Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Gus
Tor
Commits
fbb0a450
Commit
fbb0a450
authored
21 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
update the FAQ so it's just useless, not wrong
svn:r802
parent
0763f800
Loading
Loading
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
doc/FAQ
+24
-25
24 additions, 25 deletions
doc/FAQ
doc/HACKING
+3
-3
3 additions, 3 deletions
doc/HACKING
doc/tor-design.tex
+1
-1
1 addition, 1 deletion
doc/tor-design.tex
with
28 additions
and
29 deletions
doc/FAQ
+
24
−
25
View file @
fbb0a450
...
...
@@ -3,33 +3,34 @@ The Onion Routing (TOR) Frequently Asked Questions
1. General.
1.1. What is
t
or?
1.1. What is
T
or?
Tor is an implementation of version 2 of Onion Routing.
Go read the tor-design.pdf for the details.
Onion Routing is a connection-oriented anonymizing communication
service. Users build a layered block of asymmetric encryptions
(an "onion") which describes a source-routed path through a set of
nodes. Those nodes build a "virtual circuit" through the network, in which
each node knows its predecessor and successor, but no others. Traffic
flowing down the circuit is unwrapped by a symmetric key at each node,
which reveals the downstream node.
In brief, Onion Routing is a connection-oriented anonymizing communication
service. Users choose a source-routed path through a set of nodes, and
negotiate a "virtual circuit" through the network, in which each node
knows its predecessor and successor, but no others. Traffic flowing down
the circuit is unwrapped by a symmetric key at each node, which reveals
the downstream node.
Basically
t
or provides a distributed network of servers ("onion
Basically
T
or provides a distributed network of servers ("onion
routers"). Users bounce their tcp streams (web traffic, ftp, ssh, etc)
around the routers, and recipients, observers, and even the routers
themselves have difficulty tracking the source of the stream.
1.2. Why's it called
t
or?
1.2. Why's it called
T
or?
Because
t
or is the onion routing system. I kept telling people I was
Because
T
or is the onion routing system. I kept telling people I was
working on onion routing, and they said "Neat. Which one?" Even if onion
routing has become a standard household term, this is the actual onion
routing project, started out of the Naval Research Lab.
(Theories about recursive acronyms are ok too.)
(Theories about recursive acronyms are ok too. It's also got a fine
translation into German.)
1.3 Is there a backdoor in
t
or?
1.3 Is there a backdoor in
T
or?
Not right now, but if this answer changes we probably won't be allowed
to tell you. You should always check the source (or at least the diffs
...
...
@@ -42,12 +43,12 @@ source, that's a sure sign something funny could be going on.
for you.]
3. Running
t
or.
3. Running
T
or.
3.1. What kind of server should I run?
The same executable
("or")
functions as both client and server, depending
on
which ports are specified in the configuration file. You can specify:
The same executable functions as both client and server, depending
on
which ports are specified in the configuration file. You can specify:
* SocksPort: client applications (eg privoxy, Mozilla) can speak socks to
this port.
* ORPort: other onion routers connect to this port
...
...
@@ -56,18 +57,18 @@ on which ports are specified in the configuration file. You can specify:
3.2. So I can just run a full onion router and join the network?
No. Users should run just an onion proxy
(use the 'oprc' config file).
If you start up a full onion
router, the rest of the routers in the
system won't recognize you,
so they will reject your handshake attempts.
No. Users should run just an onion proxy
. If you start up a full onion
router, the rest of the routers in the
system won't recognize you,
so they will reject your handshake attempts.
3.3. How do I join the network then?
If you just want to use the onion routing network, you can run a proxy
and you're all set. If you want to run a router, you must convince
the directory server operators (currently arma@mit.edu) that you're a
trustworthy person. From there, the operators add you to
the directory,
which propagates out to the rest of the network. All
nodes will know
about you within a
n
hour.
trustworthy
and reliable
person. From there, the operators add you to
the directory,
which propagates out to the rest of the network. All
nodes will know
about you within a
half
hour.
3.4. I want to run a directory server too.
...
...
@@ -93,7 +94,7 @@ about recently joined routers.
5. Anonymity.
5.1. So I'm totally anonymous if I use
t
or?
5.1. So I'm totally anonymous if I use
T
or?
...
...
@@ -101,8 +102,6 @@ about recently joined routers.
5.3. What attacks remain against onion routing?
tagging: can change bytes in the cells, even through link encryption
end node can give back wrong data, even subtly wrong data.
6. Comparison to related projects.
...
...
This diff is collapsed.
Click to expand it.
doc/HACKING
+
3
−
3
View file @
fbb0a450
...
...
@@ -12,8 +12,8 @@ the distant future, stuff may have changed.)
Read the README file first, so you can get familiar with the basics of
installing and running an onion router.
Then, skim some of the introductory materials in tor-
spec.txt
,
tor-
design.tex
, and the Tor FAQ to learn more about how the Tor protocol
Then, skim some of the introductory materials in tor-
design.pdf
,
tor-
spec.txt
, and the Tor FAQ to learn more about how the Tor protocol
is supposed to work. This document will assume you know about Cells,
Circuits, Streams, Connections, Onion Routers, and Onion Proxies.
...
...
@@ -180,7 +180,7 @@ the distant future, stuff may have changed.)
A circuit_t structure fills two roles. First, a circuit_t links two
connections together: either an edge connection and an OR connection,
or two OR connections. (When joined to an OR connection, a circuit_t
affects only cells sent to a particular
ACI
on that connection. When
affects only cells sent to a particular
circID
on that connection. When
joined to an edge connection, a circuit_t affects all data.)
Second, a circuit_t holds the cipher keys and state for sending data
...
...
This diff is collapsed.
Click to expand it.
doc/tor-design.tex
+
1
−
1
View file @
fbb0a450
...
...
@@ -1800,7 +1800,7 @@ our overall usability.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% commented out for anonymous submission
\
S
ection
{
Acknowledgments
}
\
s
ection
*
{
Acknowledgments
}
Peter Palfrader, Geoff Goodell, Adam Shostack, Joseph Sokol-Margolis,
John Bashinski, Zack Brown:
for editing and comments.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment