get rid of trailing whitespace

This commit is contained in:
Roger Dingledine 2014-06-14 05:19:39 +00:00
parent 1ed9963e19
commit 2b63e88f02

View File

@ -83,7 +83,7 @@ includes Tor?</a></li>
</a></li>
<li><a href="#SophosOnMac">I'm using the Sophos anti-virus
software on my Mac, and Tor starts but I can't browse anywhere.</a></li>
<li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
<li><a href="#XPCOMError">When I open the Tor Browser Bundle I get an
error message from the browser: "Cannot load XPCOM".</a></li>
<li><a href="#TBBOtherExtensions">Can I install other Firefox
extensions? Which extensions should I avoid using?</a></li>
@ -173,7 +173,7 @@ be?</a></li>
with abuse issues.</a></li>
<li><a href="#BestOSForRelay">Why doesn't my Windows (or other OS) Tor
relay run well?</a></li>
<li><a href="#PackagedTor">Should I install Tor from my package manager,
<li><a href="#PackagedTor">Should I install Tor from my package manager,
or build from source?</a></li>
<li><a href="#WhatIsTheBadExitFlag">What is the BadExit flag?</a></li>
<li><a href="#IGotTheBadExitFlagWhyDidThatHappen">I got the BadExit flag.
@ -552,13 +552,13 @@ Tor?</a></h3>
Tor software, though. They want to distribute the <a
href="<page projects/torbrowser>">Tor Browser</a>. This includes <a
href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox
Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
extensions. You will need to follow the license for those programs as
well. Both of those Firefox extensions are distributed under
Extended Support Release</a>, and the NoScript and HTTPS-Everywhere
extensions. You will need to follow the license for those programs as
well. Both of those Firefox extensions are distributed under
the <a href="https://www.fsf.org/licensing/licenses/gpl.html">GNU General
Public License</a>, while Firefox ESR is released under the Mozilla Public
License. The simplest way to obey their licenses is to include the source
code for these programs everywhere you include the bundles themselves.
Public License</a>, while Firefox ESR is released under the Mozilla Public
License. The simplest way to obey their licenses is to include the source
code for these programs everywhere you include the bundles themselves.
</p>
<p>
@ -870,13 +870,13 @@ executive
<a id="Mobile"></a>
<h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
<h3><a class="anchor" href="#Mobile">Can I use Tor on my phone or mobile
device?</a></h3>
<p>
Tor on Android devices is maintained by the <a
href="https://guardianproject.info">Guardian Project</a>. Currently, there
is no supported way of using Tor on iOS; the Guardian Project is
Tor on Android devices is maintained by the <a
href="https://guardianproject.info">Guardian Project</a>. Currently, there
is no supported way of using Tor on iOS; the Guardian Project is
working to make this a reality in the future.
</p>
@ -913,9 +913,9 @@ executive
those relays, and those connections will fail, leading to complex
anonymity implications for the clients which we'd like to avoid.
</p>
<hr>
<a id="IsItWorking"></a>
<h3><a class="anchor" href="#IsItWorking">How can I tell if Tor is
working, and that my connections really are anonymized?</a></h3>
@ -925,9 +925,9 @@ executive
coming through the Tor network. Try the <a href="https://check.torproject.org">
Tor Check</a> site and see whether it thinks you are using Tor or not.
</p>
<hr>
<a id="FTP"></a>
<h3><a class="anchor" href="#FTP">How do I use my browser for ftp with Tor?
</a></h3>
@ -941,7 +941,7 @@ executive
</p>
<hr>
<a id="NoDataScrubbing"></a>
<h3><a class="anchor" href="#NoDataScrubbing">Does Tor remove personal
information from the data my application sends?</a></h3>
@ -1164,9 +1164,9 @@ code under a video's "Share" option. The link switches out a URL that looks</p>
<h3><a class="anchor" href="#Ubuntu">
I'm using Ubuntu and I can't start Tor Browser.</a></h3>
<p>
You'll need to tell Ubuntu that you want the ability to execute shell scripts
from the graphical interface. Open "Files" (Unity's explorer), open
Preferences-> Behavior Tab -> Set "Run executable text files when they are
You'll need to tell Ubuntu that you want the ability to execute shell scripts
from the graphical interface. Open "Files" (Unity's explorer), open
Preferences-> Behavior Tab -> Set "Run executable text files when they are
opened" to "Ask every time", then OK.
</p>
<p>You can also start the Tor Browser from the command line by running </p>
@ -1186,21 +1186,21 @@ internet. Go to Preferences -> Web Protection -> General, and turn off
the protections for "Malicious websites" and "Malicious downloads".
</p>
<p>
We encourage affected Sophos users to contact Sophos support about
We encourage affected Sophos users to contact Sophos support about
this issue.
</p>
<hr>
<a id="XPCOMError"></a>
<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
<h3><a class="anchor" href="#XPCOMError">When I open the Tor Browser Bundle
I get an error message from the browser: "Cannot load XPCOM".</a></h3>
<p>
This <a
href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
specifically caused by the Webroot SecureAnywhere Antivirus software.
Consider switching to a different antivirus program. We encourage affected
This <a
href="https://trac.torproject.org/projects/tor/ticket/10789">problem</a> is
specifically caused by the Webroot SecureAnywhere Antivirus software.
Consider switching to a different antivirus program. We encourage affected
Webroot users to contact Webroot support about this issue.
</p>
@ -1345,7 +1345,7 @@ Why does Google show up in foreign languages?</a></h3>
If you really want to see Google in English you can click the link that
provides that. But we consider this a feature with Tor, not a bug --- the
Internet is not flat, and it in fact does look different depending on
where you are. This feature reminds people of this fact.
where you are. This feature reminds people of this fact.
</p>
<p>
Note that Google search URLs take name/value pairs as arguments and one
@ -1461,7 +1461,7 @@ configuration</a> of Tor and Privoxy.
</p>
<p>
If you're unable to use the application's native proxy settings, all hope is
If you're unable to use the application's native proxy settings, all hope is
not lost. See <a href="#CantSetProxy">below</a>.
</p>
@ -1568,12 +1568,12 @@ href="http://www.crowdstrike.com/community-tools/index.html#tool-79">proposed
<h3><a class="anchor" href="#VerifyDownload">How do I verify the download
(sha256sums.txt)?</a></h3>
<p>Instructions are on the <a
href="<page docs/verifying-signatures>#BuildVerification">verifying
<p>Instructions are on the <a
href="<page docs/verifying-signatures>#BuildVerification">verifying
signatures</a> page.</p>
<hr>
<a id="NewIdentityClosingTabs"></a>
<h3><a class="anchor" href="#NewIdentityClosingTabs">Why does "New
Identity" close all my open tabs?</a></h3>
@ -2206,9 +2206,9 @@ from the source code release tor-0.2.4.16-rc is:
consider <a href="https://www.torproject.org/docs/tor-relay-debian">helping
out</a>.
</p>
<hr>
<a id="WhyIsntMyRelayBeingUsedMore"></a>
<h3><a class="anchor" href="#WhyIsntMyRelayBeingUsedMore">Why isn't my
relay being used more?</a></h3>
@ -2227,7 +2227,7 @@ from the source code release tor-0.2.4.16-rc is:
"https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays/">
tor-relays list</a>.
</p>
<hr>
<a id="IDontHaveAStaticIP"></a>
@ -2268,17 +2268,17 @@ from the source code release tor-0.2.4.16-rc is:
<hr>
<a id="HighCapacityConnection"></a>
<a id="HighCapacityConnection"></a>
<h3><a class="anchor" href="#HighCapacityConnection">How can I get Tor to fully
make use of my high capacity connection?</a></h3>
<p>
See <a href="http://archives.seul.org/or/relays/Aug-2010/msg00034.html">this
tor-relays thread</a>.
</p>
<hr>
<hr>
<a id="RelayFlexible"></a>
<h3><a class="anchor" href="#RelayFlexible">How stable does my relay
need to be?</a></h3>
@ -2330,7 +2330,7 @@ too.
</ul>
<hr>
<a id="BandwidthShaping"></a>
<h3><a class="anchor" href="#BandwidthShaping">What bandwidth shaping
options are available to Tor relays?</a></h3>
@ -2599,29 +2599,29 @@ users
<hr>
<a id="PackagedTor"></a>
<h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
<h3><a class="anchor" href="#PackagedTor">Should I install Tor from my
package manager, or build from source?</a></h3>
<p>
If you're using Debian or Ubuntu especially, there are a number of benefits
to installing Tor from the <a
href="https://www.torproject.org/docs/debian.html.en">Tor Project's
repository</a>.
If you're using Debian or Ubuntu especially, there are a number of benefits
to installing Tor from the <a
href="https://www.torproject.org/docs/debian.html.en">Tor Project's
repository</a>.
</p>
<ul>
<li>
You're ulimit -n gets set to 32768, high enough for Tor to keep open all
the connections it needs.
You're ulimit -n gets set to 32768, high enough for Tor to keep open all
the connections it needs.
</li>
<li>
A user profile is created just for Tor, so Tor doesn't need to run as
A user profile is created just for Tor, so Tor doesn't need to run as
root.
</li>
<li>
An init script is included so that Tor runs at boot.
</li>
<li>
Tor runs with --verify-config, so that most problems with your
config file get caught.
Tor runs with --verify-config, so that most problems with your
config file get caught.
</li>
<li>
Tor can bind to low level ports, then drop privileges.
@ -2666,7 +2666,7 @@ users
of the Guards: A Framework for Understanding and Improving Entry Guard
Selection in Tor</a>.
</p>
<hr>
<a id="TorClientOnADifferentComputerThanMyApplications"></a>
@ -3257,7 +3257,7 @@ diversity,
<a id="AccessHiddenServices"></a>
<h3><a class="anchor" href="#AccessHiddenServices">How do I access
hidden services?</a></h3>
<p>
Tor hidden services are named with a special top-level domain (TLD)
name in DNS: .onion. Since the .onion TLD is not recognized by the
@ -3272,7 +3272,7 @@ diversity,
Tor directly. You can't try to resolve it to an IP address, since there
<i>is</i> no corresponding IP address: the server is hidden, after all!
</p>
<p>
So, how do you make your application pass the hostname directly to Tor?
You can't use SOCKS 4, since SOCKS 4 proxies require an IP from the
@ -3282,7 +3282,7 @@ diversity,
SOCKS proxy. SOCKS 4a, however, always accepts a hostname: You'll need
to use SOCKS 4a.
</p>
<p>
Some applications, such as the browsers Mozilla Firefox and Apple's
Safari, support sending DNS queries to Tor's SOCKS 5 proxy. Most web
@ -3290,7 +3290,7 @@ diversity,
to point your web browser at an HTTP proxy, and tell the HTTP proxy
to speak to Tor with SOCKS 4a. We recommend Polipo as your HTTP proxy.
</p>
<p>
For applications that do not support HTTP proxy, and so cannot use
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
@ -3299,24 +3299,24 @@ diversity,
will allow you to use almost any program with Tor without leaking DNS
lookups and allow those same programs to access hidden services.
</p>
<p>
See also the <a href="#SocksAndDNS">question on DNS</a>.
</p>
</p>
<hr>
<a id="ProvideAHiddenService"></a>
<h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
hidden service?</a></h3>
<p>
See the <a href="<page docs/tor-hidden-service>">
official hidden service configuration instructions</a>.
</p>
<hr>
<a id="Development"></a>
<h2><a class="anchor">Development:</a></h2>
@ -3357,7 +3357,7 @@ diversity,
<a id="PrivateTorNetwork"></a>
<h3><a class="anchor" href="#PrivateTorNetwork">How do I set up my
own private Tor network?</a></h3>
<p>
If you want to experiment locally with your own network, or you're
cut off from the Internet and want to be able to mess with Tor still,
@ -3436,7 +3436,7 @@ diversity,
<a id="WhatIsLibevent"></a>
<h3><a class="anchor" href="#WhatIsLibevent">What is Libevent?</a></h3>
<p>
When you want to deal with a bunch of net connections at once, you
have a few options:
@ -3479,7 +3479,7 @@ diversity,
<a id="MyNewFeature"></a>
<h3><a class="anchor" href="#MyNewFeature">What do I need to do to get
a new feature into Tor?</a></h3>
<p>
For a new feature to go into Tor, it needs to be designed (explain what
you think Tor should do), argued to be secure (explain why it's better
@ -3502,7 +3502,7 @@ diversity,
<a id="WhatProtectionsDoesTorProvide"></a>
<h3><a class="anchor" href="#WhatProtectionsDoesTorProvide">What
protections does Tor provide?</a></h3>
<p>
Internet communication is based on a store-and-forward model that
can be understood in analogy to postal mail: Data is transmitted in
@ -3518,7 +3518,7 @@ diversity,
server in the Internet that can see any of the packets can profile your
behaviour.
</p>
<p>
The aim of Tor is to improve your privacy by sending your traffic through
a series of proxies. Your communication is encrypted in multiple layers
@ -3529,11 +3529,11 @@ diversity,
communicating with Tor nodes. Similarly, servers in the Internet just
see that they are being contacted by Tor nodes.
</p>
<p>
Generally speaking, Tor aims to solve three privacy problems:
</p>
<p>
First, Tor prevents websites and other services from learning
your location, which they can use to build databases about your
@ -3541,13 +3541,13 @@ diversity,
give you away by default -- now you can have the ability to choose,
for each connection, how much information to reveal.
</p>
<p>
Second, Tor prevents people watching your traffic locally (such as
your ISP) from learning what information you're fetching and where
you're fetching it from. It also stops them from deciding what you're
allowed to learn and publish -- if you can get to any part of the Tor
network, you can reach any site on the Internet.
network, you can reach any site on the Internet.
</p>
<p>
@ -3557,26 +3557,26 @@ diversity,
provides more security than the old <a href="#Torisdifferent">one hop proxy
</a> approach.
</p>
<p>
Note, however, that there are situations where Tor fails to solve these
privacy problems entirely: see the entry below on <a
href="#AttacksOnOnionRouting">remaining attacks</a>.
href="#AttacksOnOnionRouting">remaining attacks</a>.
</p>
<hr>
<a id="CanExitNodesEavesdrop"></a>
<h3><a class="anchor" href="#CanExitNodesEavesdrop">Can exit nodes eavesdrop
on communications? Isn't that bad?</a></h3>
<p>
Yes, the guy running the exit node can read the bytes that come in and
out there. Tor anonymizes the origin of your traffic, and it makes sure
to encrypt everything inside the Tor network, but it does not magically
encrypt all traffic throughout the Internet.
</p>
<p>
This is why you should always use end-to-end encryption such as SSL for
sensitive Internet connections. (The corollary to this answer is that if
@ -3584,7 +3584,7 @@ diversity,
*not* using end-to-end encryption at the application layer, then something
has already gone wrong and you shouldn't be thinking that Tor is the problem.)
</p>
<p>
Tor does provide a partial solution in a very specific situation, though.
When you make a connection to a destination that also runs a Tor relay,
@ -3602,9 +3602,9 @@ diversity,
does the Tor client learn which relays are associated with which
websites in a decentralized yet non-gamable way?").
</p>
<hr>
<a id="AmITotallyAnonymous"></a>
<h3><a class="anchor" href="#AmITotallyAnonymous">So I'm totally anonymous
if I use Tor?</a></h3>
@ -3729,7 +3729,7 @@ diversity,
</p>
<hr>
<a id="KeyManagement"></a>
<h3><a class="anchor" href="#KeyManagement">Tell me about all the
keys Tor uses.</a></h3>
@ -3995,10 +3995,10 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
<a id="IsTorLikeAVPN"></a>
<h3><a class="anchor" href="#IsTorLikeAVPN">Is Tor like a VPN?</a></h3>
<p>
<b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
If you're looking for a trusted entry into the Tor network, or if you want
<b>Do not use a VPN as an <a href="http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361">anonymity solution</a>.</b>
If you're looking for a trusted entry into the Tor network, or if you want
to obscure the fact that you're using Tor, <a
href="https://www.torproject.org/docs/bridges#RunningABridge">setting up
a private server as a bridge</a> works quite well.
@ -4044,7 +4044,7 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
<a id="Proxychains"></a>
<h3><a class="anchor" href="#Proxychains">Aren't 10 proxies
(proxychains) better than Tor with only 3 hops?</a></h3>
<p>
Proxychains is a program that sends your traffic through a series of
open web proxies that you supply before sending it on to your final
@ -4066,9 +4066,9 @@ ZKS's Freedom network could) -- but maybe that's a good thing at this stage.
engine are compromised machines, misconfigured private proxies
not intended for public use, or honeypots set up to exploit users.
</p>
<hr>
<a id="AttacksOnOnionRouting"></a>
<h3><a class="anchor" href="#AttacksOnOnionRouting">What attacks remain
@ -4516,7 +4516,7 @@ only solution is to have no opinion.
<a id="SendPadding"></a>
<h3><a class="anchor" href="#SendPadding">You should send padding so it's
more secure.</a></h3>
<p>
Like all anonymous communication networks that are fast enough for web
browsing, Tor is vulnerable to statistical "traffic confirmation"
@ -4525,7 +4525,7 @@ only solution is to have no opinion.
nice if we could use cover traffic to confuse this attack. But there
are three problems here:
</p>
<ul>
<li>
Cover traffic is really expensive. And *every* user needs to be doing
@ -4548,26 +4548,26 @@ only solution is to have no opinion.
patterns later in the path.
</li>
</ul>
<p>
In short, for a system like Tor that aims to be fast, we don't see any
use for padding, and it would definitely be a serious usability problem.
We hope that one day somebody will prove us wrong, but we are not
optimistic.
</p>
<hr>
<a id="Steganography"></a>
<h3><a class="anchor" href="#Steganography">You should use steganography to hide Tor
traffic.</a></h3>
<p>
Many people suggest that we should use steganography to make it hard
to notice Tor connections on the Internet. There are a few problems
with this idea though:
</p>
<p>
First, in the current network topology, the Tor relays list <a
href="#HideExits">is public</a> and can be accessed by attackers.
@ -4575,7 +4575,7 @@ only solution is to have no opinion.
always just notice <b>any connection</b> to or from a Tor relay's
IP address.
</p>
<hr>
<a id="Abuse"></a>