From d97ab35aa14dfa3575cc1042603540885aaba21f Mon Sep 17 00:00:00 2001
From: Roger Dingledine Running a Tor client: Running a Tor relay:
Please contact us if you know any others.
+Once you've installed the Tor bundle, there are two questions to ask:
+first, is your Tor able to establish a circuit? Second, is your
+Firefox correctly configured to send its traffic through Tor?
+ If Tor can establish a circuit, the onion icon in
+Vidalia will turn green. You can also check in the Vidalia
+Control Panel to make sure it says "Connected to the Tor
+network!" under Status. For those not using Vidalia, check your TorFAQ#HowdoIsetuploggingorseeTorslogs">Tor logs for
+a line saying that Tor "has successfully opened a circuit. Looks like
+client functionality is working."
+
+If Tor can't establish a circuit, here are some hints:
+
+Step two is to confirm that Firefox is correctly configured to send its
+traffic through Tor. Try the Tor
+Check site and see whether it thinks you are using Tor. See TorFAQ#HowcanItellifTorisworkingandthatmyconnectionsreallyareanonymizedArethereexternalserversthatwilltestmyconnection">the
+Tor Check FAQ entry for details.
+
+
+
+If it thinks you're not using Tor, here are some hints:
+
+Vidalia interacts with the Tor software via Tor's "control port". The
+control port lets Vidalia receive status updates from Tor, request a new
+identity, configure Tor's settings, etc. Each time Vidalia starts Tor,
+Vidalia sets a random password for Tor's control port to prevent other
+applications from also connecting to the control port and potentially
+compromising your anonymity.
+
+Usually this process of generating and setting a random control password
+happens in the background. There are three common situations, though,
+where Vidalia may prompt you for a password:
+
-
+
+
+I installed Tor and Polipo but
+it's not working.
+
+
+
+
+
+
+
+
+
+
+Tor/Vidalia prompts for
+a password at start.
+
+
+
+
+If the dialog that prompts you for a control password has a Reset button,
+you can click the button and Vidalia will restart Tor with a new random
+control password.
+
+If you do not see a Reset button, or if Vidalia is unable to restart
+Tor for you, you can still fix the problem manually. Simply go into your
+process or task manager, and terminate the Tor process. Then use Vidalia
+to restart Tor and all will work again.
+
+You need to reconfigure Tor to not be a service. See the FAQ entry on
+running Tor as a Windows NT service
+for more information on how to remove the Tor service.
+
@@ -771,7 +927,92 @@
+This is a known and intermittent problem; it does not mean that Google +considers Tor to be spyware. +
+ ++When you use Tor, you are sending queries through exit relays that are also +shared by thousands of other users. Tor users typically see this message +when many Tor users are querying Google in a short period of time. Google +interprets the high volume of traffic from a single IP address (the exit +relay you happened to pick) as somebody trying to "crawl" their website, +so it slows down traffic from that IP address for a short time. +
++An alternate explanation is that Google tries to detect certain +kinds of spyware or viruses that send distinctive queries to Google +Search. It notes the IP addresses from which those queries are received +(not realizing that they are Tor exit relays), and tries to warn any +connections coming from those IP addresses that recent queries indicate +an infection. +
+ ++To our knowledge, Google is not doing anything intentionally specifically +to deter or block Tor use. The error message about an infected machine +should clear up again after a short time. +
+ ++Torbutton 1.2.5 (released in mid 2010) detects Google captchas and can +automatically redirect you to a more Tor-friendly search engine such as +Ixquick or Bing. +
+ ++Sometimes, after you've used Gmail over Tor, Google presents a +pop-up notification that your account may have been compromised. The +notification window lists a series of IP addresses and locations throughout +the world recently used to access your account. +
+ ++In general this is a false alarm: Google saw a bunch of logins from +different places and wanted to let +you know. If you use Tor to access a Google service, then it will appear +like you're coming from lots of different places. Nothing to worry about +in particular. +
+ ++But that doesn't mean you can entirely ignore the warning. It's +probably a false positive, but it might not be. It is possible +that somebody could at some point steal your Google cookie, which would +allow them to log in to the Google service as you. They might steal it +by breaking into your computer, or by watching your network traffic at +Starbucks or sniffing your wireless at home (when you're not using Tor), +or by watching traffic going over the Tor network. In theory none of +this should be possible because Gmail and similar services should only +send the cookie over an SSL link. In practice, alas, it's way +more complex than that. +
+ ++And if somebody did steal your google cookie, they might end +up logging in from unusual places (though of course they also might +not). So the summary is that since you're using Tor, this security +measure that Google uses isn't so useful for you, because it's full of +false positives. You'll have to use other approaches, like seeing if +anything looks weird on the account, or looking at the timestamps for +recent logins and wondering if you actually logged in at those times. +
+ +Right now, there are roughly zero places in the world that filter +
Right now, there are a small number of places in the world that filter connections to the Tor network. So getting a lot of bridges running right now is mostly a backup measure, a) in case the Tor network does get blocked somewhere, and b) for people who want an extra layer of