise,
  256. you can do it by hand. (The Tor server doesn't need to be run as
  257. root, so it's good practice to not run it as root. Running as a
  258. 'tor' user avoids issues with identd and other services that
  259. detect user name. If you're the paranoid sort, feel free to <a
  260. href="http://wiki.noreply.org/wiki/TheOnionRouter/TorInChroot">put Tor
  261. into a chroot jail</a>.)
  262. <li>2. Decide what exit policy you want. By default your server allows
  263. access to many popular services, but we restrict some (such as port 25)
  264. due to abuse potential. You might want an exit policy that is either
  265. less restrictive or more restrictive; edit your torrc appropriately.
  266. If you choose a particularly open exit policy, you might want to make
  267. sure your upstream or ISP is ok with that choice.
  268. <li>3. You may find the initscripts in contrib/tor.sh or
  269. contrib/torctl useful if you want to set up Tor to start at boot. Let
  270. us know which script you find more useful.
  271. <li>4. Consider setting your hostname to 'anonymous' or
  272. 'proxy' or 'tor-proxy' if you can, so when other people see the address
  273. in their web logs or whatever, they will more quickly understand what's
  274. going on.
  275. <li>5. If you're not running anything else on port 80 or port
  276. 443, please consider setting up port-forwarding and advertising these
  277. low-numbered ports as your Tor server. This will help allow users behind
  278. particularly restrictive firewalls to access the Tor network. See section
  279. 4 of <a href="http://wiki.noreply.org/wiki/TheOnionRouter_2fTorFAQ">the
  280. FAQ</a> for details of how to set this up.
  281. </ul>
  282. <p>You can click <a href="http://moria.seul.org:9031/">here</a> or <a
  283. href="http://62.116.124.106:9030/">here</a> and look at the router-status
  284. line to see if your server is part of the network. It will be listed by
  285. nickname once we have added your server to the list of known servers;
  286. otherwise it is listed only by its fingerprint.</p>
  287. <a name="hidden-service"></a>
  288. <h2>Configuring a hidden service</h2>
  289. <p>Tor allows clients and servers to offer <em>hidden services</em>. That
  290. is, you can offer an apache, sshd, etc, without revealing your IP to its
  291. users. This works via Tor's rendezvous point design: both sides build
  292. a Tor circuit out, and they meet in the middle.</p>
  293. <p>If you're using Tor and <a href="http://www.privoxy.org/">Privoxy</a>,
  294. you can <a href="http://6sxoyfb3h2nvok2d.onion/">go to the hidden wiki</a>
  295. to see hidden services in action.</p>
  296. <p>To set up a hidden service, copy torrc.sample to torrc (by default it's
  297. in /usr/local/etc/tor/), and edit the middle part. Then run Tor. It will
  298. create each HiddenServiceDir you have configured, and it will create a
  299. 'hostname' file which specifies the url (xyz.onion) for that service. You
  300. can tell people the url, and they can connect to it via their Tor client,
  301. assuming they're using a proxy (such as Privoxy) that speaks socks4a.</p>
  302. <a name="own-network"></a>
  303. <h2>Setting up your own network</h2>
  304. <p>
  305. If you want to experiment locally with your own network, or you're cut
  306. off from the Internet and want to be able to mess with Tor still, then
  307. you may want to set up your own separate Tor network.
  308. <p>
  309. To set up your own Tor network, you need to run your own directory
  310. servers, and you need to configure each client and server so it knows
  311. about your directory servers rather than the default ones.
  312. <ul>
  313. <li>1: Grab the latest release. Use at least 0.0.9.
  314. <li>2: For each directory server you want,
  315. <ul>
  316. <li>2a: Set it up as a server (see <a href="#server">"setting up a
  317. server"</a> above), with a least ORPort, DirPort, DataDirectory, and Nickname
  318. defined. Set "AuthoritativeDirectory 1".
  319. <li>2b: Set "RecommendedVersions" to a comma-separated list of acceptable
  320. versions of the code for clients and servers to be running.
  321. <li>2c: Run it: <tt>tor --list-fingerprint</tt> if your torrc is in
  322. the default place, or <tt>tor -f torrc --list-fingerprint</tt> to
  323. specify one. This will generate your keys and output a fingerprint
  324. line.
  325. </ul>
  326. <li>3: Now you need to teach clients and servers to use the new
  327. dirservers. For each fingerprint, add a line like<br>
  328. <tt>DirServer 18.244.0.114:80 719B E45D E224 B607 C537 07D0 E214 3E2D 423E 74CF</tt><br>
  329. to the torrc of each client and server who will be using your network.
  330. <li>4: Create a file called approved-routers in the DataDirectory
  331. of each directory server. Collect the 'fingerprint' lines from
  332. each server (including directory servers), and include them (one per
  333. line) in each approved-routers file. You can hup the tor process for
  334. each directory server to reload the approved-routers file (so you don't
  335. have to restart the process).
  336. </ul>
  337. <!--<h2>Other doc resources</h2>
  338. <ul>
  339. <li>Design paper
  340. <li>Spec and rend-spec
  341. <li>others
  342. </ul> -->
  343. </body>
  344. </html>