Merge master

This commit is contained in:
hiromipaw 2017-12-05 18:10:06 +01:00
commit e4d0feaa4e
46 changed files with 900 additions and 618 deletions

View File

@ -14,8 +14,8 @@
# branch to your personal webwml repository, open a trac ticket in the
# website component, and set it to needs_review.
export STABLETAG=tor-0.3.1.8
export DEVTAG=tor-0.3.2.4-alpha
export STABLETAG=tor-0.3.1.9
export DEVTAG=tor-0.3.2.6-alpha
WMLBASE=.
SUBDIRS=docs eff projects press about download getinvolved donate docs/torbutton

View File

@ -116,14 +116,14 @@
</td>
</tr>
<tr>
<td>
<td class="beige">
<div class="name">Ramy Raoof</div>
<div class="caps">Director</div>
<p>
Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now earlier this month.
Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now.
</p>
</td>
<td class="beige">
<td>
<div class="name">Julius Mittenzwei</div>
<div class="caps">Director</div>
<p>

View File

@ -16,9 +16,11 @@
<li><a href="#support">Support</a></li>
<li><a href="#irc">IRC</a></li>
<li><a href="#twitter">Twitter</a></li>
<li><a href="#bugs">Bug Tracker</a></li>
<li><a href="#security">Security Issues</a></li>
<li><a href="#badrelays">Report Bad Relays</a></li>
<li><a href="#email">Email</a></li>
<li><a href="#mail">Mailing Address</a></li>
<li><a href="#security">Security Issues</a></li>
</ul>
<a id="support"></a>
@ -88,7 +90,34 @@
</ul>
</p>
<a id="email"></a>
<a id="bugs"></a>
<h3><a class="anchor" href="#bugs">Bug Tracker</a></h3>
<p>You can report bugs other than <a href="#security">security
issues</a> using our <a href="https://trac.torproject.org/projects/tor"
>bug tracker</a>. Our
<a href="<page getinvolved/volunteer>">volunteer page</a> has
convenient links to <a href="<page getinvolved/volunteer>#Projects">
project-related queries</a>.</p>
<a id="security"></a>
<h3><a class="anchor" href="#security">Security Issues</a></h3>
<p>If you've found a security issue in one of our projects or our
infrastructure, please email the respective maintainer. You can find
their GPG fingerprint/key on our <a
href="https://db.torproject.org">developer ldap search page</a>. Due
to the many different projects we have, we do not offer a single
list for security issues.</p>
<a id="badrelays"></a>
<h3><a class="anchor" href="#badrelays">Report Bad Relays</a></h3>
<p>If you find a relay that you think is malicious, misconfigured,
or otherwise broken, please check out our
<a href="https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays">
wiki page</a> and <a href="https://blog.torproject.org/how-report-bad-relays"
>blog post</a> on how to report it.</p>
<a id="email"></a>
<h3><a class="anchor" href="#email">Email</a></h3>
<p>If you have Tor questions, please try to help yourself via the
above support venues. Please don't use this contact address
@ -116,15 +145,6 @@
Seattle, WA 98194 USA<br><br>
</address>
<a id="security"></a>
<h3><a class="anchor" href="#security">Security Issues</a></h3>
<p>If you've found a security issue in one of our projects or our
infrastructure, please email the respective maintainer. You can find
their GPG fingerprint/key on our <a
href="https://db.torproject.org">developer ldap search page</a>. Due
to the many different projects we have, we do not offer a single
list for security issues.
</div>
<!-- END MAINCOL -->
<div id = "sidecol">

View File

@ -36,7 +36,7 @@ href="http://cryptocracy.net/">personal website</a>.</dd>
management, travel, and other projects.</dd>
<dt>Domenik Bork</dt><dd> Worked on
Configuration of Hidden Services with User Authorization in Vidalia as
Configuration of Onion Services with User Authorization in Vidalia as
part of Google Summer of Code 2008.</dd>
<dt>Benedikt Boss</dt><dd>Worked during the 2007 Google Summer of Code on <a
href="https://svn.torproject.org/svn/topf/trunk/README">TOPF</a>,
@ -91,6 +91,8 @@ Builds</a>.</dd>
<dd>Original developer for Vidalia,
a cross-platform Tor Graphical User Interface included in the bundles.</dd>
<dt>Roya Ensafi</dt><dd>Detects and understands how to manipulate and circumvent Tor network censorship attempts.</dd>
<dt>Christian Fromme, Developer</dt>
<dd>Helped with many Python projects, such as the
get-tor email auto-responder, check.torproject.org, bridge db,
@ -129,9 +131,6 @@ Arora fork</a>, the <a
href="http://code.google.com/p/torsocks/">torsocks
scripts</a>, and other useful peripheral tools.</dd>
<dt>Dr. Nick Hopper, Researcher</dt>
<dd>Cryptographer, privacy expert, and professor.</dd>
<dt>Leiah Jansen, Graphic Designer</dt>
<dd>Helped make our cool logos, designs, stickers, graphics, and so on.
Invented the awesome "roots" Tor logo.</dd>
@ -182,7 +181,7 @@ proxying approach for Tor clients on Windows.</dd>
Tor is based on, so we didn't have to start from scratch.</dd>
<dt>Robert Ransom</dt><dd>Found and fixed a bunch of Tor bugs, mostly in
Tor's hidden service code, and added several security and usability
Tor's onion service code, and added several security and usability
features to Tor and Tor Browser Bundle.</dd>
<dt>Johannes Renner</dt><dd> Worked during the 2007 Google Summer of
@ -236,7 +235,7 @@ Bundle build process, especially on Windows.</dd>
<dt>Kyle Williams</dt><dd>Developer for JanusVM, a VMWare-based
transparent Tor proxy that makes Tor easier to set up and use.</dd>
<dt>Christian Wilms</dt><dd> Worked on
Performance Enhancing Measures for Tor Hidden Services (<a
Performance Enhancing Measures for Tor Onion Services (<a
href="https://svn.torproject.org/cgi-bin/viewvs.cgi/tor/branches/hidserv-perf/">svn</a>) as part of Google Summer of Code 2008.</dd>
<dt>Jillian C. York</dt><dd><a href="http://jilliancyork.com/">Jillian C. York</a> is a writer, blogger, and activist.</dd>
</dl>

View File

@ -2,6 +2,8 @@
# Revision: $Revision$
# Translation-Priority: 3-low
#include "head.wmi" TITLE="Tor Project: Core People" CHARSET="UTF-8"
<link href="$(DOCROOT)/css/people-table.css" rel="stylesheet">
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
@ -10,48 +12,6 @@
</div>
<div id="maincol">
<style>
table.people td {
vertical-align: top;
padding: 0px;
padding-bottom: 15px;
width: 50%;
}
table.people tr td:first-child {
padding-right: 10px;
}
.photo {
width: 145px;
float: left;
}
.icon {
width: 20px;
margin-right: 4px;
padding: 0px;
float: right;
}
.field {
font-family: "Montserrat";
font-size: 0.8rem;
color: rgb(50, 50, 50);
}
.description {
font-family: "Montserrat";
font-size: 0.9rem;
padding-top: 15px;
}
.description a, .field a, .name a {
font-weight: bold;
text-decoration: none;
}
</style>
<table class="people">
<tr>
<td>
@ -142,8 +102,8 @@ table.people tr td:first-child {
<td>
<a id="hellais"></a>
<div class="photo"><img src="$(IMGROOT)/people/hellais.png" alt="hellais" /></div>
<div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=67EF3966509986E96ACEE84E5D67CD18702287F4"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
<div class="icon"><a href="https://twitter.com/hellais"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
<div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=67EF3966509986E96ACEE84E5D67CD18702287F4"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
<div class="name"><a href="#hellais">Arturo Filastò</a></div>
<div class="field"><b>IRC:</b> hellais</div>
<div class="description">Project leader for <a href="https://ooni.torproject.org/">OONI</a>, has helped with <a href="http://tor2web.org/">tor2web</a>, wrote <a href="https://atlas.torproject.org/">Atlas</a>, and helps improve security.</div>
@ -373,6 +333,18 @@ table.people tr td:first-child {
<div class="description">Speaks Java and other languages, streamlines build processes, and scrutinizes mathematical concepts behind aggregating tons of Tor network data.</div>
</td>
<td>
<a id="redshiftzero"></a>
<div class="photo"><img src="$(IMGROOT)/people/redshiftzero.png" alt="redshiftzero" /></div>
<div class="icon"><a href="https://twitter.com/redshiftzero"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
<div class="icon"><a href="../keys/redshiftzero.txt"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
<div class="name"><a href="#redshiftzero">Jennifer Helsby</a></div>
<div class="field"><b>IRC:</b> redshiftzero</div>
<div class="description">Lead developer of the <a href="https://securedrop.org/">SecureDrop</a> whistleblower platform based at the <a href="https://freedom.press/">Freedom of the Press Foundation</a>.</div>
</td>
</tr>
<tr>
<td>
<a id="qbi"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -382,9 +354,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> qbi</div>
<div class="description">Volunteer that helped translate the website, is part of TorServers.net, and Tor's sysadmin team.</div>
</td>
</tr>
<tr>
<td>
<a id="jselon"></a>
<div class="photo"><img src="$(IMGROOT)/people/jselon.png" alt="jselon" /></div>
@ -393,7 +363,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> jselon</div>
<div class="description">Event Coordination, donor management, general office operations.</div>
</td>
</tr>
<tr>
<td>
<a id="julius"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -402,9 +374,7 @@ table.people tr td:first-child {
<div class="name"><a href="#julius">Julius Mittenzwei</a></div>
<div class="description">Germany-based lawyer and Internet activist.</div>
</td>
</tr>
<tr>
<td>
<a id="juris"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -413,7 +383,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> juris</div>
<div class="description">Board member of torservers.net.</div>
</td>
</tr>
<tr>
<td>
<a id="karsten"></a>
<div class="photo"><img src="$(IMGROOT)/people/karsten.png" alt="karsten" /></div>
@ -422,9 +394,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> karsten</div>
<div class="description">Primary researcher and developer into <a href="https://metrics.torproject.org/">anonymous metrics</a> which started as a National Science Foundation grant.</div>
</td>
</tr>
<tr>
<td>
<a id="kat5"></a>
<div class="photo"><img src="$(IMGROOT)/people/kat5.png" alt="kat5" /></div>
@ -432,7 +402,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> kat5</div>
<div class="description">Volunteer on the Community Team. Helps with t-shirts for relay operators and other odds and ends.</div>
</td>
</tr>
<tr>
<td>
<a id="ailanthus"></a>
<div class="photo"><img src="$(IMGROOT)/people/ailanthus.png" alt="ailanthus" /></div>
@ -442,16 +414,16 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> ailanthus</div>
<div class="description">Writes about Tor in mainstream and technical publications and conducts community workshops to teach people about Tor.</div>
</td>
</tr>
<tr>
<td>
<a id="leif"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
<div class="name"><a href="#leif">Leif Ryge</a></div>
<div class="description">Works on security analysis, designer of &quot;bananaphone&quot; transport.</div>
</td>
</tr>
<tr>
<td>
<a id="linda"></a>
<div class="photo"><img src="$(IMGROOT)/people/linda.png" alt="linda" /></div>
@ -460,9 +432,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> linda</div>
<div class="description">UX team lead.</div>
</td>
</tr>
<tr>
<td>
<a id="ln5"></a>
<div class="photo"><img src="$(IMGROOT)/people/ln5.png" alt="ln5" /></div>
@ -472,7 +442,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> ln5</div>
<div class="description">Swedish advocate and Tor Board member. Works on implementing IPv6 in Tor, build automation, and runs a directory authority.</div>
</td>
</tr>
<tr>
<td>
<a id="agrabeli"></a>
<div class="photo"><img src="$(IMGROOT)/people/agrabeli.png" alt="agrabeli" /></div>
@ -482,9 +454,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> agrabeli</div>
<div class="description">Maria manages OONI's Partnership Program and writes research reports on internet censorship around the world.</div>
</td>
</tr>
<tr>
<td>
<a id="mcs"></a>
<div class="photo"><img src="$(IMGROOT)/people/mcs.png" alt="mcs" /></div>
@ -493,7 +463,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> mcs</div>
<div class="description">Developer on the Tor Browser team.</div>
</td>
</tr>
<tr>
<td>
<a id="matt"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -501,9 +473,7 @@ table.people tr td:first-child {
<div class="name"><a href="#matt">Matt Blaze</a></div>
<div class="description">Chairs the Tor Board of Directors. Professor at the University of Pennsylvania where he researches security, privacy, and anonymity.</div>
</td>
</tr>
<tr>
<td>
<a id="pastly"></a>
<div class="photo"><img src="$(IMGROOT)/people/pastly.png" alt="pastly" /></div>
@ -512,7 +482,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> pastly</div>
<div class="description"><a href="http://mattttttssi4lhud.onion/">Implemented</a> the <a href="http://www.robgjansen.com/publications/kist-sec2014.pdf">KIST scheduler</a> into Tor. Helps safely measure Tor. Says helpful things on IRC.</div>
</td>
</tr>
<tr>
<td>
<a id="sysrqb"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -522,9 +494,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> sysrqb</div>
<div class="description">Worked on tor, torsocks, and many other projects. Helped maintain and develop BridgeDB.</div>
</td>
</tr>
<tr>
<td>
<a id="meejah"></a>
<div class="photo"><img src="$(IMGROOT)/people/meejah.png" alt="meejah" /></div>
@ -534,7 +504,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> meejah</div>
<div class="description"><a href="https://meejah.ca">Author</a> of <a href="https://github.com/meejah/txtorcon">txtorcon</a>, <a href="https://github.com/meejah/carml">carml</a> and other Tor Python tools including some for bad-relay hunting.</div>
</td>
</tr>
<tr>
<td>
<a id="mtigas"></a>
<div class="photo"><img src="$(IMGROOT)/people/mtigas.png" alt="mtigas" /></div>
@ -544,9 +516,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> mtigas</div>
<div class="description">Works on <a href="https://mike.tig.as/onionbrowser/">Onion Browser</a>, iOS, and hacker-journalist at <a href="https://www.propublica.org/">ProPublica</a> running their <a href="https://www.propub3r6espa33w.onion/">onion service</a>.</div>
</td>
</tr>
<tr>
<td>
<a id="moritz"></a>
<div class="photo"><img src="$(IMGROOT)/people/moritz.png" alt="moritz" /></div>
@ -555,7 +525,9 @@ table.people tr td:first-child {
<div class="name"><a href="#moritz">Moritz Bartl</a></div>
<div class="description">Co-founder of <a href="https://www.torservers.net/">torservers.net</a>, a network of non-profit organizations that run Tor exit relays.</div>
</td>
</tr>
<tr>
<td>
<a id="n8fr8"></a>
<div class="photo"><img src="$(IMGROOT)/people/n8fr8.png" alt="n8fr8" /></div>
@ -564,9 +536,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> n8fr8</div>
<div class="description">Founder of the <a href="https://guardianproject.info/">Guardian Project</a>. Orbot lead developer and contributor to Orfox, Onion Browser and NetCipher SDK. Director of Technology at Tibet Action Institute.</div>
</td>
</tr>
<tr>
<td>
<a id="nickhopper"></a>
<div class="photo"><img src="$(IMGROOT)/people/nickhopper.png" alt="nickhopper" /></div>
@ -574,7 +544,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> nickhopper</div>
<div class="description"><a href="https://www-users.cs.umn.edu/~hopper/">Researcher</a> interested in improving Tor's performance and resistance to traffic analysis. Some of my work is described <a href="https://www-users.cs.umn.edu/~hopper/research.html">here</a>.</div>
</td>
</tr>
<tr>
<td>
<a id="nickm"></a>
<div class="photo"><img src="$(IMGROOT)/people/nickm.png" alt="nickm" /></div>
@ -584,9 +556,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> nickm</div>
<div class="description">One of the three original designers of Tor - does a lot of the ongoing design work, and coordinates and leads ongoing development.</div>
</td>
</tr>
<tr>
<td>
<a id="boklm"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -595,7 +565,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> boklm</div>
<div class="description">Works on Tor Browser.</div>
</td>
</tr>
<tr>
<td>
<a id="mrphs"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -605,9 +577,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> mrphs</div>
<div class="description">His main area of interests are End-users Accessibility/Security, UX, Censorship, Advocacy and Onion Services.</div>
</td>
</tr>
<tr>
<td>
<a id="syverson"></a>
<div class="photo"><img src="$(IMGROOT)/people/syverson.png" alt="syverson" /></div>
@ -615,7 +585,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> syverson</div>
<div class="description"><a href="https://www.nrl.navy.mil">NRL</a> researcher on most things Tor. Inventor of <a href="https://www.onion-router.net/">onion routing</a>, and one of the three original designers of Tor.</div>
</td>
</tr>
<tr>
<td>
<a id="pepijn"></a>
<div class="photo"><img src="$(IMGROOT)/people/pepijn.png" alt="pepijn" /></div>
@ -624,16 +596,16 @@ table.people tr td:first-child {
<div class="name"><a href="#pepijn">Pepijn Le Heux</a></div>
<div class="description">Lawyer based in The Netherlands and co-founder of Hart voor Internetvrijheid.</div>
</td>
</tr>
<tr>
<td>
<a id="peter"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
<div class="name"><a href="#peter">Peter Palfrader</a></div>
<div class="description">Manages the Debian packages, runs one of the directory authorities, and generally helps out a lot.</div>
</td>
</tr>
<tr>
<td>
<a id="phw"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -643,9 +615,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> phw</div>
<div class="description">Maintains <a href="https://gitweb.torproject.org/user/phw/exitmap.git/">exitmap</a> and <a href="https://gitweb.torproject.org/user/phw/sybilhunter.git/">sybilhunter</a>, works on <a href="https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays">bad relay detection</a>, and does <a href="https://nymity.ch/papers.html">security and privacy research</a>.</div>
</td>
</tr>
<tr>
<td>
<a id="robt"></a>
<div class="photo"><img src="$(IMGROOT)/people/robt.png" alt="robt" /></div>
@ -653,7 +623,9 @@ table.people tr td:first-child {
<div class="name"><a href="#robt">Rabbi Rob Thomas</a></div>
<div class="description">CEO of Team Cymru, which supports Tor through hosting, research, and infosec assistance.</div>
</td>
</tr>
<tr>
<td>
<a id="ramy"></a>
<div class="photo"><img src="$(IMGROOT)/people/ramy.png" alt="ramy" /></div>
@ -662,9 +634,7 @@ table.people tr td:first-child {
<div class="name"><a href="#ramy">Ramy Raoof</a></div>
<div class="description">Tor Board member, technologist, and privacy and security researcher.</div>
</td>
</tr>
<tr>
<td>
<a id="pospeselr"></a>
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@ -674,7 +644,9 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> pospeselr</div>
<div class="description">Tor Browser developer.</div>
</td>
</tr>
<tr>
<td>
<a id="robgjansen"></a>
<div class="photo"><img src="$(IMGROOT)/people/robgjansen.png" alt="robgjansen" /></div>
@ -684,9 +656,7 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> robgjansen</div>
<div class="description"><a href="https://www.nrl.navy.mil">NRL</a> research scientist, <a href="http://www.robgjansen.com/">leading expert in Tor network performance</a>, and author of <a href="https://shadow.github.io/">Shadow</a>.</div>
</td>
</tr>
<tr>
<td>
<a id="arma"></a>
<div class="photo"><img src="$(IMGROOT)/people/arma.png" alt="arma" /></div>
@ -696,13 +666,6 @@ table.people tr td:first-child {
<div class="field"><b>IRC:</b> arma</div>
<div class="description">Original developer of Tor along with Nick and Paul. Leading privacy researcher, coordinating developers and researchers.</div>
</td>
<td>
<a id="roya"></a>
<div class="photo"><img src="$(IMGROOT)/people/roya.png" alt="roya" /></div>
<div class="name"><a href="#roya">Roya Ensafi</a></div>
<div class="description">Detects and understands how to manipulate and circumvent Tor network censorship attempts.</div>
</td>
</tr>
<tr>

View File

@ -204,7 +204,7 @@
</p>
<ul>
<li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Hidden Services</a> by Juha Nurmi</h4></li>
<li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Onion Services</a> by Juha Nurmi</h4></li>
<li><h4><a href="http://ilv.github.io/gettor_proposal.html">Revamp GetTor</a> by Israel Leiva</h4></li>
<li><h4><a href="https://sites.google.com/site/sreenathadev/gsoc-2014-weather-rewrite">Weather Rewrite</a> by Sreenatha Bhatlapenumarthi</h4></li>
<li><h4><a href="http://kostas.mkj.lt/gsoc2014/gsoc2014.html">BridgeDB Distributor</a> by Kostas Jakeliunas</h4></li>

View File

@ -46,7 +46,7 @@
Individuals use Tor to keep websites from tracking them and their family
members, or to connect to news sites, instant messaging services, or the
like when these are blocked by their local Internet providers. Tor's <a
href="<page docs/hidden-services>">hidden services</a>
href="<page docs/onion-services>">onion services</a>
let users publish web sites and other services without needing to reveal
the location of the site. Individuals also use Tor for socially sensitive
communication: chat rooms and web forums for rape and abuse survivors,

View File

@ -57,7 +57,7 @@
</li>
<li><strong>They research sensitive topics.</strong>
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
<a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
<a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
or world religions is behind a national firewall.
</li>
<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
@ -74,18 +74,15 @@
tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
</li>
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
safe access to free media. Tor preserves the ability of persons behind national firewalls or under
the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
economics and religion.
</li>
<li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more.
</li>
<li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
</li>
<li><strong>Citizen journalists in China</strong> use Tor to write about
local events to encourage social change and political reform.
</li>
<li><strong>Citizens and journalists in <a
href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
holes</a></strong> use Tor to research state propaganda and opposing
<li><strong>Citizens and journalists in Internet black
holes</strong> use Tor to research state propaganda and opposing
viewpoints, to file stories with non-State controlled media, and to
avoid risking the personal consequences of intellectual curiosity.
</li>
@ -180,7 +177,7 @@
<li>
Tor can help activists avoid government or corporate censorship that hinders organization.
In one such case, a
<a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
<a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
to help organize a strike.
</li>
</ul>
@ -257,7 +254,7 @@
<hr>
<ul>
<li>Frequently we hear about bloggers who are
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
<a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
for saying perfectly legal things online, in their blog.</li>
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
@ -280,17 +277,17 @@
operations, as well as protecting themselves from physical harm.
</li>
<li><strong>Hidden services:</strong>
When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
control to be physically secure from discovery and takedown.
</li>
<li><strong>Intelligence gathering:</strong>
Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
to record a military address, thereby revealing the surveillance.
</li>
</ul>
<li><strong>Onion services:</strong>
When the Internet was designed by DARPA, its primary purpose was to be able
to facilitate distributed, robust communications in case of local strikes.
However, some functions must be centralized, such as command and control
sites. It's the nature of the Internet protocols to reveal the geographic
location of any server that is reachable online. Tor's onion services
capacity allows military command and control to be physically secure from
discovery and takedown. </li> <li><strong>Intelligence gathering:</strong>
Military personnel need to use electronic resources run and monitored by
insurgents. They do not want the webserver logs on an insurgent website to
record a military address, thereby revealing the surveillance. </li> </ul>
<a name="itprofessionals"></a>
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
@ -318,8 +315,8 @@
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
just a good idea some of the time &mdash; it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
<a href="https://www.crimeline.co.za/">police tip lines</a>,
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
<a href="https://www.crimeline.co.za/">police tip lines</a>,
<a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>,
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
and so forth. It would be impossible to rehash the entire anonymity debate here &mdash; it is too large an issue with too many nuances, and there
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of

40
css/people-table.css Normal file
View File

@ -0,0 +1,40 @@
table.people td {
vertical-align: top;
padding: 0px;
padding-bottom: 15px;
width: 50%;
}
table.people tr td:first-child {
padding-right: 10px;
}
.photo {
width: 145px;
float: left;
}
.icon {
width: 20px;
margin-right: 4px;
padding: 0px;
float: right;
}
.field {
font-family: "Montserrat";
font-size: 0.8rem;
color: rgb(50, 50, 50);
}
.description {
font-family: "Montserrat";
font-size: 0.9rem;
padding-top: 15px;
}
.description a, .field a, .name a {
font-weight: bold;
text-decoration: none;
}

View File

@ -353,14 +353,14 @@ using technology?</a></li>
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
<p>The Tor Project does not host, control, nor have the ability to
discover the owner or location of a .onion address. The .onion address is
an address from <a href="<page docs/hidden-services>">a hidden
service</a>. The name you see ending in .onion is a hidden service descriptor.
an address from <a href="<page docs/onion-services>">an onion
service</a>. The name you see ending in .onion is an onion service descriptor.
It's an automatically generated name which can be located on any Tor
relay or client anywhere on the Internet. Hidden services are designed
relay or client anywhere on the Internet. Onion services are designed
to protect both the user and service provider from discovering who they
are and where they are from. The design of hidden services means the
are and where they are from. The design of onion services means the
owner and location of the .onion site is hidden even from us.</p>
<p>But remember that this doesn't mean that hidden services are
<p>But remember that this doesn't mean that onion services are
invulnerable. Traditional police techniques can still be very effective
against them, such as interviewing suspects, writing style analysis,
technical analysis of the content itself, sting operations, keyboard taps,

View File

@ -191,11 +191,11 @@ relay.</a></li>
run my own?</a></li>
</ul>
<p>Tor hidden services:</p>
<p>Tor onion services:</p>
<ul>
<li><a href="#AccessHiddenServices">How do I access hidden services?</a></li>
<li><a href="#ProvideAHiddenService">How do I provide a hidden service?</a></li>
<li><a href="#AccessOnionServices">How do I access onion services?</a></li>
<li><a href="#ProvideAnOnionService">How do I provide an onion service?</a></li>
</ul>
<p>Development:</p>
@ -682,15 +682,12 @@ with more funding?</a></h3>
<p>
The Tor network's <a
href="https://metrics.torproject.org/network.html#networksize">several
thousand</a> relays push <a
href="https://metrics.torproject.org/network.html#bandwidth">over
7.5GB per second on average</a>. We have <a
href="https://metrics.torproject.org/users.html#direct-users">millions of
daily users</a>. But the Tor network is not yet
self-sustaining.
href="https://metrics.torproject.org/networksize.html">several thousand</a>
relays push <a
href="https://metrics.torproject.org/bandwidth.html">around 100 Gbps on
average</a>. We have <a
href="https://metrics.torproject.org/userstats-relay-country.html">millions of
daily users</a>. But the Tor network is not yet self-sustaining.
</p>
<p>
@ -1817,7 +1814,7 @@ versions.
<p>
Note also that not every circuit is used to deliver traffic outside of
the Tor network. It is normal to see non-exit circuits (such as those
used to connect to hidden services, those that do directory fetches,
used to connect to onion services, those that do directory fetches,
those used for relay reachability self-tests, and so on) that end at
a non-exit node. To keep a node from being used entirely, see
<tt>ExcludeNodes</tt> and <tt>StrictNodes</tt> in the
@ -3001,15 +2998,16 @@ diversity,
<hr>
<a id="TorHiddenServices"></a>
<h2><a class="anchor">Tor hidden services:</a></h2>
# Leaving in old ids to accomodate incoming links.
<a id="TorOnionServices"></a><a id="TorHiddenServices"></a>
<h2><a class="anchor">Tor onion services:</a></h2>
<a id="AccessHiddenServices"></a>
<h3><a class="anchor" href="#AccessHiddenServices">How do I access
hidden services?</a></h3>
<a id="AccessOnionServices"></a><a id="AccessHiddenServices"></a>
<h3><a class="anchor" href="#AccessOnionServices">How do I access
onion services?</a></h3>
<p>
Tor hidden services are named with a special top-level domain (TLD)
Tor onion services are named with a special top-level domain (TLD)
name in DNS: .onion. Since the .onion TLD is not recognized by the
official root DNS servers on the Internet, your application will not
get the response it needs to locate the service. Currently, the Tor
@ -3020,7 +3018,7 @@ diversity,
<p>
Therefore, your application <b>needs</b> to pass the .onion hostname to
Tor directly. You can't try to resolve it to an IP address, since there
<i>is</i> no corresponding IP address: the server is hidden, after all!
<i>is</i> no corresponding IP address.
</p>
<p>
@ -3044,10 +3042,10 @@ diversity,
<p>
For applications that do not support HTTP proxy, and so cannot use
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
settings set DNS name resolving to remote. This
will allow you to use almost any program with Tor without leaking DNS
lookups and allow those same programs to access hidden services.
lookups and allow those same programs to access onion services.
</p>
<p>
@ -3056,13 +3054,13 @@ diversity,
<hr>
<a id="ProvideAHiddenService"></a>
<h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
hidden service?</a></h3>
<a id="ProvideAnOnionService"></a><a id="ProvideAHiddenService"></a>
<h3><a class="anchor" href="#ProvideAnOnionService">How do I provide an
onion service?</a></h3>
<p>
See the <a href="<page docs/tor-hidden-service>">
official hidden service configuration instructions</a>.
See the <a href="<page docs/tor-onion-service>">
official onion service configuration instructions</a>.
</p>
<hr>
@ -3951,7 +3949,7 @@ and clients need to predict all the packets they will want to send in
a session before picking their exit node!
</li>
<li>The Tor-internal name spaces would need to be redesigned. We support
hidden service ".onion" addresses by intercepting the addresses when
onion service ".onion" addresses by intercepting the addresses when
they are passed to the Tor client. Doing so at the IP level will require
a more complex interface between Tor and the local DNS resolver.
</li>
@ -4002,7 +4000,7 @@ their path length.</a></h3>
<p>
Right now the path length is hard-coded at 3 plus the number of nodes in
your path that are sensitive. That is, in normal cases it's 3, but for
example if you're accessing a hidden service or a ".exit" address it could be 4.
example if you're accessing an onion service or a ".exit" address it could be 4.
</p>
<p>
We don't want to encourage people to use paths longer than this &mdash; it

View File

@ -1,165 +1,7 @@
## translation metadata
# Revision: $Revision$
# Translation-Priority: 3-low
# Status: obsolete
#include "head.wmi" TITLE="Tor: Hidden Service Protocol" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
<a href="<page docs/documentation>">Documentation &raquo; </a>
<a href="<page docs/hidden-services>">Hidden Services</a>
</div>
<div id="maincol">
<h2>Tor: Hidden Service Protocol</h2>
<hr>
#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/onion-services"
<p>
Tor makes it possible for users to hide their locations while offering
various kinds of services, such as web publishing or an instant
messaging server. Using Tor "rendezvous points," other Tor users can
connect to these hidden services, each without knowing the other's
network identity. This page describes the technical details of how
this rendezvous protocol works. For a more direct how-to, see our <a
href="<page docs/tor-hidden-service>">configuring hidden services</a>
page.
</p>
<p>
A hidden service needs to advertise its existence in the Tor network before
clients will be able to contact it. Therefore, the service randomly picks
some relays, builds circuits to them, and asks them to act as
<em>introduction points</em> by telling them its public key. Note
that in the following figures the green links are circuits rather
than direct connections. By using a full Tor circuit, it's hard for
anyone to associate an introduction point with the hidden server's IP
address. While the introduction points and others are told the hidden
service's identity (public key), we don't want them to learn about the
hidden server's location (IP address).
</p>
<img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png">
# maybe add a speech bubble containing "PK" to Bob, because that's what
# Bob tells to his introduction points
<p>
Step two: the hidden service assembles a <em>hidden service
descriptor</em>, containing its public key and a summary of each
introduction point, and signs this descriptor with its private key.
It uploads that descriptor to a distributed hash table. The descriptor will be
found by clients requesting XYZ.onion where XYZ is a 16 character
name derived from the service's public key. After
this step, the hidden service is set up.
</p>
<p>
Although it might seem impractical to use an automatically-generated
service name, it serves an important goal: Everyone &ndash; including
the introduction points, the distributed hash table directory, and of course the
clients &ndash; can verify that they are talking to the right hidden
service. See also <a href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
conjecture</a> that out of Decentralized, Secure, and Human-Meaningful,
you can achieve at most two. Perhaps one day somebody will implement a <a
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
design for hidden service names?
</p>
<img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png">
# maybe replace "database" with "DHT"; further: how incorrect
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
# use?
<p>
Step three: A client that wants to contact a hidden service needs
to learn about its onion address first. After that, the client can
initiate connection establishment by downloading the descriptor from
the distributed hash table. If there is a descriptor for XYZ.onion
(the hidden service could also be offline or have left long ago,
or there could be a typo in the onion address), the client now
knows the set of introduction points and the right public key to
use. Around this time, the client also creates a circuit to another
randomly picked relay and asks it to act as <em>rendezvous point</em>
by telling it a one-time secret.
</p>
<img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png">
# maybe add "cookie" to speech bubble, separated from the surrounded
# "IP1-3" and "PK"
<p>
Step four: When the descriptor is present and the rendezvous
point is ready, the client assembles an <em>introduce</em> message
(encrypted to the hidden service's public key) including the address
of the rendezvous point and the one-time secret. The client sends
this message to one of the introduction points, requesting it be
delivered to the hidden service. Again, communication takes place
via a Tor circuit: nobody can relate sending the introduce message
to the client's IP address, so the client remains anonymous.
</p>
<img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png">
<p>
Step five: The hidden service decrypts the client's introduce message
and finds the address of the rendezvous point and the one-time secret
in it. The service creates a circuit to the rendezvous point and
sends the one-time secret to it in a rendezvous message.
</p>
<p>
At this point it is of special importance that the hidden service sticks to
the same set of <a
href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
guards</a> when creating new circuits. Otherwise an attacker
could run his own relay and force a hidden service to create an arbitrary
number of circuits in the hope that the corrupt relay is picked as entry
node and he learns the hidden server's IP address via timing analysis. This
attack was described by &Oslash;verlier and Syverson in their paper titled
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
Servers</a>.
</p>
<img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png">
# it should say "Bob connects to Alice's ..."
<p>
In the last step, the rendezvous point notifies the client about successful
connection establishment. After that, both client and hidden service can
use their circuits to the rendezvous point for communicating with each
other. The rendezvous point simply relays (end-to-end encrypted) messages
from client to service and vice versa.
</p>
<p>
One of the reasons for not using the introduction circuit
for actual communication is that no single relay should
appear to be responsible for a given hidden service. This is why the
rendezvous point never learns about the hidden service's identity.
</p>
<p>
In general, the complete connection between client and hidden service
consists of 6 relays: 3 of them were picked by the client with the third
being the rendezvous point and the other 3 were picked by the hidden
service.
</p>
<img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png">
<p>
There are more detailed descriptions about the hidden service protocol than
this one. See the
<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
for an in-depth design description and the
<a href="<specblob>rend-spec.txt">rendezvous specification</a>
for the message formats.
</p>
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
#include "side.wmi"
#include "info.wmi"
</div>
<!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
#include <foot.wmi>

162
docs/en/onion-services.wml Normal file
View File

@ -0,0 +1,162 @@
## translation metadata
# Revision: $Revision$
# Translation-Priority: 3-low
#include "head.wmi" TITLE="Tor: Onion Service Protocol" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
<a href="<page docs/documentation>">Documentation &raquo; </a>
<a href="<page docs/onion-services>">Onion Services</a>
</div>
<div id="maincol">
<h2>Tor: Onion Service Protocol</h2>
<hr>
<p>
Tor makes it possible for users to hide their locations while offering
various kinds of services, such as web publishing or an instant
messaging server. Using Tor "rendezvous points," other Tor users can
connect to these onion services, formerly known as hidden services, each
without knowing the other's network identity. This page describes the
technical details of how this rendezvous protocol works. For a more direct
how-to, see our <a href="<page docs/tor-onion-service>">configuring onion
services</a> page. </p>
<p>
An onion service needs to advertise its existence in the Tor network before
clients will be able to contact it. Therefore, the service randomly picks
some relays, builds circuits to them, and asks them to act as
<em>introduction points</em> by telling them its public key. Note
that in the following figures the green links are circuits rather
than direct connections. By using a full Tor circuit, it's hard for
anyone to associate an introduction point with the onion server's IP
address. While the introduction points and others are told the onion
service's identity (public key), we don't want them to learn about the
onion server's location (IP address).
</p>
<img alt="Tor onion service step one" src="$(IMGROOT)/tor-onion-services-1.png">
# maybe add a speech bubble containing "PK" to Bob, because that's what
# Bob tells to his introduction points
<p>
Step two: the onion service assembles an <em>onion service descriptor</em>,
containing its public key and a summary of each introduction point, and
signs this descriptor with its private key. It uploads that descriptor to
a distributed hash table. The descriptor will be found by clients
requesting XYZ.onion where XYZ is a 16 character name derived from the
service's public key. After this step, the onion service is set up. </p>
<p>
Although it might seem impractical to use an automatically-generated
service name, it serves an important goal: Everyone &ndash; including
the introduction points, the distributed hash table directory, and of
course the clients &ndash; can verify that they are talking to the right
onion service. See also <a
href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
conjecture</a> that out of Decentralized, Secure, and Human-Meaningful, you
can achieve at most two. Perhaps one day somebody will implement a <a
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
design for onion service names? </p>
<img alt="Tor onion service step two" src="$(IMGROOT)/tor-onion-services-2.png">
# maybe replace "database" with "DHT"; further: how incorrect
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
# use?
<p>
Step three: A client that wants to contact an onion service needs
to learn about its onion address first. After that, the client can
initiate connection establishment by downloading the descriptor from
the distributed hash table. If there is a descriptor for XYZ.onion
(the onion service could also be offline or have left long ago,
or there could be a typo in the onion address), the client now
knows the set of introduction points and the right public key to
use. Around this time, the client also creates a circuit to another
randomly picked relay and asks it to act as <em>rendezvous point</em>
by telling it a one-time secret.
</p>
<img alt="Tor onion service step three" src="$(IMGROOT)/tor-onion-services-3.png">
# maybe add "cookie" to speech bubble, separated from the surrounded
# "IP1-3" and "PK"
<p>
Step four: When the descriptor is present and the rendezvous
point is ready, the client assembles an <em>introduce</em> message
(encrypted to the onion service's public key) including the address
of the rendezvous point and the one-time secret. The client sends
this message to one of the introduction points, requesting it be
delivered to the onion service. Again, communication takes place
via a Tor circuit: nobody can relate sending the introduce message
to the client's IP address, so the client remains anonymous.
</p>
<img alt="Tor onion service step four" src="$(IMGROOT)/tor-onion-services-4.png">
<p>
Step five: The onion service decrypts the client's introduce message
and finds the address of the rendezvous point and the one-time secret
in it. The service creates a circuit to the rendezvous point and
sends the one-time secret to it in a rendezvous message.
</p>
<p>
At this point it is of special importance that the onion service sticks to
the same set of <a
href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
guards</a> when creating new circuits. Otherwise an attacker
could run his own relay and force an onion service to create an arbitrary
number of circuits in the hope that the corrupt relay is picked as entry
node and he learns the onion server's IP address via timing analysis. This
attack was described by &Oslash;verlier and Syverson in their paper titled
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
Servers</a>.
</p>
<img alt="Tor onion service step five" src="$(IMGROOT)/tor-onion-services-5.png">
# it should say "Bob connects to Alice's ..."
<p>
In the last step, the rendezvous point notifies the client about successful
connection establishment. After that, both client and onion service can
use their circuits to the rendezvous point for communicating with each
other. The rendezvous point simply relays (end-to-end encrypted) messages
from client to service and vice versa.
</p>
<p>
One of the reasons for not using the introduction circuit
for actual communication is that no single relay should
appear to be responsible for a given onion service. This is why the
rendezvous point never learns about the onion service's identity.
</p>
<p>
In general, the complete connection between client and onion service
consists of 6 relays: 3 of them were picked by the client with the third
being the rendezvous point and the other 3 were picked by the onion
service.
</p>
<img alt="Tor onion service step six" src="$(IMGROOT)/tor-onion-services-6.png">
<p>
There are more detailed descriptions about the onion service protocol than
this one. See the
<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
for an in-depth design description and the
<a href="<specblob>rend-spec.txt">rendezvous specification</a>
for the message formats.
</p>
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
#include "side.wmi"
#include "info.wmi"
</div>
<!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
#include <foot.wmi>

View File

@ -51,8 +51,8 @@
{'url' => 'docs/tor-doc-relay',
'txt' => 'Configuring a Relay graphically',
},
{'url' => 'docs/tor-hidden-service',
'txt' => 'Configuring a Hidden Service',
{'url' => 'docs/tor-onion-service',
'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
'txt' => 'Understanding bridges',

View File

@ -22,7 +22,7 @@
<p>Even though Tor Browser comes with a regular Tor, it will only run
as long as you keep Tor Browser open. The following instructions will
set up Tor without graphical interface or a browser. Many people prefer
this over TBB when they host hidden services or relay traffic for other Tor
this over TBB when they host onion services or relay traffic for other Tor
users. <hr>
<a id="installing"></a>
<h2><a class="anchor" href="#installing">Step One: Install a package manager</a></h2>

View File

@ -1,261 +1,7 @@
## translation metadata
# Revision: $Revision$
# Translation-Priority: 3-low
# Status: obsolete
#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
<a href="<page docs/documentation>">Documentation &raquo; </a>
<a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
</div>
<div id="maincol">
<h1>Configuring Hidden Services for <a href="<page index>">Tor</a></h1>
<hr>
#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-onion-service"
<p>Tor allows clients and relays to offer hidden services. That is,
you can offer a web server, SSH server, etc., without revealing your
IP address to its users. In fact, because you don't use any public address,
you can run a hidden service from behind your firewall.
</p>
<p>If you have Tor installed, you can see hidden services in action
by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
site</a>.
</p>
<p>
This page describes the steps for setting up your own hidden service
website. For the technical details of how the hidden service protocol
works, see our <a href="<page docs/hidden-services>">hidden service
protocol</a> page.
</p>
<hr>
<a id="zero"></a>
<h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
<br>
<p>Before you start, you need to make sure:</p>
<ol>
<li>Tor is up and running,</li>
<li>You actually set it up correctly.</li>
</ol>
<p>Windows users should follow the <a
href="<page docs/tor-doc-windows>">Windows
howto</a>, OS X users should follow the <a
href="<page docs/tor-doc-osx>">OS
X howto</a>, and Linux/BSD/Unix users should follow the <a
href="<page docs/tor-doc-unix>">Unix howto</a>.
</p>
<hr>
<a id="one"></a>
<h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
<br>
<p>
First, you need to set up a web server locally. Setting up a web
server can be complex. We're not going to cover how to setup a web
server here. If you get stuck or want to do more, find a friend who
can help you. We recommend you install a new separate web server for
your hidden service, since even if you already have one installed,
you may be using it (or want to use it later) for a normal website.
</p>
<p>
You need to configure your web server so it doesn't give away any
information about you, your computer, or your location. Be sure to
bind the web server only to localhost (if people could get to it
directly, they could confirm that your computer is the one offering
the hidden service). Be sure that its error messages don't list
your hostname or other hints. Consider putting the web server in a
sandbox or VM to limit the damage from code vulnerabilities.
</p>
<p>
Once your web server is set up, make
sure it works: open your browser and go to <a
href="http://localhost:8080/">http://localhost:8080/</a>, where
8080 is the webserver port you chose during setup (you can choose any
port, 8080 is just an example). Then try putting a file in the main
html directory, and make sure it shows up when you access the site.
</p>
<hr>
<a id="two"></a>
<h2><a class="anchor" href="#two">Step Two: Configure your hidden service</a></h2>
<br>
<p>Next, you need to configure your hidden service to point to your
local web server.
</p>
<p>First, open your torrc file in your favorite text editor. (See
<a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
what this means.) Go to the middle section and look for the line</p>
<pre>
\############### This section is just for location-hidden services ###
</pre>
<p>
This section of the file consists of groups of lines, each representing
one hidden service. Right now they are all commented out (the lines
start with #), so hidden services are disabled. Each group of lines
consists of one <var>HiddenServiceDir</var> line, and one or more
<var>HiddenServicePort</var> lines:</p>
<ul>
<li><var>HiddenServiceDir</var> is a directory where Tor will store information
about that hidden service. In particular, Tor will create a file here named
<var>hostname</var> which will tell you the onion URL. You don't need to
add any files to this directory. Make sure this is not the same directory
as the hidserv directory you created when setting up thttpd, as your
HiddenServiceDir contains secret information!</li>
<li><var>HiddenServicePort</var> lets you specify a virtual port (that is, what
port people accessing the hidden service will think they're using) and an
IP address and port for redirecting connections to this virtual port.</li>
</ul>
<p>Add the following lines to your torrc:
</p>
<pre>
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
</pre>
<p>You're going to want to change the <var>HiddenServiceDir</var> line, so it points
to an actual directory that is readable/writeable by the user that will
be running Tor. The above line should work if you're using the OS X Tor
package. On Unix, try "/home/username/hidden_service/" and fill in your own
username in place of "username". On Windows you might pick:</p>
<pre>
HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
HiddenServicePort 80 127.0.0.1:8080
</pre>
<p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix socket.
This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
<pre>
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 unix:/path/to/socket
</pre>
<p>Now save the torrc and restart your tor.</p>
<p>If Tor starts up again, great. Otherwise, something is wrong. First look at
your logfiles for hints. It will print some warnings or error messages. That
should give you an idea what went wrong. Typically there are typos in the torrc
or wrong directory permissions (See <a href="<page docs/faq>#Logs">the
logging FAQ entry</a> if you don't know how to enable or find your
log file.)
</p>
<p>When Tor starts, it will automatically create the <var>HiddenServiceDir</var>
that you specified (if necessary), and it will create two files there.</p>
<dl>
<dt><var>private_key</var></dt>
<dd>First, Tor will generate a new public/private keypair for your hidden
service. It is written into a file called "private_key". Don't share this key
with others -- if you do they will be able to impersonate your hidden
service.</dd>
<dt><var>hostname</var></dt>
<dd>The other file Tor will create is called "hostname". This contains
a short summary of your public key -- it will look something like
<tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
and you can tell it to people, publish it on websites, put it on business
cards, etc.</dd>
</dl>
<p>If Tor runs as a different user than you, for example on
OS X, Debian, or Red Hat, then you may need to become root to be able
to view these files.</p>
<p>Now that you've restarted Tor, it is busy picking introduction points
in the Tor network, and generating a <em>hidden service
descriptor</em>. This is a signed list of introduction points along with
the service's full public key. It anonymously publishes this descriptor
to the directory servers, and other people anonymously fetch it from the
directory servers when they're trying to access your service.
</p>
<p>Try it now: paste the contents of the hostname file into your web
browser. If it works, you'll get the html page you set up in step one.
If it doesn't work, look in your logs for some hints, and keep playing
with it until it works.
</p>
<hr>
<a id="three"></a>
<h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
<br>
<p>If you plan to keep your service available for a long time, you might
want to make a backup copy of the <var>private_key</var> file somewhere.
</p>
<p>If you want to forward multiple virtual ports for a single hidden
service, just add more <var>HiddenServicePort</var> lines.
If you want to run multiple hidden services from the same Tor
client, just add another <var>HiddenServiceDir</var> line. All the following
<var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
you add another <var>HiddenServiceDir</var> line:
</p>
<pre>
HiddenServiceDir /usr/local/etc/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
HiddenServicePort 6667 127.0.0.1:6667
HiddenServicePort 22 127.0.0.1:22
</pre>
<p>Hidden services operators need to practice proper operational security
and system administration to maintain security. For some security
suggestions please make sure you read over Riseup's <a
href="https://help.riseup.net/en/security/network-security/tor/onionservices-best-practices">"Tor
hidden services best practices" document</a>. Also, here are some more
anonymity issues you should keep in mind:
</p>
<ul>
<li>As mentioned above, be careful of letting your web server reveal
identifying information about you, your computer, or your location.
For example, readers can probably determine whether it's thttpd or
Apache, and learn something about your operating system.</li>
<li>If your computer isn't online all the time, your hidden service
won't be either. This leaks information to an observant adversary.</li>
<li>It is generally a better idea to host hidden services on a Tor client
rather than a Tor relay, since relay uptime and other properties are
publicly visible.</li>
<li>The longer a hidden is online, the higher the risk that its
location is discovered. The most prominent attacks are building a
profile of the hidden service's availability and matching induced
traffic patterns.</li>
</ul>
<p>Another common issue is whether to use HTTPS on your relay or
not. Have a look at this <a
href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a>
on the Tor Blog to learn more about these issues.
</p>
<p>Finally, feel free to use the <a
href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
mailing list</a> to discuss the secure administration and operation of
Tor hidden services.</p>
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
#include "side.wmi"
#include "info.wmi"
</div>
<!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
#include <foot.wmi>

View File

@ -0,0 +1,258 @@
## translation metadata
# Revision: $Revision$
# Translation-Priority: 3-low
#include "head.wmi" TITLE="Tor Project: Onion Service Configuration Instructions" CHARSET="UTF-8"
<div id="content" class="clearfix">
<div id="breadcrumbs">
<a href="<page index>">Home &raquo; </a>
<a href="<page docs/documentation>">Documentation &raquo; </a>
<a href="<page docs/tor-onion-service>">Tor Onion Service</a>
</div>
<div id="maincol">
<h1>Configuring Onion Services for <a href="<page index>">Tor</a></h1>
<hr>
<p>Tor allows clients and relays to offer onion services. That is,
you can offer a web server, SSH server, etc., without revealing your
IP address to its users. In fact, because you don't use any public address,
you can run an onion service from behind your firewall.
</p>
<p>If you have Tor installed, you can see onion services in action
by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
site</a>.
</p>
<p>
This page describes the steps for setting up your own onion service
website. For the technical details of how the onion service protocol
works, see our <a href="<page docs/onion-services>">onion service
protocol</a> page.
</p>
<hr>
<a id="zero"></a>
<h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
<br>
<p>Before you start, you need to make sure:</p>
<ol>
<li>Tor is up and running,</li>
<li>You actually set it up correctly.</li>
</ol>
<p>Windows users should follow the <a
href="<page docs/tor-doc-windows>">Windows
howto</a>, OS X users should follow the <a
href="<page docs/tor-doc-osx>">OS
X howto</a>, and Linux/BSD/Unix users should follow the <a
href="<page docs/tor-doc-unix>">Unix howto</a>.
</p>
<hr>
<a id="one"></a>
<h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
<br>
<p>
First, you need to set up a web server locally. Setting up a web
server can be complex. We're not going to cover how to set up a web
server here. If you get stuck or want to do more, find a friend who
can help you. We recommend you install a new separate web server for
your onion service, since even if you already have one installed,
you may be using it (or want to use it later) for a normal website.
</p>
<p>
You need to configure your web server so it doesn't give away any
information about you, your computer, or your location. Be sure to
bind the web server only to localhost (if people could get to it
directly, they could confirm that your computer is the one offering
the onion service). Be sure that its error messages don't list
your hostname or other hints. Consider putting the web server in a
sandbox or VM to limit the damage from code vulnerabilities.
</p>
<p>
Once your web server is set up, make
sure it works: open your browser and go to <a
href="http://localhost:8080/">http://localhost:8080/</a>, where
8080 is the webserver port you chose during setup (you can choose any
port, 8080 is just an example). Then try putting a file in the main
html directory, and make sure it shows up when you access the site.
</p>
<hr>
<a id="two"></a>
<h2><a class="anchor" href="#two">Step Two: Configure your onion service</a></h2>
<br>
<p>Next, you need to configure your onion service to point to your
local web server.
</p>
<p>First, open your torrc file in your favorite text editor. (See
<a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
what this means.) Go to the middle section and look for the line</p>
<pre>
\############### This section is just for location-hidden services ###
</pre>
<p>
This section of the file consists of groups of lines, each representing
one onion service. Right now they are all commented out (the lines
start with #), so onion services are disabled. Each group of lines
consists of one <var>HiddenServiceDir</var> line, and one or more
<var>HiddenServicePort</var> lines:</p>
<ul>
<li><var>HiddenServiceDir</var> is a directory where Tor will store
information about that onion service. In particular, Tor will create a
file here named <var>hostname</var> which will tell you the onion URL. You
don't need to add any files to this directory. Make sure this is not the
same directory as the hidserv directory you created when setting up thttpd,
as your HiddenServiceDir contains secret information!</li>
<li><var>HiddenServicePort</var> lets you specify a virtual port (that is,
what port people accessing the onion service will think they're using) and
an IP address and port for redirecting connections to this virtual
port.</li> </ul>
<p>Add the following lines to your torrc:
</p>
<pre>
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
</pre>
<p>You're going to want to change the <var>HiddenServiceDir</var> line, so
it points to an actual directory that is readable/writeable by the user
that will be running Tor. The above line should work if you're using the OS
X Tor package. On Unix, try "/home/username/hidden_service/" and fill in
your own username in place of "username". On Windows you might pick:</p>
<pre> HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
HiddenServicePort 80 127.0.0.1:8080 </pre>
<p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix sockets.
This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
<pre>
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
HiddenServicePort 80 unix:/path/to/socket
</pre>
<p>Now save the torrc and restart your tor.</p>
<p>If Tor starts up again, great. Otherwise, something is wrong. First look
at your logfiles for hints. It will print some warnings or error messages.
That should give you an idea what went wrong. Typically there are typos in
the torrc or wrong directory permissions (See <a href="<page
docs/faq>#Logs">the logging FAQ entry</a> if you don't know how to enable
or find your log file.) </p>
<p>When Tor starts, it will automatically create the
<var>HiddenServiceDir</var> that you specified (if necessary), and it will
create two files there.</p>
<dl>
<dt><var>private_key</var></dt>
<dd>First, Tor will generate a new public/private keypair for your onion
service. It is written into a file called "private_key". Don't share this key
with others -- if you do they will be able to impersonate your onion
service.</dd>
<dt><var>hostname</var></dt>
<dd>The other file Tor will create is called "hostname". This contains
a short summary of your public key -- it will look something like
<tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
and you can tell it to people, publish it on websites, put it on business
cards, etc.</dd>
</dl>
<p>If Tor runs as a different user than you, for example on
OS X, Debian, or Red Hat, then you may need to become root to be able
to view these files.</p>
<p>Now that you've restarted Tor, it is busy picking introduction points
in the Tor network, and generating an <em>onion service
descriptor</em>. This is a signed list of introduction points along with
the service's full public key. It anonymously publishes this descriptor
to the directory servers, and other people anonymously fetch it from the
directory servers when they're trying to access your service.
</p>
<p>Try it now: paste the contents of the hostname file into your web
browser. If it works, you'll get the html page you set up in step one.
If it doesn't work, look in your logs for some hints, and keep playing
with it until it works.
</p>
<hr>
<a id="three"></a>
<h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
<br>
<p>If you plan to keep your service available for a long time, you might
want to make a backup copy of the <var>private_key</var> file somewhere.
</p>
<p>If you want to forward multiple virtual ports for a single onion
service, just add more <var>HiddenServicePort</var> lines.
If you want to run multiple onion services from the same Tor
client, just add another <var>HiddenServiceDir</var> line. All the following
<var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
you add another <var>HiddenServiceDir</var> line:
</p>
<pre>
HiddenServiceDir /usr/local/etc/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8080
HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
HiddenServicePort 6667 127.0.0.1:6667
HiddenServicePort 22 127.0.0.1:22
</pre>
<p>Onion services operators need to practice proper operational security
and system administration to maintain security. For some security
suggestions please make sure you read over Riseup's <a
href="https://help.riseup.net/en/security/network-security/tor/onionservices-best-practices">"Tor
Hidden (Onion) Services Best Practices" document</a>. Also, here are some
more anonymity issues you should keep in mind:
</p>
<ul>
<li>As mentioned above, be careful of letting your web server reveal
identifying information about you, your computer, or your location.
For example, readers can probably determine whether it's thttpd or
Apache, and learn something about your operating system.</li>
<li>If your computer isn't online all the time, your onion service
won't be either. This leaks information to an observant adversary.</li>
<li>It is generally a better idea to host onion services on a Tor client
rather than a Tor relay, since relay uptime and other properties are
publicly visible.</li>
<li>The longer an onion service is online, the higher the risk that its
location is discovered. The most prominent attacks are building a
profile of the onion service's availability and matching induced
traffic patterns.</li>
</ul>
<p>Another common issue is whether to use HTTPS on your relay or
not. Have a look at this <a
href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a> on the Tor Blog to learn more about these issues.
</p>
<p>Finally, feel free to use the <a
href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
mailing list</a> to discuss the secure administration and operation of
Tor onion services.</p>
</div>
<!-- END MAINCOL -->
<div id = "sidecol">
#include "side.wmi"
#include "info.wmi"
</div>
<!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
#include <foot.wmi>

View File

@ -52,8 +52,8 @@
{'url' => 'docs/tor-doc-relay',
'txt' => 'Configuring a Relay graphically',
},
{'url' => 'docs/tor-hidden-service',
'txt' => 'Configuring a Hidden Service',
{'url' => 'docs/tor-onion-service',
'txt' => 'Configuring an Onion Service',
},
{'url' => 'docs/bridges',
'txt' => 'Configuring a Bridge Relay',

View File

@ -0,0 +1,7 @@
## translation metadata
# Revision: $Revision$
# Status: obsolete
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
#include <foot.wmi>

View File

@ -19,6 +19,7 @@ form#makeDonation {
<li><a href="#bitcoin">Bitcoin</a></li>
<li><a href="<page donate/donate-amazon>">Amazon Payments</a></li>
<li><a href="https://smile.amazon.com/ch/20-8096820">Amazon Smile</a></li>
<li><a href="https://givingassistant.org/np#tor-project-inc">Giving Assistant</a></li>
<li><a href="#eubanks">EU Bank Transfer</a></li>
<li><a href="#cash">Checks or Money Orders</a></li>
<li><a href="#stock">Donate Stock</a></li>
@ -112,13 +113,27 @@ form#makeDonation {
</p>
</div>
<!-- END AMAZON -->
<!-- BEGIN GIVING -->
<a id="giving"></a>
<div class="hundred toptwenty">
<div class="dbox donate">
<h3>Donate via Giving Assistant</h3>
<p>Giving Assistant helps you donate a percentage of your cash back earnings to us with every purchase you make at 3,000+ popular online retailers.</p>
<p>
<strong>
<a href="https://givingassistant.org/np#tor-project-inc">Use Giving Assistant to save money and support the Tor Project</a>
</strong>
</p>
</div>
</div>
<!-- END GIVING -->
<!-- BEGIN TRANSFER -->
<a id="eubanks"></a>
<div class="">
<h3 style="margin-top:20px;">Donate via European Bank Transfer</h3>
<p>For European bank transfers, we have an arrangement with
the Renewable Freedom Foundation to provide
<a href="http://www.solicitorsjournal.com/news/private-client/charities/gifts-foreign-charities-are-tax-deductible-ecj-rules">tax-deductible</a>
the Renewable Freedom Foundation to provide tax-deductible
donations for Europeans. They will issue a donation receipt <a
href="https://renewablefreedom.org/contact/">upon request</a>. The
account information is as follows:</p>

View File

@ -0,0 +1,7 @@
## translation metadata
# Revision: $Revision$
# Status: obsolete
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
#include <foot.wmi>

View File

@ -0,0 +1,7 @@
## translation metadata
# Revision: $Revision$
# Status: obsolete
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
#include <foot.wmi>

View File

@ -88,7 +88,7 @@
</li>
<li>
<p><strong>I would like to know more about how Tor works,
what hidden services are, or how to run a relay.</strong></p>
what onion services are, or how to run a relay.</strong></p>
<p><a href="<page docs/faq>"
target="_blank">This Tor Project FAQ</a> has answers to all
those questions, and more.</p>

View File

@ -14,7 +14,7 @@
<ol>
<li>Please consider <a href="<page docs/tor-doc-relay>">running
a relay</a> to help the Tor network grow.</li>
<li>Tell your friends! Get them to run relays. Get them to run hidden
<li>Tell your friends! Get them to run relays. Get them to run onion
services. Get them to tell their friends.</li>
<li>If you like Tor's goals, please <a href="<page donate/donate>">take a moment
to donate to support further Tor development</a>. We're also looking
@ -378,12 +378,12 @@ meetings around the world.</li>
<p>
<b>Project Ideas:</b><br />
<i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br />
<i><a href="#improveOnionServices">Help improve Tor onion services</a></i><br />
<i><a href="#torFuzzing">Fuzzing coverage of Tor</a></i><br />
<i><a href="#relayCryptoParallelism">Relay crypto parallelism</a></i><br />
<i><a href="#anonymousLocalCountStatistics">Anonymous local count statistics</a></i><br />
<i><a href="#improveSocks5Variant">Improved SOCKS5 variant</a></i><br />
<i><a href="#hiddenServiceCryptoParallelism">Hidden service crypto parallelism</a></i><br />
<i><a href="#onionServiceCryptoParallelism">Onion service crypto parallelism</a></i><br />
<i><a href="#supportAllDNS">Support all kinds of DNS in Tor</a></i><br />
<i><a href="#improveIpv6Support">Improve IPv6 support</a></i>
</p>
@ -765,28 +765,29 @@ meetings around the world.</li>
<ol>
<a id="improveHiddenServices"></a>
#Keep old ids in case of incoming links.
<a id="improveOnionServices"></a><a id="improveHiddenServices"></a>
<li>
<b>Help improve Tor hidden services</b>
<b>Help improve Tor onion services</b>
<br>
Language: <i>C</i>
<br>
Likely Mentors: <i>George (asn), David Goulet (dgoulet)</i>
<br><br>
<p>
The hidden services team is busy implementing <a
The onion services team is busy implementing <a
href="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt">proposal
224</a> but we are always open to mentoring fun and exciting hidden
224</a> but we are always open to mentoring fun and exciting onion
service projects.
</p>
<p>
In the past, we've mentored a wide variety of projects related to hidden
In the past, we've mentored a wide variety of projects related to onion
services, ranging from <a
href="https://lists.torproject.org/pipermail/tor-dev/2016-April/010832.html">onion
search engines</a>, <a
href="https://lists.torproject.org/pipermail/tor-talk/2015-May/037966.html">to
scaling techniques for hidden services</a>,
scaling techniques for onion services</a>,
and also various approaches
of making onion services more <a
href="https://lists.torproject.org/pipermail/tor-dev/2012-June/003588.html">usable</a>
@ -892,24 +893,25 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/12
</p>
</li>
<a id="hiddenServiceCryptoParallelism"></a>
#Keep old ids in case of incoming links.
<a id="onionServiceCryptoParallelism"></a><a id="hiddenServiceCryptoParallelism"></a>
<li>
<b>Hidden service crypto parallelism</b>
<b>Onion service crypto parallelism</b>
<br>
Likely Mentors: <i>Nick (nickm), David Goulet (dgoulet)</i>
<br><br>
<p>
Hidden services, hidden service clients, hidden service directories,
Onion services, onion service clients, onion service directories,
and introduction points all need to do a few public-key operations as
they operate. But right now, these operations are all done on the
main thread. It would be good to have these run across multiple cores.
</p>
<p>
This could probably be done in a way similar to how we currently hand
This could probably be done in a way similar to how we currently handle
circuit extension handshakes in onion.c and cpuworker.c, but we'd need
to extend the state machine for hidden services to add an additional
state. It could help hidden services operate much more efficiently.
to extend the state machine for onion services to add an additional
state. It could help onion services operate much more efficiently.
</p>
<p>
@ -1060,13 +1062,13 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<a id="ahmiaSearch"></a>
<li>
<b>Ahmia - Hidden Service Search</b>
<b>Ahmia - Onion Service Search</b>
<br>
Language: <i>Python, Django</i>
<br>
Likely Mentors: <i>Juha Nurmi (numes), George (asn)</i>
<p>
Ahmia is open-source search engine software for Tor hidden service deep
Ahmia is open-source search engine software for Tor onion service deep
dark web sites. You can test the running search engine at ahmia.fi. For
more information see our <a
href="https://blog.torproject.org/category/tags/ahmiafi">blog post about
@ -1075,7 +1077,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<p>
Ahmia is a working search engine that indexes, searches, and catalogs
content published on Tor Hidden Services. Furthermore, it is an environment
content published on Tor Onion Services. Furthermore, it is an environment
to share meaningful insights, statistics, insights, and news about the Tor
network itself. In this context, there is a lot of work to do.
</p>
@ -1098,7 +1100,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
<li>Remove these sites from the search results</li>
</ul>
</li>
<li>Add hidden services funtion (very important)<br />
<li>Add onion services function (very important)<br />
<ul>
<li>You can add onions using HTML form</li>
<li>Call the crawler immidiately when a new site is added</li>

Binary file not shown.

Before

Width:  |  Height:  |  Size: 55 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 62 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 71 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 70 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 72 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 59 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 50 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 36 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 19 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 18 KiB

View File

@ -34,9 +34,7 @@
</div>
<ul id="navbar" class="nav navbar-nav navbar-right">
<li><a href="<page about/overview>">About</a></li>
<:{
printf '<li><a href="https://donate.torproject.org/donor-faq">Questions?</a></li>'
}:>
<:{ printf '<li><a href="https://donate.torproject.org/donor-faq">Questions?</a></li>' }:>
</ul>
</div>
</nav>

View File

@ -45,7 +45,7 @@
<ul>
<li><a href="<page donate/donate-foot>">Donate</a></li>
<li><a href="<page docs/documentation>#MailingLists">Mailing Lists</a></li>
<li><a href="<page docs/hidden-services>">Hidden Services</a></li>
<li><a href="<page docs/onion-services>">Onion Services</a></li>
<li><a href="<page getinvolved/translation>">Translations</a></li>
# <li><a href="<page getinvolved/open-positions>">Careers</a></li>
</ul>

View File

@ -13,7 +13,7 @@
<define-tag tbbrepo whitespace=delete>https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:</define-tag>
<define-tag specblob whitespace=delete>https://gitweb.torproject.org/torspec.git/tree/</define-tag>
<define-tag doxygen whitespace=delete>https://doxygen.torproject.org/</define-tag>
<define-tag donatefaq whitespace=delete>https://donate.torproject.org/donor-faq</define-tag>
<define-tag donatefaq whitespace=delete>https://donate.torproject.org/donor-faq</define-tag>
# Xinclude "locallinks.wmi"

View File

@ -1,5 +1,5 @@
<define-tag version-stable whitespace=delete>0.3.1.8</define-tag>
<define-tag version-alpha whitespace=delete>0.3.2.4-alpha</define-tag>
<define-tag version-stable whitespace=delete>0.3.1.9</define-tag>
<define-tag version-alpha whitespace=delete>0.3.2.6-alpha</define-tag>
<define-tag version-torbrowserdevelopbranch whitespace=delete>maint-7.0</define-tag>

191
keys/redshiftzero.txt Normal file
View File

@ -0,0 +1,191 @@
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: SKS 1.1.6
Comment: Hostname: pgp.mit.edu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=27Y5
-----END PGP PUBLIC KEY BLOCK-----

View File

@ -50,6 +50,36 @@ some of the significant Tor-related stories that have popped up.</p>
</tr>
</thead>
<tr style="background-color: #e5e5e5;">
<td>2017 Nov 20</td>
<td>Bleeping Computer</td>
<td><a href="https://www.bleepingcomputer.com/news/software/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation/">Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td>
</tr>
<tr style="">
<td>2017 Nov 15</td>
<td>Motherboard</td>
<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">The Motherboard Guide to Not Getting Hacked</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2017 Oct 30</td>
<td>NakedSecurity</td>
<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">Firefox takes a bite out of the canvas 'super cookie'</a></td>
</tr>
<tr style="">
<td>2017 Oct 30</td>
<td>BleepingComputer</td>
<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2017 Oct 27</td>
<td>NYTimes</td>
<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">The New York Times is Now Available as a Tor Onion Service</a></td>
</tr>
<tr style="">
<td>2017 Sep 7</td>
<td>Threatpost</td>

View File

@ -72,16 +72,16 @@
<h2>How can I run my own private TorDNSEL?</h2>
<p>You can learn all about the code for TorDNSEL by visiting the <a
href="http://p56soo2ibjkx23xo.onion/">official hidden service</a> through
href="http://p56soo2ibjkx23xo.onion/">official onion service</a> through
Tor.</p>
<p>You can download the latest source release from the <a
href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">hidden
href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">onion
service</a> or from a
<a href="/tordnsel/dist/tordnsel-0.0.6.tar.gz">
local mirror</a>. It's
probably wise to check out the current revision from the darcs repository
hosted on the aforementioned hidden service.</p>
hosted on the aforementioned onion service.</p>
<p>For more information or to report something useful, please email
the