Pertanyaan yang Sering Diajukan
Dapatkah saya menyumbang untuk relai daripada menjalankan sendiri?
Tentu! Kami memiliki daftar organisasi yang menjalankan relai Tor yang dengan senang hati membuat donasi Anda menjadi kecepatan dan anonimitas yang lebih baik untuk jaringan Tor.
Organisasi-organisasi ini tidak sama dengan The Tor Project, Inc, tetapi kami menganggap itu hal yang baik. Mereka dijalankan oleh orang-orang baik yang merupakan bagian dari komunitas Tor.
Perhatikan bahwa mungkin ada tradeoff di sini antara anonimitas dan kinerja. Anonimitas jaringan Tor sebagian berasal dari berbagai ragam, jadi jika Anda berada dalam posisi menjalankan relai Anda sendiri, Anda akan lebih meningkatkan anonimitas Tor dibandingkan melalui sumbangan. Namun pada saat yang sama, skala ekonomi untuk bandwidth berarti menggabungkan donasi-donasi kecil ke dalam beberapa relai besar lebih efisien dalam meningkatkan kinerja jaringan. Meningkatkan anonimitas dan meningkatkan kinerja keduanya merupakan tujuan yang bermanfaat, jadi dengan cara apapun Anda dapat membantu itu baik!
Apakah saya harus memasang add-on atau extension baru di Tor Browser, seperti AdBlock Plus atau uBlock Origin?
Sangat tidak dianjurkan untuk memasang add-on baru di Tor Browser karena mereka dapat membahayakan privasi dan keamanan Anda.
Menginstal add-on baru dapat memengaruhi Tor Browser dengan cara yang tidak terduga dan berpotensi menjadikan Tor Browser Anda memiliki kode fingerprint/sidi-kjari atau identitas unik. Jika Tor Browser Anda memiliki kode fingerprint/sidik-jari unik, kegiatan browsing Anda dapat dikenali dan dilacak meskipun Anda menggunakan Tor Browser.
Pada dasarnya, setiap pengaturan dan fitur pada browser menghasilkan apa yang disebut "browser fingerprint" atau dapat disebut "kode sidik-jari browser". Sebagian besar browser secara tidak sengaja menciptakan kode fingerprint/sidik-jari unik untuk masing-masing pengguna, yang menjadikan setiap masing-masing penggunanya dapat dikenali dan dilacak di dalam internet. Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across its users. Ini artinya, setiap pengguna Tor Browser terlihat seperti setiap pengguna Tor Browser lainnya, sehingga menjadikannya sulit untuk dapat melacak kegiatan dari satu individu pengguna.
Disanapun juga terdapat peluang bahwa sebuah add-on baru, akan meningkatkan timbulnya serangan terhadap Tor Browser. Ini dapat memungkinkan bocornya data sensitif atau memungkinkan penyerang untuk dapat menginfeksi Tor Browser. Sebuah add-on itu sendiri pun bahkan bisa dirancang jahat untuk memata-matai Anda.
Tor Browser sendiri telah memiliki dua add-ons bawaan terinstall — HTTPS Everywhere dan NoScript — dan menambahkan hal lain dapat saja merusak anomimisitas Anda.
Ingin mempelajari lebih lanjut tentang fingerprinting? Berikut ini adalah artikel di dalam The Tor Blog all about it.
Tor Browser tersedia di platform atau sistem operasi apa saja?
Tor Browser saat ini tersedia di Windows, Linux dan macOS
Juga ada versi Tor Browser untuk Android dan The Guardian Project juga menyediakan aplikasi Orbot untuk merutekan aplikasi lain di perangkat Android Anda melalui jaringan Tor.
Belum ada versi resmi Tor untuk iOS sampai sekarang, namun kami merekomendasikan Onion Browser.
Apakah saya benar-benar anonim jika menggunakan Tor?
Umumnya mustahil untuk benar-benar anonim, bahkan dengan Tor. Meskipun ada beberapa hal yang dapat Anda praktikkan untuk meningkatkan anonimitas Anda saat menggunakan Tor dan saat luring.
Gunakan Tor Browser dan perangkat lunak yang dikonfigurasi khusus untuk Tor
Tor tidak melindungi semua lalu lintas Internet komputer Anda saat Anda menjalankannya. Tor hanya melindungi aplikasi yang dikonfigurasi dengan baik untuk mengirim lalu lintas Internet mereka melalui Tor.
Meramban web:
Pembagian berkas:
- Aman: OnionShare
- Tidak Aman: BitTorrent melalui Tor
Kontrol informasi yang anda bagikan melalui formulir web
Jika Anda mengunjungi situs web menggunakan Tor Browser, mereka tidak tahu siapa Anda atau lokasi Anda yang sebenarnya. Sayangnya banyak situs meminta lebih banyak informasi pribadi daripada yang mereka butuhkan melalui formulir web. Jika Anda masuk ke dalam situs web tersebut, mereka tetap tidak akan mengetahui lokasi Anda, tetapi mereka tahu siapa Anda. Selanjutnya, jika Anda memberikan: nama, surel, alamat, nomor telepon, atau informasi pribadi lainnya, Anda tidak lagi anonim di situs web tersebut. Pertahanan terbaik adalah mewaspadai dan sangat berhati-hati saat mengisi formulir yang ada pada situs web.
Jangan menggunakan torrent melalui Tor
Aplikasi pembagian berkas Torrent telah diamati untuk mengabaikan pengaturan proksi dan membuat koneksi langsung bahkan ketika mereka diperintahkan untuk menggunakan Tor. Bahkan jika aplikasi torrent Anda hanya terhubung melalui Tor, Anda akan sering mengirimkan alamat IP asli Anda dalam permintaan GET pelacak, karena begitulah cara kerja torrent. Anda tidak hanya [Mendeanonimasikan lalu-lintas torrent Anda dan lalu-lintas Tor web lainnya] (https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea) dengan cara ini, Anda memperlambat seluruh Jaringan Tor untuk semua orang.
Jangan aktifkan atau pasang plugin peramban
Tor Browser akan memblokir plugin peramban seperti Flash, RealPlayer, Quicktime, dan lainnya: mereka dapat dimanipulasi untuk mengungkapkan alamat IP Anda. Demikian pula, kami tidak menyarankan memasang add-on atau plugin tambahan ke dalam Tor Browser, karena dapat mengabaikan Tor atau sebaliknya dapat membahayakan anonimitas dan privasi Anda.
Gunakan situs web versi HTTPS
Tor akan mengenkripsi lalu lintas Anda ke dan di dalam jaringan Tor, tetapi enkripsi lalu lintas ke situs web tujuan akhir Anda bergantung pada situs web tersebut. Untuk membantu memastikan enkripsi pribadi ke situs web, Tor Browser menyertakan HTTPS Everywhere untuk mendorong penggunaan enkripsi HTTPS dengan situs web utama yang mendukungnya. Namun, Anda tetap harus memperhatikan bilah URL peramban untuk memastikan bahwa situs web yang Anda berikan informasi sensitif menampilkan gembok atau ikon onion di kolom alamat, sertakan https:// di URL, dan tampilkan nama yang diharapkan untuk situs web. Lihat juga grafik interaktif EFF yang menjelaskan bagaimana Tor dan HTTPS berhubungan.
Jangan buka dokumen yang diunduh melalui Tor saat sedang daring
Tor Browser akan memperingatkan Anda sebelum secara otomatis membuka dokumen yang ditangani oleh aplikasi eksternal. JANGAN ABAIKAN PERINGATAN INI. Anda harus sangat berhati-hati saat mengunduh dokumen melalui Tor (terutama berkas DOC dan PDF, kecuali jika Anda menggunakan penampil PDF yang ada di dalam Tor Browser) karena dokumen ini dapat berisi sumber daya Internet yang akan diunduh di luar Tor oleh aplikasi yang membukanya. ini akan menyingkap alamat IP non-Tor Anda. Jika Anda harus bekerja dengan file yang diunduh melalui Tor, kami sangat menyarankan untuk menggunakan komputer yang tidak terhubung, atau menggunakan dangerzone untuk membuat berkas PDF aman yang dapat Anda buka. Bagaimanapun, tidak ada situasi yang aman untuk menggunakan BitTorrent dan Tor secara bersamaan.
Gunakan bridges dan/atau temukan perusahaan
Tor mencoba untuk mencegah penyerang untuk mempelajari tujuan situs web apa yang Anda hubungkan. Namun, secara default, Tor tidak mencegah seseorang yang melihat lalu-lintas Internet Anda mengetahui bahwa Anda menggunakan Tor. Jika hal ini penting untuk Anda, Anda bisa mengurangi risiko ini dengan mengonfigurasi Tor untuk menggunakan bridge daripada menyambungkan langsung ke Jaringan Tor. Pada akhirnya proteksi terbaik adalah pendekatan sosial: semakin banyak pengguna Tor di dekat Anda dan semakin beragam kepentingan mereka, semakin tidak berbahaya itu karena Anda adalah salah satu dari mereka. Ajak orang lain untuk menggunakan Tor!
Jadilah cerdas dan belajar lebih banyak. Pelajari apa yang Tor tawarkan dan tidak tawarkan. Daftar kekurangan ini tidak lengkap, dan kami membutuhkan bantuan Anda [Mengidentifikasi dan mendokumentasikan semua masalah] (https://community.torproject.org/).
Apa saya dapat menggunakan VPN dengan Tor?
Umumnya kami tidak menyarankan VPN dengan Tor kecuali Anda adalah pengguna tingkat lanjut yang dapat mengatur keduanya sehingga tidak mengurangi privasi Anda.
Anda dapat menemukan informasi lebih rinci tentang Tor + VPN di our wiki.
Saat menggunakan Tor Browser, apakah pihak lain dapat mengetahui situs web yang saya kunjungi?
Tor Browser mencegah orang lain mengetahui situs web yang Anda kunjungi. Beberapa entitas, seperti Penyedia Layanan Internet (ISP), dapat melihat bahwa Anda menggunakan Tor, tetapi mereka tidak akan tahu kemana Anda berselancar saat Anda melakukannya.
Situs web kami diblokir sensor. Apakah Tor Browser dapat membantu pengguna kami dalam meng-akses situs web kami?
Tor Browser tentu-saja dapat membantu dalam meng-akses situs web Anda, dari tempat dimana terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan untuk pengelakan sensor, salah-satunya termasuk pluggable transport.
Untuk info lebih lanjut, silakan baca bagian Panduan untuk pengguna Tor Browser dibagian penyensoran.
Tentang Tor
Apa yang mungkin dapat menyerang peruteran onion?
Seperti yang telah di atas, ada kemungkinan untuk seorang pengamat melihat Anda dan tujuan website Anda atau node keluar Tor Anda untuk mengkorelasikan pengaturan waktu dari lalu lintas Anda selagi memasuki Jaringan Tor dan juga saat lalu lintas keluar. Tor tidak dapat melindungi terhadap model ancaman seperti itu.
Dalam artian yang lebih terbatas, ingat bahwa jika lembaga penegak sensor atau hukum mempunyai kemampuan untuk mendapatkan observasi spesifik dari bagian jaringan, mungkin untuk mereka untuk memverifikasi kecurigaan bahwa Anda sering berbicara dengan teman Anda dengan mengobservasi lalu lintas di kedua ujung dan mengkorelasikan waktu dari lalu lintas tersebut. Lagi-lagi, ini hanya berguna untuk memverifikasi bahwa kedua pihak telah dicurigai berkomunikasi satu sama lain sedang melakukannya. Di beberapa negara, kecurigaan yang diperlukan untuk mendapatkan surat perintah sudah membawa bobot lebih daripada bobot korelasi waktu.
Lebih-lebih lagi, sejak Tor menggunakan ulang sirkuit untuk banyak koneksi TCP, mungkin untuk mengasosiasikan lalu lintas anonim dan non-anonim pada node keluar yang diberikan, jadi berhati-hatilah mengenai aplikasi apa yang Anda jalankan bersamaan dengan Tor. Bahkan mungkin menjalankan klien Tor terpisah untuk aplikasi ini.
What protections does Tor provide?
Internet communication is based on a store-and-forward model that can be understood in analogy to postal mail: Data is transmitted in blocks called IP datagrams or packets. Every packet includes a source IP address (of the sender) and a destination IP address (of the receiver), just as ordinary letters contain postal addresses of sender and receiver. The way from sender to receiver involves multiple hops of routers, where each router inspects the destination IP address and forwards the packet closer to its destination. Thus, every router between sender and receiver learns that the sender is communicating with the receiver. In particular, your local ISP is in the position to build a complete profile of your Internet usage. In addition, every server in the Internet that can see any of the packets can profile your behavior.
Tujuan Tor adalah untuk meningkatkan privasi Anda dengan mengirimkan lalu lintas Anda melalui serangkaian proksi. Komunikasi Anda dienkripsi dalam beberapa lapisan dan dirutekan melalui beberapa lompatan melalui jaringan Tor ke penerima akhir. Detail lebih lanjut tentang proses ini dapat ditemukan di visualisasi ini. Perhatikan bahwa semua Penyedia Jasa Internet lokal Anda sekarang dapat mengamati bahwa Anda berkomunikasi dengan simpul Tor. Demikian pula, server di Internet hanya melihat bahwa mereka dihubungi oleh node Tor.
Secara umum, Tor bertujuan untuk memecahkan tiga masalah privasi:
Pertama, Tor mencegah situs web dan layanan lain mempelajari lokasi Anda, yang dapat mereka gunakan untuk membangun basis data tentang kebiasaan dan minat Anda. Dengan Tor, koneksi Internet Anda tidak memberikan informasi Anda secara default -- sekarang Anda dapat memiliki kemampuan untuk memilih, untuk setiap koneksi, berapa banyak informasi yang bisa diperlihatkan.
Kedua, Tor mencegah orang yang mengawasi lalu lintas Anda secara lokal (seperti Penyedia Jasa Internet Anda atau seseorang yang memiliki akses ke wifi atau router rumah Anda) dari mempelajari informasi apa yang Anda ambil dan dari mana Anda mengambilnya. Ini juga menghentikan mereka untuk memutuskan apa yang boleh Anda pelajari dan publikasikan -- jika Anda dapat mengakses bagian mana pun dari jaringan Tor, Anda dapat menjangkau situs mana pun di Internet.
Ketiga, Tor merutekan koneksi Anda melalui lebih dari satu relai Tor sehingga tidak ada satu relai pun yang dapat mempelajari apa yang Anda lakukan. arena relai ini dijalankan oleh individu atau organisasi yang berbeda, pendistribusian kepercayaan memberikan keamanan lebih daripada pendekatan lama proksi satu lompatan.
Namun, perhatikan bahwa ada situasi di mana Tor gagal menyelesaikan masalah privasi ini sepenuhnya: lihat entri di bawah pada kemungkinan serangan.
Apa itu Tor?
Nama "Tor" mewakili beberapa komponen yang berbeda.
Tor adalah program yang dapat Anda jalankan di komputer yang membantu Anda tetap aman berada di Internet. Ini melindungi Anda dengan memantulkan komunikasi Anda di sekitar jaringan relai terdistribusi yang dijalankan oleh sukarelawan di seluruh dunia: ini mencegah seseorang yang menonton koneksi Internet Anda untuk mengetahui situs apa yang Anda kunjungi, dan mencegah situs yang Anda kunjungi untuk mengetahui lokasi fisik Anda. Kumpulan sukarelawan relai ini disebut jaringan Tor.
Cara kebanyakan orang menggunakan Tor adalah dengan Tor Browser, yang merupakan versi Firefox yang memperbaiki banyak masalah privasi. Anda dapat membaca lebih lanjut tentang Tor di halaman tentang kami.
Proyek Tor adalah organisasi nirlaba (amal) yang memelihara dan mengembangkan perangkat lunak Tor.
Mengapa disebut Tor?
Tor adalah jaringan perutean onion. Saat itu, ketika kami memulai desain dan implementasi perutean onion generasi baru pada tahun 2001-2002, kami memberi tahu orang-orang bahwa kami sedang mengerjakan perutean onion, dan mereka mengatakan "Bagus. Yang mana?" Bahkan jika perutean onion telah menjadi istilah standar rumah tangga, Tor sesungguhnya lahir dari proyek perutean onion yang dijalankan oleh Naval Research Lab.
(Ini juga memiliki arti yang bagus dalam bahasa Jerman dan Turki.)
Catatan: meskipun awalnya berasal dari akronim, Tor tidak dieja "TOR". Hanya huruf pertama yang dikapitalisasi. Faktanya, kami biasanya dapat melihat orang yang belum membaca situs web kami (dan malah mempelajari semua yang mereka ketahui tentang Tor dari artikel berita) dengan fakta bahwa mereka salah mengejanya.
Does Tor remove personal information from the data my application sends?
No, it doesn't. You need to use a separate program that understands your application and protocol and knows how to clean or "scrub" the data it sends. Tor Browser tries to keep application-level data, like the user-agent string, uniform for all users. Tor Browser can't do anything about the text that you type into forms, though.
Apa bedanya Tor dengan proxi lain?
Penyedia proxi biasa menyiapkan server di suatu tempat di Internet dan memungkinkan Anda menggunakannya untuk merelai lalu lintas Anda. Ini menciptakan arsitektur yang sederhana dan mudah untuk dirawat. Semua pengguna masuk dan keluar melalui server yang sama. Penyedia dapat mengenakan biaya untuk penggunaan proksi, atau mendanai biaya mereka melalui iklan di server. Dalam konfigurasi yang sederhana, Anda tidak harus menginstal apapun. Anda hanya perlu mengarahkan peramban Anda ke server proksi mereka. Penyedia proxy sederhana adalah solusi yang baik jika Anda tidak ingin proteksi terhadap privasi dan anonimitas online Anda dan Anda mempercayai provider tersebut untuk tidak melakukan hal buruk. Beberapa prenyedia proxy simpel menggunakan SSL untuk mengamankan koneksi Anda ke mereka, yang melindungi Anda dari penyadap lokal, seperti yang ada di kafe dengan wifi Internet gratis.
Penyedia proxy simpel juga membuat sebuah titik kegagalan. Penyedia mengetahui siapa Anda dan Apa yang Anda jelajahi di Internet. Mereka dapat melihat lalu-lintas Anda saat melewati server mereka. Dalam beberapa kasus, mereka bahkan bisa melihat ke dalam lalu-lintas Anda yang terenkripsi saat mereka menyampaikannya ke situs banking atau situ ecommerce. Anda harus mempercayai penyedia tidak mengawasi lalu-lintas, menyuntikkan iklan mereka ke dalam aliran lalu-lintas Anda, atau merekam detail personal Anda.
Tor membuat lalu-lintas Anda melewati setidaknya 3 server berbeda sebelum mengirimkannya ke tujuan. Karena ada lapisan enkripsi terpisah untuk masing-masing ketiga relay, seseorang yang mengawasi koneksi Internet Anda tidak bisa memodifikasi, atau membaca apa yang Anda kirim ke jaringan Tor. Lalu-lintas Anda dienkripsi diantara klien Tor (pada komputer Anda) dan di mana itu muncul di tempat lain di dunia.
Apakah server pertama melihat siapa saya?
Mungkin. Server pertama dari tiga server yang buruk dapat melihat lalu lintas Tor terenkripsi yang berasal dari komputer Anda. Server pertama tetap tidak tahu siapa Anda dan apa yang Anda lakukan di Tor. Ia hanya akan melihat "Alamat IP ini menggunakan Tor". Anda masih terlindungi dari simpul ini untuk mengetahui siapa Anda dan ke mana Anda akan pergi di Internet.
Bisakah server ketiga melihat lalu lintas saya?
Mungkin. Server ketiga dari tiga server yang buruk dapat melihat lalu lintas yang Anda kirim ke Tor. Ia tidak akan mengetahui siapa yang mengirim lalu lintas ini. Jika kamu mengirim enkripsi (seperti HTTPS), ia hanya akan mengetahui destinasinya. Lihat visualisasi Tor dan HTTPS ini untuk memahami bagaimana Tor dan HTTPS berinteraksi.
Bisakah saya mendistribusikan Tor?
Ya.
Tor adalah perangkat lunak tidak berbayar free software. Ini berarti kami memberi Anda hak untuk mendistribusikan perangkat lunak Tor, baik yang dimodifikasi atau tidak dimodifikasi, baik dengan biaya atau pun gratis. Anda tidak perlu meminta izin khusus dari kami.
Namun, jika anda ingin mendistribusikan kembali perangkat lunak Tor anda harus mengikuti LICENSE. Pada dasarnya ini berarti Anda harus menyertakan berkas LISENSI kami bersama dengan bagian apa pun dari perangkat lunak Tor yang Anda distribusikan.
Namun, kebanyakan orang yang menanyakan pertanyaan ini kepada kami bukan hanya ingin mendistribusikan perangkat lunak Tor saja. Mereka ingin menyebarkan Tor Browser. Termasuk Firefox Extended Support Release, dan ekstensi NoScript dan HTTPS-Everywhere Anda juga harus mengikuti lisensi untuk program tersebut. Kedua ekstensi Firefox tersebut didistribusikan di bawah GNU General Public License, sedangkan Firefox ESR dirilis di bawah Mozilla Public License. Cara paling sederhana untuk mematuhi lisensi mereka adalah dengan menyertakan kode sumber untuk program ini di mana pun Anda menyertakan bundel itu sendiri.
Juga, Anda harus memastikan pembaca tidak kebingungan memahami apa itu Tor, siapa yang membuatnya, dan properti apa yang disediakannya (dan tidak disediakan). Lihat FAQ merek dagang kami untuk detailnya.
Program apa saja yang dapat saya gunakan bersamaan dengan Tor?
Ada banyak program lain yang dapat Anda gunakan dengan Tor, tetapi kami belum meneliti masalah anonimitas tingkat aplikasi pada semuanya dengan cukup baik untuk dapat merekomendasikan konfigurasi yang aman. Wiki page kami memiliki daftar petunjuk yang dikelola komunitas untuk Torifying specific applications. Harap tambahkan ke daftar ini dan bantu kami membuatnya tetap akurat!
Kebanyakan orang menggunakan Tor Browser, karena memiliki semua yang Anda butuhkan untuk menjelajahi web dengan aman menggunakan Tor. Menggunakan Tor dengan peramban lain berbahaya dan tidak disarankan.
Apakah disana terdapat sebuah backdoor pada Tor?
Sama sekali tidak ada backdoor pada Tor.
Kami mengetahui beberapa pengacara yang pintar yang mengatakan bahwa kecil kemungkinan ada orang yang mencoba untuk menambahkan satu di dalam yurisdiksi kami (AS). Jika memang mereka bertanya kepada kami, kami akan melawan mereka, dan (kata pengacara) mungkin menang.
Kami tidak akan pernah menempatkan backdoor pada Tor. Kami berpikir bahwa menempatkan backdoor di Tor akan sangat tidak bertanggung jawab kepada pengguna kami, dan merupakan contoh buruk bagi perangkat lunak keamanan secara umum. Jika kami pernah meletakkan backdoor secara sengaja di dalam perangkat lunak keamanan kami, hal tersebut akan menghancurkan reputasi professional kami. Tidak bakal ada yang mempercayai perangkat lunak kami lagi - untuk alasan yang sangat baik!
Terlepas dari apa yang baru saja dikatakan, masih banyak serangan halus yang orang akan coba. Seseorang mungkin menyamar sebagai kami, atau membobol komputer kami, atau sesuatu seperti itu. Tor adalah open source software, dan Anda harus selalu memeriksa sumbernya (atau setidaknya memeriksa perbedaan dengan rilis terakhir) untuk hal-hal yang mencurigakan. Jika kami (atau distributor yang memberi Anda Tor) tidak memberi Anda akses ke kode sumber, itu adalah pertanda pasti ada sesuatu yang mencurigakan. Anda juga sebaiknya mengecek signature PGP pada rilis, untuk memastikan tidak ada yang mengacaukan situs distribusi.
Juga, di sana mungkin saja terdapat bug yang tidak disengaja pada Tor yang dapat memengaruhi anonimitas Anda. Kami secara berkala menemukan dan memperbaiki bug terkait anonimitas, jadi pastikan Anda selalu memperbarui versi Tor Anda.
Apa itu Penjaga Entri?
Tor (seperti semua desain anonimitas latensi rendah praktis saat ini) gagal ketika penyerang dapat melihat kedua ujung saluran komunikasi. Misalnya, penyerang mengontrol atau mengawasi relai Tor yang Anda pilih untuk masuk ke jaringan, dan juga mengontrol atau mengawasi situs web yang Anda kunjungi. Dalam hal ini, komunitas riset tidak mengetahui desain latensi rendah praktis yang dapat secara andal menghentikan penyerang dari menghubungkan informasi volume dan waktu di kedua sisi.
Jadi, apa yang harus dilakukan? Misalkan penyerang mengontrol, atau dapat mengamati, relai C. Misalkan ada total N relay. Jika Anda memilih relai masuk dan keluar baru setiap kali Anda menggunakan jaringan, penyerang akan dapat menghubungkan semua lalu lintas yang Anda kirim dengan probabilitas sekitar (c/n)2. Namun profiling, untuk beberapa user, sama buruknya dengan dilacak pada setiap waktu: mereka ingin melakukan sesuatu seringkali tanpa diketahui penyerang, dan penyerang mengetahuinya sekali saja sama buruknya dengan penyerang mengetahuinya secara sering. Jadi, memilih banyak entri dan keluar secara acak tidak memberi pengguna kesempatan untuk meloloskan diri dari pembuatan profil oleh penyerang semacam ini.
Solusinya adalah dengan "penjaga entri": setiap klien Tor memilih beberapa relai secara acak untuk digunakan sebagai titik masuk, dan menggunakan relai tersebut hanya untuk hop pertama mereka. Jika relay tersebut tidak dikontrol atau diobservasi, penyerang tidak akan menang, dan pengguna aman. Jika relay tersebut diobservasi dan dikontrol oleh penyerang, penyerang melihat sebagian besar lalu-lintas pengguna - namun tetap pengguna tidak akan lebih ter-profile daripada sebelumnya. Jadi, pengguna memiliki beberapa kesempatan (pada orde (n-c)/n) untuk menghindari profilling, sedangkan mereka tidak memiliki kesempatan sama sekali dulu.
Anda bisa membaca lebih lanjut pada Sebuah analisa dari degradasi protokol anonim, Mempertahankan komunikasi anonim terhadap serangan login pasif, dan khususnya Menemukan server tersembunyi.
Membatasi node masuk Anda mungkin akan membantu Anda terhadap penyerang yang ingin menjalankan beberapa node Tor dan dengan mudah mengenumerasi semua alamat IP pengguna Tor. (Meskipun mereka tidak bisa mempelajari destinasi mana pengguna berbicara, mereka masih bisa melakukan hal-hal buruk dengan beberapa daftar pengguna.) Namun, fitur tersebut tidak akan benar-benar berguna sebelum kami berpindah ke desain "directory guard" juga.
Beritahu saya mengenai semua kunci yang Tor gunakan
Tor menggunakan beberapa variasi kunci berbeda, dengan tiga tujuan di pikiran: 1) enkripsi untuk memastikan privasi data dalam jaringan Tor, 2) autentikasi sehingga klien tahu mereka berbicara dengan relay yang mereka ingin ajak bicara, dan 3) signature untuk memastikan semua klien mengetahui set relay yang sama.
Enkripsi: pertama, semua koneksi dalam Tor menggunakan enkripsi tautan TLS, sehingga pengawas tidak bisa melihat ke dalam untuk melihat sirkuit mana dimaksudkan untuk sebuah sel. Lebih jauh lagi, klien Tor mendirikan sebuah kunci enkripsi tidak kekal dengan setiap relay dalam sirkuit; lapisan enkripsi extra ini artinya hanya relay keluar yang bisa membaca sel. Kedua sisi membuang kunci sirkuit saat sirkuit berakhir, jadi mencatat lalu-lintas dan lalu merusak masuk ke dalam relay untuk mencari tahu kuncinya tidak akan bekerja.
Autentikasi: Setiap relai Tor memiliki kunci dekripsi publik yang disebut "kunci onion". Setiap relai merotoasi kunci onion-nya sekali dalam seminggu. Ketika klien Tor membuat sirkuit, pada setiap langkah ia menuntut agar relai Tor membuktikan pengetahuan terhadap kunci onion-nya. Dengan cara tersebut node pertama di jalur tidak akan bisa menspoof jalur lainnya. Because the Tor client chooses the path, it can make sure to get Tor's "distributed trust" property: no single relay in the path can know about both the client and what the client is doing.
Koordinasi: Bagaimana klien mengetahui apa itu relai, dan bagaimana mereka tahu bahwa mereka memiliki kunci yang tepat untuk mereka? Setiap relai memiliki kunci penandatanganan publik jangka panjang yang disebut "kunci identitas". Setiap otoritas direktori juga memiliki "kunci penandatanganan direktori". Otoritas direktori menyediakan daftar yang ditandatangani dari semua relai yang dikenal, dan dalam daftar itu ada satu set sertifikat dari setiap relai (ditandatangani sendiri oleh kunci identitas mereka) menentukan kunci mereka, lokasi, kebijakan keluar, dan sebagainya. Jadi, kecuali jika musuh dapat mengontrol sebagian besar otoritas direktori (mulai tahun 2021 ada 10 otoritas direktori), mereka tidak dapat menipu klien Tor untuk menggunakan relai Tor lainnya.
Bagaimana klien mengetahui apa itu otoritas direktori?
Perangkat lunak Tor dilengkapi dengan daftar lokasi dan kunci publik bawaan untuk setiap otoritas direktori. Jadi satu-satunya cara untuk mengelabui pengguna agar menggunakan jaringan Tor palsu adalah dengan memberi mereka versi perangkat lunak yang dimodifikasi secara khusus.
Bagaimana pengguna tahu bahwa mereka memiliki perangkat lunak yang tepat?
Saat kami mendistribusikan kode sumber atau paket, kami menandatanganinya secara digital dengan GNU Privacy Guard. See the instructions on how to check Tor Browser's signature.
In order to be certain that it's really signed by us, you need to have met us in person and gotten a copy of our GPG key fingerprint, or you need to know somebody who has. If you're concerned about an attack on this level, we recommend you get involved with the security community and start meeting people.
Seberapa sering Tor mengganti jalur Anda?
Tor akan menggunakan kembali sirkuit yang sama untuk aliran TCP baru selama 10 menit, selama sirkuit berfungsi dengan baik. (Jika sirkuit gagal, Tor akan segera beralih ke sirkuit baru.)
Tetapi perhatikan bahwa satu aliran TCP (misalnya koneksi IRC yang panjang) akan tetap berada di sirkuit yang sama selamanya. Kami tidak memutar-mutar aliran individu dari satu sirkuit ke sirkuit berikutnya. Sebaliknya, musuh dengan pandangan sebagian dari jaringan akan diberikan banyak kesempatan dari waktu ke waktu untuk menghubungkan Anda ke tujuan Anda, bukan hanya satu kesempatan.
Tor Browser
Bagaimana memverifikasi tanda tangan Tor Browser?
Tandatangan digital adalah proses yang memastikan paket tertentu memang diterbitkan oleh pengembangnya dan tidak dirusak. Di bawah ini kami menjelaskan mengapa itu penting dan bagaimana memverifikasi bahwa Tor Browser yang Anda unduh adalah yang kami buat dan belum dimodifikasi oleh beberapa penyerang.
Setiap file di halaman unduhan kami disertai dengan file berlabel "tanda tangan" dengan nama yang sama dengan paket dan tambahan ".asc". File .asc ini adalah tanda tangan OpenPGP. Mereka memperbolehkan Anda untuk memverifikasi berkas yang telah diunduh adalah sama persis dengan apa yang kami ingin Anda terima. This will vary by web browser, but generally you can download this file by right-clicking the "signature" link and selecting the "save file as" option.
Misalnya, torbrowser-install-win64-9.0_en-US.exe
disertai dengan torbrowser-install-win64-9.0_en-US.exe.asc
.
Ini adalah contoh nama berkas dan tidak akan sama persis dengan nama berkas yang Anda unduh.
Kami sekarang menunjukkan bagaimana Anda dapat memverifikasi tandatangan digital di berkas yang diunduh pada sistem operasi yang berbeda. Harap perhatikan bahwa tanda tangan diberi tanggal saat paket telah ditandatangani. Oleh karena itu setiap kali berkas baru diunggah, tanda tangan baru dibuat dengan tanggal yang berbeda. Selama Anda telah memverifikasi tanda tangan, Anda tidak perlu khawatir bahwa tanggal yang dilaporkan mungkin berbeda.
memasang GnuPG
Pertama-tama Anda harus memasang GnuPG sebelum Anda dapat memverifikasi tanda tangan.
Untuk pengguna Windows:
Jika Anda menggunakan Windows, unduh Gpg4win dan jalankan pemasangnya.
Untuk memverifikasi tanda tangan, Anda perlu mengetik beberapa perintah di baris perintah windows, cmd.exe
.
Untuk pengguna macOS:
Jika Anda menggunakan macOS, Anda dapat memasang GPGTools.
Untuk memverifikasi tanda tangan, Anda perlu mengetikkan beberapa perintah di Terminal (di bawah "Aplikasi").
Untuk pengguna GNU/Linux:
Jika Anda menggunakan GNU/Linux, maka Anda mungkin sudah memiliki GnuPG di sistem Anda, karena sebagian besar distribusi GNU/Linux sudah dipasang sebelumnya.
Untuk memverifikasi tanda tangan, Anda perlu mengetik beberapa perintah di jendela terminal. Cara melakukannya akan bervariasi tergantung pada distribusi Anda.
Mengambil kunci Pengembang Tor
Tim Tor Browser menandatangani rilis Tor Browser Impor kunci penandatanganan Pengembang Browser Tor (0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290):
# gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org
Ini akan menunjukkan kepada Anda sesuatu seperti:
gpg: key 4E2C6E8793298290: public key "Tor Browser Developers (signing key) <torbrowser@torproject.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
pub rsa4096 2014-12-15 [C] [kadaluarsa: 2025-07-21]
EF6E286DDA85EA2A4BA7DE684E2C6E8793298290
uid [ unknown] Tor Browser Developers (signing key) <torbrowser@torproject.org>
sub rsa4096 2018-05-26 [S] [expires: 2020-12-19]
Jika Anda mendapatkan pesan galat, ini artinya terjadi suatu masalah dan Anda tidak dapat melanjutkan sampai Anda mengetahui mengapa ini tidak berhasil. Anda mungkin dapat mengimpor kunci menggunakan bagian Solusi (menggunakan kunci publik) sebagai gantinya.
Setelah mengimpor kunci, Anda dapat menyimpannya ke berkas (mengidentifikasi dengan sidik jari di sini):
gpg --output ./tor.keyring --export 0xEF6E286DDA85EA2A4BA7DE684E2C6E8793298290
Perintah ini menghasilkan kunci yang disimpan ke berkas yang ditemukan di jalur ./tor.keyring
, yaitu di direktori saat ini.
Jika ./tor.keyring
tidak ada setelah menjalankan perintah ini, ada yang salah dan Anda tidak dapat melanjutkan sampai Anda mengetahui mengapa ini tidak berhasil.
Memverifikasi tanda tangan
Untuk memverifikasi tanda tangan paket yang Anda unduh, Anda perlu mengunduh berkas tanda tangan ".asc" yang sesuai serta berkas pemasang itu sendiri, dan memverifikasinya dengan perintah yang meminta GnuPG untuk memverifikasi berkas yang Anda unduh.
Contoh di bawah ini mengasumsikan bahwa Anda mengunduh dua berkas ini ke folder "Unduhan". Perhatikan bahwa perintah ini menggunakan contoh nama berkas dan milik Anda akan berbeda: Anda akan mengunduh versi yang berbeda dari 9.0 dan Anda mungkin tidak memilih versi bahasa Inggris (en-US).
Untuk pengguna Windows:
gpgv --keyring .\tor.keyring Downloads\torbrowser-install-win64-9.0_en-US.exe.asc Downloads\torbrowser-install-win64-9.0_en-US.exe
Untuk pengguna macOS:
gpgv --keyring ./tor.keyring ~/Downloads/TorBrowser-9.0-osx64_en-US.dmg.asc ~/Downloads/TorBrowser-9.0-osx64_en-US.dmg
Untuk pengguna GNU/Linux (ubah 64 menjadi 32 jika Anda memiliki paket 32-bit):
gpgv --keyring ./tor.keyring ~/Downloads/tor-browser-linux64-9.0_en-US.tar.xz.asc ~/Downloads/tor-browser-linux64-9.0_en-US.tar.xz
Hasil dari perintah harus menghasilkan sesuatu seperti ini:
gpgv: Signature made 07/08/19 04:03:49 Pacific Daylight Time
gpgv: using RSA key EB774491D9FF06E2
gpgv: Good signature from "Tor Browser Developers (signing key) <torbrowser@torproject.org>"
Jika Anda mendapatkan galat kesalahan yang berisi 'Tidak ada berkas atau direktori seperti itu', kemungkian ada yang salah dengan salah satu langkah sebelumnya, atau Anda lupa bahwa perintah ini menggunakan contoh nama berkas dan milik Anda akan sedikit berbeda.
Workaround (menggunakan kunci publik)
Jika Anda menemukan kesalahan yang tidak dapat Anda perbaiki, silakan unduh dan gunakan kunci publik ini sebagai gantinya. Atau, Anda dapat menggunakan perintah berikut:
# curl -s https://openpgpkey.torproject.org/.well-known/openpgpkey/torproject.org/hu/kounek7zrdx745qydx6p59t9mqjpuhdf |gpg --import -
Kunci Tor Browser Developer juga tersedia di keys.openpgp.org dan dapat diunduh melalui https://keys.openpgp.org/vks/v1/by-fingerprint/EF6E286DDA85EA2A4BA7DE684E2C6E8793298290.
Jika Anda menggunakan MacOS atau GNU/Linux, kuncinya juga dapat diambil dengan menjalankan perintah berikut:
$ gpg --keyserver keys.openpgp.org --search-keys torbrowser@torproject.org
Anda mungkin juga ingin mempelajari lebih lanjut tentang GnuPG.
Bagaimana cara memasang Tor Browser?
Please see the Installation section in the Tor Browser Manual.
Bagaimana cara mencopot pemasangan Tor Browser?
Please see the Uninstalling section in the Tor Browser Manual.
Bagaimana cara untuk memperbarui Tor Browser?
Please see the Updating section in the Tor Browser Manual.
Saya mengunduh dan memasang Tor Browser untuk Windows, tapi sekarang saya tidak dapat menemukan programnya.
File yang Anda download dan jalankan akan meminta Anda untuk sebuah destinasi. Jika Anda tidak ingat destinasi tersebut, itu adalah kemungkinan unduhan atau Desktop folder.
Pengaturan bawaan di pemasang Windows juga membuat pintasan untuk Anda di Desktop, meskipun perlu diketahui bahwa Anda mungkin tidak sengaja membatalkan pilihan untuk membuat pintasan.
Jika Anda tidak dapat menemukannya di salah satu folder tersebut, download lagi dan cari prompt yang meminta Anda untuk memilih direktori untuk men-download itu. Pilih lokasi direktori yang Anda akan ingat dengan mudah, dan setelah download selesai Anda akan melihat folder Tor Browser yang ada.
Apa masalah-masalah paling umum pada versi stabil termutakhir di Tor Browser?
Setiap kali kami merilis versi stabil baru Tor Browser, kami menulis posting blog yang merinci fitur-fiturnya yang baru dan masalah yang diketahui. Jika Anda mulai mengalami masalah dengan Tor Browser setelah pembaruan, lihat blog.torproject.org untuk melihat postingan tentang Tor Browser stabil yang terbaru untuk melihat apakah masalah Anda ada pada daftar. Jika masalah Anda tidak tercantum di sana, mohon periksa pelacak masalah Tor Browser dan buat isu GitLab tentang apa yang Anda alami.
Saya memerlukan Tor Browser dalam bahasa selain bahasa Inggris.
We want everyone to be able to enjoy Tor Browser in their own language. Tor Browser is now available in 36 different languages, and we are working to add more. Want to help us translate? Become a Tor translator!
You can also help us in testing the next languages we will release, by installing and testing Tor Browser Alpha releases.
Apakah ada versi berbayar dari Tor Browser?
Tidak, Tor Browser adalah perangkat lunak bersumber terbuka dan gratis. Peramban apa pun yang memaksa Anda untuk membayar dan mengklaim sebagai Tor Browser adalah palsu. Untuk memastikan Anda mengunduh Tor Browser yang benar, kunjungi [halaman unduhan] kami (https://www.torproject.org/download/). Setelah mengunduh, Anda dapat memastikan bahwa Anda memiliki versi resmi Tor Browser dengan memverifikasi tanda tangan. Jika Anda tidak dapat mengakses situs web kami, kunjungi bagian penyensoran untuk mendapatkan informasi tentang cara alternatif mengunduh Tor Browser.
Anda dapat melaporkan Browser Tor palsu melalui frontdesk@torproject.org
Tor Browser tersedia di platform atau sistem operasi apa saja?
Tor Browser saat ini tersedia di Windows, Linux dan macOS
Juga ada versi Tor Browser untuk Android dan The Guardian Project juga menyediakan aplikasi Orbot untuk merutekan aplikasi lain di perangkat Android Anda melalui jaringan Tor.
Belum ada versi resmi Tor untuk iOS sampai sekarang, namun kami merekomendasikan Onion Browser.
Apakah saya bisa menggunakan Tor Browser untuk Chrome OS?
Sayangnya, kami belum memiliki versi Tor Browser untuk Chrome OS. You could run Tor Browser for Android on Chrome OS. Note that by using Tor Mobile on Chrome OS, you will view the mobile (not desktop) versions of websites. However, because we have not audited the app in Chrome OS, we don't know if all the privacy features of Tor Browser for Android will work well.
Apakah ada dukungan untuk BSD?
Maaf, saat ini tidak ada dukungan resmi Tor Browser untuk *BSD. There is something called the TorBSD project, but their Tor Browser is not officially supported.
Bagaimana saya dapat membuat Tor berjalan lebih cepat? Adalah Tor Browser lebih lambat dari peramban lain?
Tor Browser kadang-kadang lebih lambat dari peramban lain. The Tor network has over a million daily users, and just over 6000 relays to route all of their traffic, and the load on each server can sometimes cause latency. And, by design, your traffic is bouncing through volunteers' servers in various parts of the world, and some bottlenecks and network latency will always be present. You can help improve the speed of the network by running your own relay, or encouraging others to do so. For the much more in-depth answer, see Roger's blog post on the topic and Tor's Open Research Topics: 2018 edition about Network Performance. Walaupun begitu, Tor sekarang jauh lebih cepat daripada sebelumnya dan Anda mungkin tidak benar-benar melihat perubahan kecepatan dari peramban lain.
What is the difference between using Tor Browser and 'Incognito mode' or private tabs?
While the names may imply otherwise, 'Incognito mode' and 'private tabs' do not make you anonymous on the Internet. They erase all the information on your machine relating to the browsing session after they are closed, but have no measures in place to hide your activity or digital fingerprint online. This means that an observer can collect your traffic just as easily as any regular browser.
Tor Browser offers all the amnesic features of private tabs while also hiding the source IP, browsing habits and details about a device that can be used to fingerprint activity across the web, allowing for a truly private browsing session that's fully obfuscated from end-to-end.
For more information regarding the limitations of Incognito mode and private tabs, see Mozilla's article on Common Myths about Private Browsing.
Apakah saya dapat membuat Tor Browser menjadi peramban standar saya?
There are methods for setting Tor Browser as your default browser, but those methods may not work always or in every operating system. Tor Browser bekerja keras untuk mengisolasi diri dari seluruh sistem Anda, dan langkah-langkah untuk membuat default browser tidak dapat diandalkan. This means sometimes a website would load in the Tor Browser, and sometimes it would load in another browser. This type of behavior can be dangerous and break anonymity.
Apakah saya bisa menggunakan Tor dengan peramban selain Tor Browser?
Kami sangat menyarankan untuk tidak menggunakan Tor di browser apapun selain Tor Browser. Menggunakan Tor di browser lain dapat membuat Anda rentan tanpa perlindungan privasi browser Tor.
Dapatkah saya menggunakan browser lain, seperti Chrome atau Firefox, ketika saya menggunakan Tor Browser?
Anda bisa menggunakan browser lain saat Anda juga menggunakan Tor Browser. Namun, Anda harus tahu bahwa fitur privasi Tor Browser tidak akan hadir di dalam browser lainnya. Hati-hati ketika beralih bolak-balik antara Tor dan browser yang kurang aman, karena Anda mungkin secara tidak sengaja menggunakan browser lain untuk sesuatu yang Anda dimaksudkan untuk Tor.
Apakah aman untuk menjalankan Tor Browser dan peramban lain dalam waktu bersamaan?
Jika Anda menjalankan Tor Browser dan browser lain pada saat yang sama, tidak akan mempengaruhi kinerja atau privasi Tor. Namun, ketahuilah bahwa browser Anda yang lain tidak menjaga kerahasiaan aktivitas Anda, dan Anda mungkin lupa dan secara tidak sengaja menggunakan browser non-pribadi tersebut untuk melakukan sesuatu yang ingin Anda lakukan di Tor Browser.
Apakah Tor Browser melindungi aplikasi lain di komputer saya?
Hanya lalu lintas Tor Browser akan diarahkan melalui jaringan Tor. Aplikasi lain pada sistem Anda (termasuk browser lain) tidak akan diarahkan melalui jaringan Tor, dan akan tidak dilindungi. Mereka perlu secara terpisah dikonfigurasi untuk menggunakan Tor. If you need to be sure that all traffic will go through the Tor network, take a look at the Tails live operating system which you can start on almost any computer from a USB stick or a DVD.
Apakah saya dapat menjalankan lebih dari satu Tor Browser?
Kami tidak merekomendasikan menjalankan beberapa Tor browser secara bersamaan, dan ini mungkin tidak bekerja seperti yang diantisipasi pada banyak platform.
Kenapa Tor Browser menyatakan sesuatu tentang Firefox tidak berfungsi?
Tor Browser is built using Firefox ESR, so errors regarding Firefox may occur. Pastikan tidak ada Tor browser lain sedang berjalan, dan bahwa Anda telah mengekstrak Tor Browser di lokasi yang pengguna memiliki izin yang sesuai. If you are running an anti-virus, please see My antivirus/malware protection is blocking me from accessing Tor Browser, it is common for anti-virus/anti-malware software to cause this type of issue.
Kenapa Tor Browser dibangun dari Firefox dan bukan peramban lain?
Tor Browser adalah versi modifikasi dari Firefox yang khusus dirancang untuk digunakan dengan Tor. Banyak pekerjaan telah dimasukkan ke dalam membuat Tor Browser, termasuk penggunaan tambahan patch untuk meningkatkan privasi dan keamanan. Meskipun secara teknis mungkin menggunakan Tor dengan browser lain, Anda dapat membuka diri terhadap serangan potensial atau kebocoran informasi, sehingga kami sangat melarang itu. Learn more about the design of Tor Browser.
Bagaimana cara mengekspor dan mengimpor penanda di Tor Browser?
Penanda di Tor Browser dapat diekspor, diimpor, dicadangkan, dipulihkan, serta diimpor dari peramban lain. Untuk mengelola penanda Anda di Tor Browser, buka:
- Menu Hamburger >> Pustaka >> Penanda >> Tampilkan Semua Penanda (di bawah menu)
- Dari bilah alat di jendela Pustaka, klik Impor dan Backup
Jika Anda ingin mengekspor penanda
- Choose Export Bookmarks to HTML
- In the Export Bookmarks File window that opens, choose a location to save the file, which is named bookmarks.html by default. The desktop is usually a good spot, but any place that is easy to remember will work.
- Click the Save button. The Export Bookmarks File window will close.
- Close the Library window.
Your bookmarks are now successfully exported from Tor Browser. The bookmarks HTML file you saved is now ready to be imported into another web browser.
If you wish to import bookmarks
- Choose Import Bookmarks from HTML
- Within the Import Bookmarks File window that opens, navigate to the bookmarks HTML file you are importing and select the file.
- Klik tombol Buka. Jendela Impor Berkas Penanda akan ditutup.
- Close the Library window.
Penanda dalam berkas HTML yang dipilih akan ditambahkan ke Tor Browser Anda di dalam direktori Menu Penanda.
Jika Anda ingin membuat backup
- Pilih Backup
- Jendela baru terbuka dan Anda harus memilih lokasi untuk menyimpan berkas. File memiliki extension .json.
Jika Anda ingin memulihkan
- Pilih Pulihkan lalu pilih berkas bookmark yang ingin Anda pulihkan.
- Click okay to the pop up box that appears and hurray, you just restored your backup bookmark.
Impor data dari peramban lain
Bookmarks can be transferred from Firefox to Tor Browser. There are two ways to export and import bookmarks in Firefox: HTML file or JSON file. After exporting the data from the browser, follow the above step to import the bookmark file into your Tor Browser.
Note: Currently, on Tor Browser for Android, there is no good way to export and import bookmarks. Bug #31617
Bagaimana cara melihat pesan log di Tor Browser?
When you have Tor Browser open, you can navigate to the hamburger menu ("≡"), then click on "Preferences", and finally on "Tor" in the side bar. Di bagian bawah halaman, di sebelah teks "Lihat log Tor", klik tombol "Lihat Log...". You should see an option to copy the log to your clipboard, which you will be able to paste it into a text editor or an email client.
Atau, pada GNU/Linux, untuk melihat log langsung di terminal, navigasikan ke direktori Tor Browser dan luncurkan Tor Browser dari baris perintah dengan menjalankan:
./start-tor-browser.desktop --verbose
or to save the logs to a file (default: tor-browser.log)
./start-tor-browser.desktop --log [file]
Apa itu bilah abu-abu pada jendela Tor Browser yang ukurannya telah diubah?
Tor Browser dalam mode bawaannya dimulai dengan jendela konten yang dibulatkan ke kelipatan 200px x 100px untuk mencegah sidik jari pada dimensi layar. Strateginya di sini adalah untuk menempatkan semua pengguna dalam beberapa "bucket" untuk membuatnya lebih sulit untuk memilih mereka. Sejauh ini, hal tersebut berfungsi hingga pengguna mulai mengubah ukuran jendela mereka (misalnya dengan memaksimalkannya atau masuk ke mode layar penuh). Tor Browser juga dilengkapi dengan pertahanan sidik jari untuk skenario tersebut, yang disebut Letterboxing, sebuah teknik yang dikembangkan oleh Mozilla dan disajikan pada tahun 2019. It works by adding white margins to a browser window so that the window is as close as possible to the desired size while users are still in a couple of screen size buckets that prevent singling them out with the help of screen dimensions.
Dengan kata sederhana, teknik ini membuat grup pengguna dengan ukuran layar tertentu dan ini membuat lebih sulit untuk memilih pengguna berdasarkan ukuran layar, karena banyak pengguna akan memiliki ukuran layar yang sama.
Situs web kami diblokir sensor. Apakah Tor Browser dapat membantu pengguna kami dalam meng-akses situs web kami?
Tor Browser tentu-saja dapat membantu dalam meng-akses situs web Anda, dari tempat dimana terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan untuk pengelakan sensor, salah-satunya termasuk pluggable transport.
Untuk info lebih lanjut, silakan baca bagian Panduan untuk pengguna Tor Browser dibagian penyensoran.
Sebuah situs web yang saya tuju menghalangi akses Tor.
Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:
Halo! Saya berusaha melakukan akses terhadap situs xyz.com Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke xyz.com. Terima kasih!
Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).
Jika Anda tidak dapat terhubung ke layanan onion, silakan lihat Saya tidak dapat menjangkau X.onion!.
Sebuah situs web yang saya tuju menghalangi akses Tor.
Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:
Halo! Saya berusaha melakukan akses terhadap situs xyz.com Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke xyz.com. Terima kasih!
Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).
Jika Anda tidak dapat terhubung ke layanan onion, silakan lihat Saya tidak dapat menjangkau X.onion!.
A website (bank, email provider, etc.) locks me out whenever I use Tor, what can I do?
Tor Browser sering membuat koneksi Anda seakan-akan datang dari bagian dunia yang sama sekali berbeda. Sejumlah situs, seperti bank atau penyedia email mungkin saja mengartikan ini sebagai tanda bahwa akun Anda telah diretas atau terkompromikan dan mengkunci Anda dari layanan.
Satu-satunya cara untuk memecahkan masalah ini adalah dengan mematuhi prosedur yang direkomendasikan oleh situs yang dimaksud untuk menjalankan pemulihan akun atau menghubungi operator dan menjelaskan situasi Anda.
Anda mungkin mampu menghindari skenario ini jika penyedia layanan menawarkan 2-factor authentication, yang merupakan pilihan keamanan yang jauh lebih baik daripada reputasi berbasis IP. Hubungi penyedia layanan Anda dan tanya mereka jika mereka menyediakan 2FA.
Saya mengalami masalah ketika menggunakan fitur-fitur di Facebook, Twitter atau situs web lain jika menggunakan Tor Browser.
Kadang-kadang website yang banyak menggunakan JavaScript dapat memiliki masalah fungsional di Tor Browser. The simplest fix is to click on the Security icon (the small gray shield at the top-right of the screen), then click "Advanced Security Settings..." Atur keamanan Anda ke "Standar".
Perlindungan program pembasmi virus atau malware saya menghalangi saya menggunakan Tor Browser.
Sebagian besar perlindungan antivirus atau Perangkat lunak berbahaya memungkinkan pengguna untuk "mengizinkan" proses tertentu yang seharusnya diblokir. Silakan buka perangkat lunak perlindungan antivirus atau Perangkat lunak berbahaya Anda dan lihat di pengaturan untuk "daftar yang diizinkan" atau yang serupa. Selanjutnya, kecualikan proses berikut:
- Untuk Windows
- firefox.exe
- tor.exe
- obfs4proxy.exe (jika Anda menggunakan bridge)
- snowflake-client.exe
- Untuk macOS
- TorBrowser
- tor.real
- obfs4proxy (jika Anda menggunakan bridge)
- snowflake-client
Akhirnya, restart Tor Browser. Ini seharusnya memperbaiki masalah yang Anda alami. Harap dicatat bahwa beberapa klien antivirus, seperti Kaspersky, juga dapat memblokir Tor di tingkat firewall.
Tor Browser dan peringatan positif palsu antivirus
Beberapa perangkat lunak antivirus akan memunculkan peringatan malware dan/atau kerentanan saat Tor Browser diluncurkan. Jika Anda mengunduh Tor Browser dari situs web utama kami atau menggunakan GetTor, dan memverifikasinya, ini adalah positif palsu dan Anda tidak perlu khawatir. Beberapa antivirus menganggap file yang tidak dilihat oleh banyak pengguna sebagai file yang mencurigakan. Untuk memastikan bahwa program Tor yang Anda unduh adalah yang kami buat dan belum dimodifikasi oleh beberapa penyerang, Anda dapat memverifikasi tanda tangan Tor Browser. Anda mungkin juga ingin mengizinkan proses tertentu untuk mencegah antivirus memblokir akses ke Tor Browser.
Saya tidak bisa terhubung ke Tor Browser, apakah jaringan saya terkena sensor?
You might be on a network that is blocking the Tor network, and so you should try using bridges. Some bridges are built in to Tor Browser and requires only a few steps to enable it. When you open Tor Browser for the first time, click "Tor Network Settings". Under the "Bridges" section, select the checkbox "Use a bridge", and choose the "Select a built-in bridge" option. From the dropdown, select whichever pluggable transport you'd like to use. Saat Anda telah memilih pluggable transport yang ingin Anda gunakan, klik 'OK' untuk menyimpan pengaturan Anda.
Or, if you have Tor Browser running, click on "Preferences" (or "Options" on Windows) in the hamburger menu (≡) and then on "Tor" in the sidebar. Di bagian "Bridge", pilih kotak centang "Gunakan bridge", dan dari opsi "Pilih bridge bawaan", pilih transportasi apa pun yang dapat dipasang yang ingin Anda gunakan dari dropdown. Pengaturan Anda akan secara otomatis disimpan setelah Anda menutup tab.
Jika Anda memerlukan bridge lain, Anda dapat memperolehnya di situs web bridge kami. Untuk info lebih lanjut tentang bridge, silakan baca petunjuk Tor Browser.
Tor Browser tidak dapat tersambung, tapi ini tampaknya bukan akibat sensor oleh pihak lain.
Salah satu masalah yang paling umum yang menyebabkan kesalahan koneksi di Tor Browser adalah jam sistem yang keliru. Silakan pastikan jam di sistem operasi dan zona waktu diatur dengan tepat di komputer Anda. Jika ini tidak memperbaiki masalah koneksi, lihat halaman Troubleshooting di petunjuk Tor Browser.
Gmail warns me that my account may have been compromised
Sometimes, after you've used Gmail over Tor, Google presents a pop-up notification that your account may have been compromised. The notification window lists a series of IP addresses and locations throughout the world recently used to access your account.
In general, this is a false alarm: Google saw a bunch of logins from different places, as a result of running the service via Tor, and decided it was a good idea to confirm the account was being accessed by its rightful owner.
Even though this may be a byproduct of using the service via Tor, that doesn't mean you can entirely ignore the warning. It is probably a false positive, but it might not be since it is possible for someone to hijack your Google cookie.
Cookie hijacking is possible by either physical access to your computer or by watching your network traffic. In theory, only physical access should compromise your system because Gmail and similar services should only send the cookie over an SSL link. In practice, alas, it's way more complex than that.
And if somebody did steal your Google cookie, they might end up logging in from unusual places (though of course they also might not). So the summary is that since you're using Tor Browser, this security measure that Google uses isn't so useful for you, because it's full of false positives. You'll have to use other approaches, like seeing if anything looks weird on the account, or looking at the timestamps for recent logins and wondering if you actually logged in at those times.
More recently, Gmail users can turn on 2-Step Verification on their accounts to add an extra layer of security.
Google makes me solve a Captcha or tells me I have spyware installed
This is a known and intermittent problem; it does not mean that Google considers Tor to be spyware.
When you use Tor, you are sending queries through exit relays that are also shared by thousands of other users. Tor users typically see this message when many Tor users are querying Google in a short period of time. Google interprets the high volume of traffic from a single IP address (the exit relay you happened to pick) as somebody trying to "crawl" their website, so it slows down traffic from that IP address for a short time.
You can try 'change the circuit for this site' to access the website from a different IP address.
An alternate explanation is that Google tries to detect certain kinds of spyware or viruses that send distinctive queries to Google Search. It notes the IP addresses from which those queries are received (not realizing that they are Tor exit relays), and tries to warn any connections coming from those IP addresses that recent queries indicate an infection.
To our knowledge, Google is not doing anything intentionally specifically to deter or block Tor use. The error message about an infected machine should clear up again after a short time.
Can you get rid of all the Captchas?
Unfortunately, some websites deliver Captchas to Tor users, and we are not able to remove Captchas from websites. The best thing to do in these cases is to contact the website owners, and inform them that their Captchas are preventing users such as yourself from using their services.
Mengapa Google muncul dalam bahasa asing?
Google uses "geolocation" to determine where in the world you are, so it can give you a personalized experience. This includes using the language it thinks you prefer, and it also includes giving you different results on your queries.
If you really want to see Google in English you can click the link that provides that. But we consider this a feature with Tor, not a bug --- the Internet is not flat, and it in fact does look different depending on where you are. This feature reminds people of this fact.
Note that Google search URLs take name/value pairs as arguments and one of those names is "hl". If you set "hl" to "en" then Google will return search results in English regardless of what Google server you have been sent to. The changed link might look like this:
https://encrypted.google.com/search?q=online%20anonymity&hl=en
Another method is to simply use your country code for accessing Google. This can be google.be, google.de, google.us and so on.
Apakah admin jaringan saya dapat mengetahui bahwa saya sedang menggunakan Tor Browser?
Saat menggunakan Tor Browser, tidak ada yang bisa melihat situs web yang Anda kunjungi. Namun, penyedia layanan atau admin jaringan Anda mungkin dapat melihat bahwa Anda tersambung ke jaringan Tor, meskipun mereka tidak akan tahu apa yang Anda lakukan ketika Anda menggunakannya.
Saat menggunakan Tor Browser, apakah pihak lain dapat mengetahui situs web yang saya kunjungi?
Tor Browser mencegah orang lain mengetahui situs web yang Anda kunjungi. Beberapa entitas, seperti Penyedia Layanan Internet (ISP), dapat melihat bahwa Anda menggunakan Tor, tetapi mereka tidak akan tahu kemana Anda berselancar saat Anda melakukannya.
Mesin pen-cari apa yang ada di Tor Browser, dan bagaimana cara dia melindungi privasi saya?
DuckDuckGo adalah mesin pencari bawaan pada Tor Browser. DuckDuckGo does not track its users nor does it store any data about user searches. Learn more about DuckDuckGo privacy policy.
Kenapa mesin pencari Saya berubah menjadi DuckDuckGo?
Dengan rilis dari Tor Browser 6.0.6, kami beralih ke DuckDuckGo sebagai mesin pencari utama. For a while now, Disconnect, which was formerly used in Tor Browser, has had no access to Google search results. Since Disconnect is more of a meta search engine, which allows users to choose between different search providers, it fell back to delivering Bing search results, which were basically unacceptable quality-wise. DuckDuckGo does not log, collect or share the user's personal information or their search history, and therefore is best positioned to protect your privacy. Most other search engines store your searches along with other information such as the timestamp, your IP address, and your account information if you are logged in.
Saya mendapatkan masalah dalam menggunakan DuckDuckGo.
Please see the DuckDuckGo support portal. If you believe this is a Tor Browser issue, please report it on our issue tracker.
Apakah ada cara untuk mengubah alamat IP yang digunakan Tor Browser untuk situs web tertentu?
Tor Browser memiliki dua cara untuk mengubah sirkuit relay Anda — "Identitas baru" dan "Tor sirkuit Baru untuk situs ini". Both options are located in the hamburger menu ("≡"). You can also access the New Circuit option inside the site information menu in the URL bar, and the New Identity option by clicking the small sparky broom icon at the top-right of the screen.
Identitas Baru
Pilihan ini berguna jika Anda ingin mencegah aktivitas browser Anda agar tidak terhubung dengan apa yang Anda lakukan sebelumnya.
Memilihnya akan menutup semua tab dan jendela yang terbuka, menghapus semua informasi pribadi seperti cookies dan riwayat penjelajahan, dan menggunakan sirkuit Tor baru untuk semua koneksi.
Browser Tor akan memperingatkan Anda bahwa semua aktivitas dan unduhan akan dihentikan, jadi pertimbangkanlah ini sebelum mengklik "New Identity".
Sirkuit Tor Baru untuk Situs ini
Pilihan ini berguna jika relay keluar tidak dapat terhubung ke situs web, atau situsnya tidak ditampilkan dengan benar. Memilihnya akan menyebabkan tab atau jendela yang aktif saat ini akan dimuat ulang melalui sebuah sirkuit Tor yang baru.
Tabs atau jendela lain yang sedang terbuka dari website yang sama akan menggunakan sirkuit yang baru demikian juga dengan yang sedang dijalankan.
Opsi ini tidak akan menghilangkan setiap infomasi pribadi atau tidak menghubungkan aktivitas anda, tidak juga berdampak pada koneksi anda saat ini pada website yang lain.
Apakah menjalankan Tor Browser membuat komputer saya menjadi relay?
Menjalankan Tor Browser tidak membuat Anda bertindak sebagai relay dalam jaringan. Ini berarti bahwa komputer Anda tidak akan digunakan untuk merutekan lalu lintas untuk orang lain. If you'd like to become a relay, please see our Tor Relay Guide.
Kenapa alamat IP pertama di relay circuit saya selalu sama?
Itu adalah perilaku normal Tor. Relay pertama di sirkuit Anda disebut "penjaga entri" atau "penjaga". Ini adalah relay yang sangat cepat dan stabil yang tetap menjadi relay yang pertama dalam sirkuit Anda selama 2-3 bulan untuk melindungi terhadap serangan perusak anonimitas yang dikenal. Sisa sirkuit Anda berubah untuk setiap website baru setiap Anda mengunjunginya, dan semua bersama-sama relay ini memberikan perlindungan privasi lengkap Tor. For more information on how guard relays work, see this blog post and paper on entry guards.
Apakah Tor Browser menggunakan sirkuit yang berbeda untuk setiap situs web?
Di Tor Browser, setiap domain baru mendapatkan sirkuitnya sendiri. The Design and Implementation of Tor Browser document further explains the thinking behind this design.
Apakah saya dapat memilih negara sebagai exit node?
Memodifikasi cara Tor menciptakan sirkuit sangat tidak disarankan. Anda mendapatkan keamanan terbaik yang dapat diberikan Tor ketika Anda meninggalkan pilihan rute kepada Tor; mengubah node masuk/keluar dapat mengurangi anonimitas Anda. Jika hasil yang Anda inginkan adalah hanya untuk dapat mengakses sumber daya yang tersedia hanya di satu negara, Anda mungkin ingin mempertimbangkan menggunakan VPN daripada menggunakan Tor. Harap dicatat bahwa vpn tidak memiliki sifat privasi yang sama dengan Tor, tetapi mereka akan membantu memecahkan beberapa masalah pembatasan geolokasi.
I'm supposed to "edit my torrc". What does that mean?
WARNING: Do NOT follow random advice instructing you to edit your torrc
!
Doing so can allow an attacker to compromise your security and anonymity through malicious configuration of your torrc
.
Tor uses a text file called torrc
that contains configuration instructions for how Tor should behave.
The default configuration should work fine for most Tor users (hence the warning above.)
To find your Tor Browser torrc
, follow the instructions for your operating system below.
On Windows or Linux:
- The
torrc
is in the Tor Browser Data directory atBrowser/TorBrowser/Data/Tor
inside your Tor Browser directory.
Di macOS:
- The
torrc
is in the Tor Browser Data directory at~/Library/Application Support/TorBrowser-Data/Tor
. - Catatan folder Perpustakaan disembunyikan di versi macOS yang lebih baru. Untuk menavigasi ke folder ini di Finder, pilih "Go to Folder..." di menu "Go".
- Then type
~/Library/Application Support/
in the window and click Go.
Close Tor Browser before you edit your torrc
, otherwise Tor Browser may erase your modifications.
Some options will have no effect as Tor Browser overrides them with command line options when it starts Tor.
Have a look at the sample torrc
file for hints on common configurations.
For other configuration options you can use, see the Tor manual page.
Remember, all lines beginning with #
in torrc are treated as comments and have no effect on Tor's configuration.
Apakah saya harus memasang add-on atau extension baru di Tor Browser, seperti AdBlock Plus atau uBlock Origin?
Sangat tidak dianjurkan untuk memasang add-on baru di Tor Browser karena mereka dapat membahayakan privasi dan keamanan Anda.
Menginstal add-on baru dapat memengaruhi Tor Browser dengan cara yang tidak terduga dan berpotensi menjadikan Tor Browser Anda memiliki kode fingerprint/sidi-kjari atau identitas unik. Jika Tor Browser Anda memiliki kode fingerprint/sidik-jari unik, kegiatan browsing Anda dapat dikenali dan dilacak meskipun Anda menggunakan Tor Browser.
Pada dasarnya, setiap pengaturan dan fitur pada browser menghasilkan apa yang disebut "browser fingerprint" atau dapat disebut "kode sidik-jari browser". Sebagian besar browser secara tidak sengaja menciptakan kode fingerprint/sidik-jari unik untuk masing-masing pengguna, yang menjadikan setiap masing-masing penggunanya dapat dikenali dan dilacak di dalam internet. Tor Browser is specifically engineered to have a nearly identical (we're not perfect!) fingerprint across its users. Ini artinya, setiap pengguna Tor Browser terlihat seperti setiap pengguna Tor Browser lainnya, sehingga menjadikannya sulit untuk dapat melacak kegiatan dari satu individu pengguna.
Disanapun juga terdapat peluang bahwa sebuah add-on baru, akan meningkatkan timbulnya serangan terhadap Tor Browser. Ini dapat memungkinkan bocornya data sensitif atau memungkinkan penyerang untuk dapat menginfeksi Tor Browser. Sebuah add-on itu sendiri pun bahkan bisa dirancang jahat untuk memata-matai Anda.
Tor Browser sendiri telah memiliki dua add-ons bawaan terinstall — HTTPS Everywhere dan NoScript — dan menambahkan hal lain dapat saja merusak anomimisitas Anda.
Ingin mempelajari lebih lanjut tentang fingerprinting? Berikut ini adalah artikel di dalam The Tor Blog all about it.
Apakah saya dapat menggunakan flash di Tor Browser?
Flash is disabled in Tor Browser, and we recommend you to not enable it. Kami tidak berpikir Flash aman untuk digunakan dalam browser apapun — ini adalah software yang sangat tidak aman yang dengan mudah dapat membahayakan privasi Anda atau memberikan malware kepada Anda. Untungnya, sebagian besar situs web, perangkat, dan peramban lain menjauh dari penggunaan Flash.
My internet connection requires an HTTP or SOCKS Proxy
If you're using Tor Browser, you can set your proxy's address, port, and authentication information in the Network Settings.
If you're using Tor another way, you can set the proxy information in your torrc file. Check out the HTTPSProxy
config option in the manual page. If your proxy requires authentication, see the HTTPSProxyAuthenticator
option. Example with authentication:
HTTPSProxy 10.0.0.1:8080
HTTPSProxyAuthenticator myusername:mypass
We only support Basic auth currently, but if you need NTLM authentication, you may find this post in the archives useful.
For using a SOCKS proxy, see the Socks4Proxy
, Socks5Proxy
, and related torrc options in the manual page. Using a SOCKS 5 proxy with authentication might look like this:
Socks5Proxy 10.0.0.1:1080
Socks5ProxyUsername myuser
Socks5ProxyPassword mypass
If your proxies only allow you to connect to certain ports, look at the entry on Firewalled clients for how to restrict what ports your Tor will try to access.
My firewall only allows a few outgoing ports
If your firewall works by blocking ports, then you can tell Tor to only use the ports when you start your Tor Browser. Or you can add the ports that your firewall permits by adding "FascistFirewall 1" to your torrc configuration file. By default, when you set this Tor assumes that your firewall allows only port 80 and port 443 (HTTP and HTTPS respectively). You can select a different set of ports with the FirewallPorts torrc option. If you want to be more fine-grained with your controls, you can also use the ReachableAddresses config options, e.g.:
ReachableDirAddresses *:80
ReachableORAddresses *:443
Saya mendapatkan masalah dalam menggunakan HTTPS Everywhere.
Please see the HTTPS Everywhere FAQ. If you believe this is a Tor Browser issue, please report it on our issue tracker.
Kenapa JavaScript diaktifkan di Tor Browser?
Kami mengonfigurasi NoScript untuk mengizinkan JavaScript secara default di Tor Browser karena banyak situs web tidak akan berfungsi dengan JavaScript dinonaktifkan. Sebagian besar pengguna akan meninggalkan Tor jika JavaScript dimatikan secara default karena akan menyebabkan banyak masalah bagi mereka. Pada akhirnya, kami ingin membuat Tor Browser seaman mungkin sementara juga membuat bermanfaat bagi sebagian orang, jadi untuk sekarang, ini berarti membuat JavaScript diaktifkan secara default.
For users who want to have JavaScript disabled on all HTTP sites by default, we recommend changing your Tor Browser's "Security Level" option. This can be done by navigating the Security icon (the small gray shield at the top-right of the screen), then clicking "Advanced Security Settings...". The "Standard" level allows JavaScript, but the "Safer" and "Safest" levels both block JavaScript on HTTP sites.
Bisakah saya memasang Tor di server pusat, dan klien saya terhubung ke sana?
Yes. Tor can be configured as a client or a relay on another machine, and allow other machines to be able to connect to it for anonymity. This is most useful in an environment where many computers want a gateway of anonymity to the rest of the world. However, be forewarned that with this configuration, anyone within your private network (existing between you and the Tor client/relay) can see what traffic you are sending in clear text. The anonymity doesn't start until you get to the Tor relay. Because of this, if you are the controller of your domain and you know everything's locked down, you will be OK, but this configuration may not be suitable for large private networks where security is key all around.
Configuration is simple, editing your torrc file's SocksListenAddress according to the following examples:
SocksListenAddress 127.0.0.1
SocksListenAddress 192.168.x.x:9100
SocksListenAddress 0.0.0.0:9100
You can state multiple listen addresses, in the case that you are part of several networks or subnets.
SocksListenAddress 192.168.x.x:9100 #eth0
SocksListenAddress 10.x.x.x:9100 #eth1
After this, your clients on their respective networks/subnets would specify a socks proxy with the address and port you specified SocksListenAddress to be. Please note that the SocksPort configuration option gives the port ONLY for localhost (127.0.0.1). When setting up your SocksListenAddress(es), you need to give the port with the address, as shown above. If you are interested in forcing all outgoing data through the central Tor client/relay, instead of the server only being an optional proxy, you may find the program iptables (for *nix) useful.
I want to run my Tor client on a different computer than my applications
By default, your Tor client only listens for applications that connect from localhost.
Connections from other computers are refused.
If you want to torify applications on different computers than the Tor client, you should edit your torrc to define SocksListenAddress 0.0.0.0
and then restart (or hup) Tor.
If you want to get more advanced, you can configure your Tor client on a firewall to bind to your internal IP but not your external IP.
Saya mendapatkan masalah dalam menggunakan NoScript.
Please see the NoScript FAQ. If you believe this is a Tor Browser issue, please report it on our bug tracker.
Tor Mobile
Bagaimana cara menjalankan Tor Browser di Windows Phone?
Saat ini tidak ada metode yang didukung untuk menjalankan Tor Browser pada Ponsel Windows lama tetapi dalam kasus ponsel bermerek/promosi Microsoft yang lebih baru, ikuti langkah yang sama pada Tor Browser di Android dapat diikuti.
Siapa itu Guardian Project?
The Guardian Project memelihara Orbot (dan aplikasi privasi lain) di Android. Info lebih lanjut dapat dibaca di situs web Guardian Project.
Apakah saya dapat menjalankan Tor Browser di alat IOS?
Kami merekomendasikan aplikasi IOS bernama Onion Browser, yang berlisensi open source, yang menggunakan jaringan Tor, dan dikembangkan oleh pihak yang bekerja-sama secara dekat dengan Tor Project. Namun, Apple mengharuskan peramban di IOS untuk menggunakan Webkit, yang menghalangi Onion Browser memiliki tingkat pelrindungan privasi yang sama dengan Tor Browser.
Pelajari lebih lanjut tentang Browser Onion. Unduh Browser Onion dari App Store.
Apakah Tor Browser dapat digunakan di perangkat Android?
Ya, ada versi Tor Browser yang tersedia khusus untuk Android. Pasang Tor Browser untuk Android untuk menggunakan Tor di perangkat Android Anda.
The Guardian Project menyediakan aplikasi Orbot yang dapat digunakan untuk merutekan aplikasi lain di perangkat Android Anda melalui jaringan Tor, namun hanya Tor Browser untuk Android yang diperlukan untuk menjelajahi web dengan Tor.
Apa yang terjadi dengan Orfox?
Dengan dirilisnya Tor Browser untuk Android Orfox telah ditarik.
Apakah saya memerlukan Tor Browser untuk Android dan Orbot, atau salah satunya?
Meskipun Tor Browser untuk Android dan Orbot sangat bagus, keduanya memiliki tujuan yang berbeda. Tor Browser untuk Android seperti Tor Browser desktop, tetapi pada perangkat seluler Anda. Ini adalah browser satu atap yang menggunakan jaringan Tor dan mencoba untuk menjadi se-anonim mungkin. Orbot di sisi lain adalah proxy yang memungkinkan Anda mengirim data dari aplikasi Anda yang lain (klien Email, aplikasi pesan instan, dll.) melalui jaringan Tor; versi Orbot juga ada di dalam Tor Browser untuk Android, dan itulah yang memungkinkannya terhubung ke jaringan Tor. That version, however, does not enable you to send other apps outside of the Tor Browser for Android through it. Tergantung pada bagaimana Anda ingin menggunakan jaringan Tor, salah satu atau keduanya bisa menjadi pilihan yang baik.
Apakah Tor Browser tersedia di F-Droid?
Akan tersedia, segera. Sementara itu, Anda dapat menggunakan F-Droid untuk mengunduh Tor Browser untuk Android dengan mengaktifkan Guardian Project's Repository.
Menghubungkan ke Tor
Saya mengalami masalah dalam terhubung ke Tor, dan saya tidak dapat mengetahui apa yang salah.
Jika Anda mengalami masalah saat menyambungkan, pesan kesalahan mungkin muncul dan Anda dapat memilih opsi untuk "menyalin log Tor ke clipboard". Lalu, salin ke Notepad atau program dokumen lain.
Jika Anda tidak melihat opsi ini dan Tor Browser Anda terbuka, Anda dapat menavigasi ke menu hamburger ("≡"), lalu klik "Preferensi", dan "Tor" di bilah samping. Di bagian bawah halaman, di sebelah teks "Lihat log Tor", klik tombol "Lihat Log...".
Atau, pada GNU/Linux, untuk melihat log langsung di terminal, navigasikan ke direktori Tor Browser dan luncurkan Tor Browser dari baris perintah dengan menjalankan:
./start-tor-browser.desktop --verbose
or to save the logs to a file (default: tor-browser.log)
./start-tor-browser.desktop --log [file]
Anda seharusnya melihat salah satu kesalahan log umum ini (cari baris berikut di log Tor Anda):
Catatan galat umum #1: Koneksi proksi gagal
2017-10-29 09:23:40.800 [NOTICE] Opening Socks listener on 127.0.0.1:9150
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 5%: Connecting to directory server
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
2017-10-29 09:24:08.900 [WARN] Proxy Client: unable to connect to xx..xxx..xxx.xx:xxxxx ("general SOCKS server failure")
Jika Anda melihat baris seperti ini, Tor gagal tersambung ke SOCKS proxy. Jika proxy SOCKS diperlukan di pengaturan jaringan Anda, silakan pastikan Anda telah memasukkan detail proxy dengan akurat. Jika proxy SOCKS tidak diperlukan, atau Anda tidak yakin bahwa proxy SOCKS diperlukan, silakan coba tanpa proxy SOCKS
Catatan galat umum #2: Tidak dapat mencapai relai penjaga
11/1/2017 21:11:43 PM.500 [NOTICE] Opening Socks listener on 127.0.0.1:9150
11/1/2017 21:11:44 PM.300 [NOTICE] Bootstrapped 80%: Connecting to the Jaringan Tor
11/1/2017 21:11:44 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
11/1/2017 21:11:44 PM.500 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop
11/1/2017 21:11:45 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
Jika Anda melihat baris seperti ini di Tor log, Tor gagal tersambung ke node pertama di Tor circuit. Ini mungkin artinya Anda berada di jaringan yang terkena sensor pihak lain.
Mohon coba lagi dengan menggunakan bridge, ini seharusnya menyelesaikan masalah ini.
Catatan galat umum #3: Gagal menyelesaikan TLS handshake
13-11-17 19:52:24.300 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
13-11-17 19:53:49.300 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 10; recommendation warn; host [host] at xxx.xxx.xxx.xx:xxx)
13-11-17 19:53:49.300 [WARN] 10 connections have failed:
13-11-17 19:53:49.300 [WARN] 9 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
13-11-17 19:53:49.300 [WARN] 1 connections died in state connect()ing with SSL state (No SSL object)
Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti Tor gagal menyelesaikan jabat tangan TLS dengan otoritas direktori. Menggunakan bridges mungkin akan memperbaiki ini.
Catatan galat umum #4: Clock skew
19.11.2017 00:04:47.400 [NOTICE] Opening Socks listener on 127.0.0.1:9150
19.11.2017 00:04:48.000 [NOTICE] Bootstrapped 5%: Connecting to directory server
19.11.2017 00:04:48.200 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
19.11.2017 00:04:48.800 [WARN] Received NETINFO cell with skewed time (OR:xxx.xx.x.xx:xxxx): It seems that our clock is behind by 1 days, 0 hours, 1 minutes, or that theirs is ahead. Tor requires an accurate clock to work: please check your time, timezone, and date settings.
Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti jam sistem Anda tidak benar. Pastikan jam Anda diatur secara akurat, termasuk sedangkan benar. Kemudian restart Tor.
Tor Browser tidak dapat tersambung, tapi ini tampaknya bukan akibat sensor oleh pihak lain.
Salah satu masalah yang paling umum yang menyebabkan kesalahan koneksi di Tor Browser adalah jam sistem yang keliru. Silakan pastikan jam di sistem operasi dan zona waktu diatur dengan tepat di komputer Anda. Jika ini tidak memperbaiki masalah koneksi, lihat halaman Troubleshooting di petunjuk Tor Browser.
Saya tidak dapat membuka X.onion!
Jika Anda tidak dapat menjangkau layanan onion yang Anda inginkan, pastikan Anda telah memasukkan 16 karakter atau, dengan format terbaru, yakni 56 karakter alamat onion dengan benar; bahkan kesalahan kecil akan menghentikan Tor Browser untuk dapat menjangkau situs tersebut. Bila anda tetap tidak dapat terhubung ke layanan onion, mohon coba kembali. Mungkin ada persoalan koneksi, atau operator situs membuatnya "offline" tanpa peringatan.
Anda juga dapat memastikan bahwa Anda dapat mengakses layanan onion lainnya dengan menghubungkan ke layanan onion DuckDuckGo.
Galat "Server proksi menolak koneksi"
Proxy server errors can occur for a variety of reasons. You may try one or more of the following activities in case you encounter this error:
- If you have an antivirus, it may be interfering with the Tor service. Disable the antivirus and restart the browser.
- You should not have moved the Tor Browser folder from its original location to a different location. If you did this, revert the change.
- You should also check the port that you are connecting with. Try a different port from the one currently in use, such as 9050 or 9150.
- When all else fails, reinstall the browser. This time, make sure to install Tor Browser in a new directory, not over a previously installed browser.
If the error persists, please get in touch with us.
Penyensoran
Bagaimana cara mengunduh Tor Browser jika torproject.org diblokir?
If you can't download Tor Browser through our website, you can get a copy of Tor Browser delivered to you via GetTor. GetTor adalah service yang yang otomatis merespon pesan berisi tautan ke versi terakhir Tor Browser, yang dihosting di lokasi beragam sehingga kemungkinan kecil disensor, seperti Dropbox, Google Drive, dan GitHub. You can also download Tor Browser from https://tor.eff.org or from https://tor.ccc.de. For more geographically specific links visit Tor: Mirrors
Menggunakan GetTor lewat email:
Kirim email ke gettor@torproject.org. In the body of the mail, write the name of your operating system (such as Windows, macOS, or Linux). GetTor will respond with an email containing links from which you can download Tor Browser, the cryptographic signature (needed for verifying the download), the fingerprint of the key used to make the signature, and the package’s checksum. Anda mungkin akan ditawari pilihan perangkat lunak "32-bit" atau "64-bit": hal ini tergantung pada model komputer yang Anda gunakan; Baca dokumentasi mengenai komputer Anda untuk mengetahui lebih lanjut.
Mengunakan GetTor melalui Twitter
GetTor via Twitter is currently under maintenance. Please use the email instead.
Situs web kami diblokir sensor. Apakah Tor Browser dapat membantu pengguna kami dalam meng-akses situs web kami?
Tor Browser tentu-saja dapat membantu dalam meng-akses situs web Anda, dari tempat dimana terblokir. Umumnya hanya unduh Tor Browser dan gunakannya untuk membuka akses situs yang terblokir. Di tempat-tempat yang mengalami sensor berat, tersedia beberapa pilihan untuk pengelakan sensor, salah-satunya termasuk pluggable transport.
Untuk info lebih lanjut, silakan baca bagian Panduan untuk pengguna Tor Browser dibagian penyensoran.
Saya mengalami masalah dalam terhubung ke Tor, dan saya tidak dapat mengetahui apa yang salah.
Jika Anda mengalami masalah saat menyambungkan, pesan kesalahan mungkin muncul dan Anda dapat memilih opsi untuk "menyalin log Tor ke clipboard". Lalu, salin ke Notepad atau program dokumen lain.
Jika Anda tidak melihat opsi ini dan Tor Browser Anda terbuka, Anda dapat menavigasi ke menu hamburger ("≡"), lalu klik "Preferensi", dan "Tor" di bilah samping. Di bagian bawah halaman, di sebelah teks "Lihat log Tor", klik tombol "Lihat Log...".
Atau, pada GNU/Linux, untuk melihat log langsung di terminal, navigasikan ke direktori Tor Browser dan luncurkan Tor Browser dari baris perintah dengan menjalankan:
./start-tor-browser.desktop --verbose
or to save the logs to a file (default: tor-browser.log)
./start-tor-browser.desktop --log [file]
Anda seharusnya melihat salah satu kesalahan log umum ini (cari baris berikut di log Tor Anda):
Catatan galat umum #1: Koneksi proksi gagal
2017-10-29 09:23:40.800 [NOTICE] Opening Socks listener on 127.0.0.1:9150
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 5%: Connecting to directory server
2017-10-29 09:23:47.900 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
2017-10-29 09:24:08.900 [WARN] Proxy Client: unable to connect to xx..xxx..xxx.xx:xxxxx ("general SOCKS server failure")
Jika Anda melihat baris seperti ini, Tor gagal tersambung ke SOCKS proxy. Jika proxy SOCKS diperlukan di pengaturan jaringan Anda, silakan pastikan Anda telah memasukkan detail proxy dengan akurat. Jika proxy SOCKS tidak diperlukan, atau Anda tidak yakin bahwa proxy SOCKS diperlukan, silakan coba tanpa proxy SOCKS
Catatan galat umum #2: Tidak dapat mencapai relai penjaga
11/1/2017 21:11:43 PM.500 [NOTICE] Opening Socks listener on 127.0.0.1:9150
11/1/2017 21:11:44 PM.300 [NOTICE] Bootstrapped 80%: Connecting to the Jaringan Tor
11/1/2017 21:11:44 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
11/1/2017 21:11:44 PM.500 [NOTICE] Bootstrapped 85%: Finishing handshake with first hop
11/1/2017 21:11:45 PM.300 [WARN] Failed to find node for hop 0 of our path. Discarding this circuit.
Jika Anda melihat baris seperti ini di Tor log, Tor gagal tersambung ke node pertama di Tor circuit. Ini mungkin artinya Anda berada di jaringan yang terkena sensor pihak lain.
Mohon coba lagi dengan menggunakan bridge, ini seharusnya menyelesaikan masalah ini.
Catatan galat umum #3: Gagal menyelesaikan TLS handshake
13-11-17 19:52:24.300 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
13-11-17 19:53:49.300 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 10; recommendation warn; host [host] at xxx.xxx.xxx.xx:xxx)
13-11-17 19:53:49.300 [WARN] 10 connections have failed:
13-11-17 19:53:49.300 [WARN] 9 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
13-11-17 19:53:49.300 [WARN] 1 connections died in state connect()ing with SSL state (No SSL object)
Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti Tor gagal menyelesaikan jabat tangan TLS dengan otoritas direktori. Menggunakan bridges mungkin akan memperbaiki ini.
Catatan galat umum #4: Clock skew
19.11.2017 00:04:47.400 [NOTICE] Opening Socks listener on 127.0.0.1:9150
19.11.2017 00:04:48.000 [NOTICE] Bootstrapped 5%: Connecting to directory server
19.11.2017 00:04:48.200 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
19.11.2017 00:04:48.800 [WARN] Received NETINFO cell with skewed time (OR:xxx.xx.x.xx:xxxx): It seems that our clock is behind by 1 days, 0 hours, 1 minutes, or that theirs is ahead. Tor requires an accurate clock to work: please check your time, timezone, and date settings.
Jika Anda melihat baris seperti ini di log Tor Anda, itu berarti jam sistem Anda tidak benar. Pastikan jam Anda diatur secara akurat, termasuk sedangkan benar. Kemudian restart Tor.
Apa itu bridge atau jembatan?
Jembatan relay adalah Tor relay yang tidak tercantum dalam direktori Tor publik.
Itu berarti bahwa ISP atau pemerintah yang berusaha untuk memblokir akses ke jaringan Tor tidak dapat memblokir semua jembatan. Jembatan berguna bagi pengguna Tor di bawah rezim yang menindas, dan bagi orang-orang yang menginginkan lapisan keamanan tambahan karena mereka khawatir seseorang akan mengenali bahwa saat mereka menghubungi alamat IP relay Tor publik.
Jembatan adalah hanya sebuah relay normal dengan konfigurasi yang sedikit berbeda. See How do I run a bridge for instructions.
Beberapa negara, termasuk Tiongkok dan Iran, telah menemukan cara untuk mendeteksi dan memblokir koneksi ke jembatan Tor. Obfsproxy bridges address this by adding another layer of obfuscation. Mengkonfigurasi sebuah jembatan obfsproxy memerlukan paket software dan konfigurasi tambahan. Lihat halaman kami pada pluggable transports untuk info lebih lanjut.
Apa itu Snowflake?
Snowflake is a pluggable transport available in Tor Browser to defeat internet censorship. Like a Tor bridge, a user can access the open internet when even regular Tor connections are censored. To use Snowflake is as easy as to switch to a new bridge configuration in Tor Browser.
This system is composed of three components: volunteers running Snowflake proxies, Tor users that want to connect to the internet, and a broker, that delivers snowflake proxies to users.
Volunteers willing to help users on censored networks can help by spinning short-lived proxies on their regular browsers. Check, how can I use Snowflake?
Snowflake uses the highly effective domain fronting technique to make a connection to one of the thousands of snowflake proxies run by volunteers. These proxies are lightweight, ephemeral, and easy to run, allowing us to scale Snowflake more easily than previous techniques.
For censored users, if your Snowflake proxy gets blocked, the broker will find a new proxy for you, automatically.
If you're interested in the technical details and specification, see the Snowflake Technical Overview and the project page.
How can I use Snowflake?
Snowflake is available in Tor Browser stable for all platforms: Windows, macOS, GNU/Linux, and Android. Anda juga dapat menggunakan Snowflake dengan Onion Browser pada iOS.
If you're running Tor Browser for desktop for the first time, you can click on 'Tor Network Settings' on the start-up screen and then select 'Use a bridge'. Click on 'Select a built-in bridge' and choose 'snowflake' from the dropdown menu. Once you've selected Snowflake, scroll up and click 'Connect' to save your settings.
From within the browser, you can click on the hamburger menu ("≡"), then go to 'Preferences' and go to 'Tor'.
Alternatively, you can also type about:preferences#tor
in the url bar. Check 'Use a bridge' and 'Select a built-in bridge'. Then select 'snowflake' from the dropdown menu.
How to help running Snowflake proxies?
If your internet access is not censored, you should consider installing the Snowflake extension to help users in censored networks. When you run Snowflake on you regular browser, you will provide connection as a proxy to an entry node in the Tor Network, and that’s all.
Tambahan
Firstly make sure you have WebRTC enabled. Then you can install this addon for Firefox or the add-on for Chrome which will let you become a Snowflake proxy. It can also inform you about how many people you have helped in the last 24 hours.
Laman web
In a browser where WebRTC is enabled: If you don't want to add Snowflake to your browser, you can go to https://snowflake.torproject.org/embed and toggle the button to opt in to being a proxy. You shouldn't close that page if you want to remain a Snowflake proxy.
Saya tidak bisa terhubung ke Tor Browser, apakah jaringan saya terkena sensor?
You might be on a network that is blocking the Tor network, and so you should try using bridges. Some bridges are built in to Tor Browser and requires only a few steps to enable it. When you open Tor Browser for the first time, click "Tor Network Settings". Under the "Bridges" section, select the checkbox "Use a bridge", and choose the "Select a built-in bridge" option. From the dropdown, select whichever pluggable transport you'd like to use. Saat Anda telah memilih pluggable transport yang ingin Anda gunakan, klik 'OK' untuk menyimpan pengaturan Anda.
Or, if you have Tor Browser running, click on "Preferences" (or "Options" on Windows) in the hamburger menu (≡) and then on "Tor" in the sidebar. Di bagian "Bridge", pilih kotak centang "Gunakan bridge", dan dari opsi "Pilih bridge bawaan", pilih transportasi apa pun yang dapat dipasang yang ingin Anda gunakan dari dropdown. Pengaturan Anda akan secara otomatis disimpan setelah Anda menutup tab.
Jika Anda memerlukan bridge lain, Anda dapat memperolehnya di situs web bridge kami. Untuk info lebih lanjut tentang bridge, silakan baca petunjuk Tor Browser.
How to circumvent the Great Firewall and connect to Tor from China?
Users in China need to take a few steps to circumvent the Great Firewall and connect to the Tor network. First, get an updated version of Tor Browser: send an email to gettor@torproject.org with the subject "windows zh-cn" or other operating system (linux or macos)
After installing Tor Browser, you will probably not be able to connect directly to the Tor network, because the Great Firewall is blocking Tor. Therefore, the second step will be to obtain a bridge that works in China.
There are three options to unblock Tor in China:
- Snowflake: uses ephemeral proxies to connect to the Tor network. It's available in Tor Browser stable version (Desktop and Android). You can select Snowflake from Tor Browser's built-in bridge dropdown.
- Private and unlisted obfs4 bridges: users will need to request a private bridge to frontdesk@torproject.org with the phrase "private bridge" in the subject of the email or, if they are tech-savvy, they can run their own obfs4 bridge from outside China. It's important to note that bridges distributed by BridgeDB (HTTPS, email), and built-in obfs4 bridges bundled in Tor Browser most likely won't work.
- meek-azure: it looks like you are browsing a Microsoft website instead of using Tor. However, because it has a bandwidth limitation, this option will be quite slow. You can select meek-azure from Tor Browser's built-in bridges dropdown.
If one of these options below is not working, check your Tor logs and try another option.
Sebuah situs web yang saya tuju menghalangi akses Tor.
Kadang beberapa situs web memblokir pengguna Tor karena tidak dapat membedakan pengguna Tor biasa dan lalu-lintas otomatis. Hal terbaik yang dapat dilakukan adalah pengguna menghubungi langsung admin situsnya. Ini mungkin dapat menjadi contoh:
Halo! Saya berusaha melakukan akses terhadap situs xyz.com Anda melalui Tor Browser dan ternyata Anda tidak mengizinkan pengguna Tor untuk melakukan akses terhadap situs Anda. Saya mohon dengan sangat untuk mempertimbangkan hal ini; Tor digunakan orang-orang di seluruh dunia untuk melindungi privasi mereka dan melawan sensor. Dengan memblokir pengguna Tor, Anda akan memblokir orang-orang di negara-negara represif yang ingin menggunakan Internet secara bebas, wartawan, dan peneliti yang ingin melindungi diri sendiri dari penemuan, termasuk whistleblower, aktivis, dan orang-orang biasa yang ingin terbebas dari pelacakan menyeluruh yang dilakukan pihak lain. Mohon dukungan penuh terhadap privasi digital dan kebebasan Internet, dan izinkan pengguna Tor untuk melakukan akses ke xyz.com. Terima kasih!
Untuk situs web perbankan dan situs web lain yang sensitif, umumnya ada pemblokiran berdasarkan wilayah geografis (jika bank Anda mengetahui Anda biasanya melakukan akses terhadap jasa mereka dari suatu negara dan jika tiba-tiba Anda membuka situs web mereka dari exit relay di negara lain, akun Anda mungkin akan dikunci atau dibekukan).
Jika Anda tidak dapat terhubung ke layanan onion, silakan lihat Saya tidak dapat menjangkau X.onion!.
HTTPS
Saat saya menggunakan Tor, akankah pihak-pihak yang menguping melihat informasi yang saya bagikan di situs-situs, seperti informasi login dan hal-hal yang saya masukkan ke dalam formulir?
Tor mencegah penyadap dari mengetahui situs yang Anda kunjungi. Namun, informasi yang dikirim tidak terenkripsi melalui internet dengan menggunakan HTTP polos masih dapat dicegat oleh operator relay keluar atau orang yang mengamati lalu lintas antara relay keluar dan situs tujuan Anda. Jika situs yang Anda kunjungi menggunakan HTTPS, lalu lintas yang meninggalkan relay keluar akan dienkripsi, dan tidak akan terlihat oleh penyadap.
Visualisasi ini menunjukkan informasi apa yang terlihat oleh penyadap dengan dan tanpa Tor Browser dan enkripsi HTTPS.
Visualisasi berikut ini menunjukkan informasi apa yang bisa dilihat oleh penyusup dengan atau tanpa Tor Browser dan enskripsi HTTPS:
- Click tombol "Tor" untuk melihat apakah data ditampilkan kepada pengamat ketika Anda menggunakan Tor. Tombol akan berubah menjadi hijau untuk menandakan Tor sedang aktif.
- Click tombol "HTTPS" untuk melihat apakah data ditampilkan kepada pengamat saat Anda menggunakan HTTPS, tombol akan berubah menjadi hijau untuk menandakan HTTPS sedang aktif.
- Saat masing-masing tombol berwarna hijau, Anda dapat melihat data ditampilkan kepada orang yang mengamati ketika Anda tidak menggunakan salah satu perkakas.
- Saat masing-masing tombol berwarna abu-abu, Anda dapat melihat data ditampilkan kepada orang yang mengamati ketika Anda tidak menggunakan salah satu perkakas.




DATA YANG POTENSIAL TERLIHAT
- Situs.com
- Situs telah dikunjungi.
- user / pw
- Nama pengguna dan kata sandi digunakan untuk autentifikasi.
- data
- Data sudah dikirim.
- lokasi
- Lokasi jaringan komputer yang digunakan untuk mengunjungi situs (IP alamat publik).
- Tor
- Apakah Tor sedang dipakai atau tidak.
Can I browse normal HTTPS sites with Tor?
The short answer is: Yes, you can browse normal HTTPS sites using Tor.
HTTPS Connections are used to secure communications over computer networks. You can read more about HTTPS here. Tor Browser has the HTTPS Everywhere plugin which automatically switches thousands of sites from unencrypted "HTTP" to more private "HTTPS".
Operator Relai
Bagaimana cara memastikan bahwa saya menggunakan paket yang benar pada Ubuntu?
- Jangan gunakan paket di repositori Ubuntu. Mereka tidak dapat diperbarui secara andal. Jika Anda menggunakannya, Anda akan kehilangan perbaikan stabilitas dan keamanan yang penting.
- Cari versi Ubuntu Anda dengan menjalankan perintah berikut:
$ lsb_release -c
- As root, add the following lines to /etc/apt/sources.list. Replace 'version' with the version you found in the previous step:
deb https://deb.torproject.org/torproject.org version main deb-src https://deb.torproject.org/torproject.org version main
- Tambahkan kunci gpg untuk menandatangani paket dengan menjalankan perintah berikut:
$ curl https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | sudo apt-key add -
- Jalankan perintah berikut untuk memasang tor dan memeriksa tanda tangannya:
$ sudo apt-get update $ sudo apt-get install tor deb.torproject.org-keyring
How do offline ed25519 identity keys work? What do I need to know?
In simple words, it works like this:
- There is a primary ed25519 identity secret key file named "ed25519_master_id_secret_key". This is the most important one, so make sure you keep a backup in a secure place - the file is sensitive and should be protected. Tor could encrypt it for you if you generate it manually and enter a password when asked.
- A medium term signing key named "ed25519_signing_secret_key" is generated for Tor to use. Also, a certificate is generated named "ed25519_signing_cert" which is signed by the primary identity secret key and confirms that the medium term signing key is valid for a certain period of time. The default validity is 30 days, but this can be customized by setting "SigningKeyLifetime N days|weeks|months" in torrc.
- There is also a primary public key named "ed25519_master_id_public_key", which is the actual identity of the relay advertised in the network. This one is not sensitive and can be easily computed from "ed5519_master_id_secret_key".
Tor will only need access to the medium term signing key and certificate as long as they are valid, so the primary identity secret key can be kept outside DataDirectory/keys, on a storage media or a different computer. You'll have to manually renew the medium term signing key and certificate before they expire otherwise the Tor process on the relay will exit upon expiration.
This feature is optional, you don't need to use it unless you want to. If you want your relay to run unattended for longer time without having to manually do the medium term signing key renewal on regular basis, best to leave the primary identity secret key in DataDirectory/keys, just make a backup in case you'll need to reinstall it. If you want to use this feature, you can consult our more detailed guide on the topic.
Can I use IPv6 on my relay?
Tor has partial support for IPv6 and we encourage every relay operator to enable IPv6 functionality in their torrc configuration files when IPv6 connectivity is available. For the time being Tor will require IPv4 addresses on relays, you can not run a Tor relay on a host with IPv6 addresses only.
Why does my relay write more bytes onto the network than it reads?
You're right, for the most part a byte into your Tor relay means a byte out, and vice versa. But there are a few exceptions:
If you open your DirPort, then Tor clients will ask you for a copy of the directory. The request they make (an HTTP GET) is quite small, and the response is sometimes quite large. This probably accounts for most of the difference between your "write" byte count and your "read" byte count.
Another minor exception shows up when you operate as an exit node, and you read a few bytes from an exit connection (for example, an instant messaging or ssh connection) and wrap it up into an entire 512 byte cell for transport through the Tor network.
How stable does my relay need to be?
We aim to make setting up a Tor relay easy and convenient:
- It's fine if the relay goes offline sometimes. The directories notice this quickly and stop advertising the relay. Just try to make sure it's not too often, since connections using the relay when it disconnects will break.
- Each Tor relay has an exit policy that specifies what sort of outbound connections are allowed or refused from that relay. If you are uncomfortable allowing people to exit from your relay, you can set it up to only allow connections to other Tor relays.
- Your relay will passively estimate and advertise its recent bandwidth capacity, so high-bandwidth relays will attract more users than low-bandwidth ones. Therefore, having low-bandwidth relays is useful too.
Why can I not browse anymore after limiting bandwidth on my Tor relay?
The parameters assigned in the AccountingMax and BandwidthRate apply to both client and relay functions of the Tor process. Thus you may find that you are unable to browse as soon as your Tor goes into hibernation, signaled by this entry in the log:
Bandwidth soft limit reached; commencing hibernation.
No new connections will be accepted
The solution is to run two Tor processes - one relay and one client, each with its own config. One way to do this (if you are starting from a working relay setup) is as follows:
- In the relay Tor torrc file, simply set the SocksPort to 0.
- Create a new client torrc file from the torrc.sample and ensure it uses a different log file from the relay. One naming convention may be torrc.client and torrc.relay.
- Modify the Tor client and relay startup scripts to include
-f /path/to/correct/torrc
. - In Linux/BSD/Mac OS X, changing the startup scripts to
Tor.client
andTor.relay
may make separation of configs easier.
How do I decide if I should run a relay?
We're looking for people with reasonably reliable Internet connections, that have at least 10 Mbit/s (Mbps) available bandwidth each way. If that's you, please consider running a Tor relay.
Even if you do not have at least 10 Mbit/s of available bandwidth you can still help the Tor network by running a Tor bridge with obfs4 support. In that case you should have at least 1 MBit/s of available bandwidth.
I'm behind a NAT/Firewall.
See portforward.com for directions on how to port forward with your NAT/router device.
If your relay is running on a internal net, you need to setup port forwarding. Forwarding TCP connections is system dependent but the firewalled-clients FAQ entry offers some examples on how to do this.
Also, here's an example of how you would do this on GNU/Linux if you're using iptables:
/sbin/iptables -A INPUT -i eth0 -p tcp --destination-port 9001 -j ACCEPT
You may have to change "eth0" if you have a different external interface (the one connected to the Internet). Chances are you have only one (except the loopback) so it shouldn't be too hard to figure out.
How do I change my bridge distribution method?
BridgeDB implements four mechanisms to distribute bridges: HTTPS, Moat, Email, and Reserved.
Bridge operators can check which mechanism their bridge is using, on the Relay Search.
Enter the bridge's <HASHED FINGERPRINT>
in the form and click "Search".
Operators can also choose which distribution method their bridge uses.
To change the method, modify the BridgeDistribution
setting in the torrc file to one of these: https, moat, email, none, any.
Read more on the Bridges post-install guide.
Do I get better anonymity if I run a relay?
Yes, you do get better anonymity against some attacks.
The simplest example is an attacker who owns a small number of Tor relays. They will see a connection from you, but they won't be able to know whether the connection originated at your computer or was relayed from somebody else.
There are some cases where it doesn't seem to help: if an attacker can watch all of your incoming and outgoing traffic, then it's easy for them to learn which connections were relayed and which started at you. (In this case they still don't know your destinations unless they are watching them too, but you're no better off than if you were an ordinary client.)
There are also some downsides to running a Tor relay. First, while we only have a few hundred relays, the fact that you're running one might signal to an attacker that you place a high value on your anonymity. Second, there are some more esoteric attacks that are not as well-understood or well-tested that involve making use of the knowledge that you're running a relay -- for example, an attacker may be able to "observe" whether you're sending traffic even if they can't actually watch your network, by relaying traffic through your Tor relay and noticing changes in traffic timing.
It is an open research question whether the benefits outweigh the risks. A lot of that depends on the attacks you are most worried about. For most users, we think it's a smart move.
My relay recently got the Guard flag and traffic dropped by half.
Since it's now a guard, clients are using it less in other positions, but not many clients have rotated their existing guards out to use it as a guard yet. Read more details in this blog post or in Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor.
Why do I get portscanned more often when I run a Tor relay?
If you allow exit connections, some services that people connect to from your relay will connect back to collect more information about you. For example, some IRC servers connect back to your identd port to record which user made the connection. (This doesn't really work for them, because Tor doesn't know this information, but they try anyway.) Also, users exiting from you might attract the attention of other users on the IRC server, website, etc. who want to know more about the host they're relaying through.
Another reason is that groups who scan for open proxies on the Internet have learned that sometimes Tor relays expose their socks port to the world. We recommend that you bind your socksport to local networks only.
In any case, you need to keep up to date with your security. See this article on security for Tor relays for more suggestions.
My relay or bridge is overloaded what does this mean?
On relay search we show an amber dot next to the relay nickname when this is overloaded. This means that one or many of the following load metrics have been triggered:
- Any Tor OOM invocation due to memory pressure
- Any ntor onionskins are dropped
- TCP port exhaustion
- DNS timeout reached
Note that if a relay reaches an overloaded state we show it for 72 hours after the relay has recovered.
If you notice that your relay is overloaded please:
Check https://status.torproject.org/ for any known issues in the "Tor network" category.
Consider tuning
sysctl
for your system for network, memory and CPU load.Consider enabling
MetricsPort
to understand what is happening.
Tuning sysctl
for network, memory and CPU load
TCP port exhaustion
If you are experiencing TCP port exhaustion consider expanding your local port range. You can do that with
# sysctl -w net.ipv4.ip_local_port_range="15000 64000"
Atau
# echo 15000 64000 > /proc/sys/net/ipv4/ip_local_port_range
DNS timeout
If you are experiencing DNS timeout, you should investigate if this is a network or a resolver issue.
In Linux in resolve.conf
there is an option to set a timeout:
timeout:n
Sets the amount of time the resolver will wait for a response from a remote
name server before retrying the query via a different name server.
This may not be the total time taken by any resolver API call and there is no guarantee
that a single resolver API call maps to a single timeout.
Measured in seconds, the default is RES_TIMEOUT (currently 5, see <resolv.h>).
The value for this option is silently capped to 30.
Check $ man resolve.conf
for more information.
MetricsPort
Consider enabling MetricsPort
to understand what is happening.
MetricsPort data for relays has been introduced since version >= 0.4.7.1-alpha, while the overload data has been added to the relay descriptors since 0.4.6+.
It's important to understand that exposing the tor MetricsPort publicly is dangerous for the Tor network users.
Please take extra precaution and care when opening this port, and close it when you are done debugging.
Set a very strict access policy with MetricsPortPolicy
and consider using your operating systems firewall features for defense in depth.
Here is an example of what output enabling MetricsPort
will produce:
# HELP tor_relay_load_onionskins_total Total number of onionskins handled
# TYPE tor_relay_load_onionskins_total counter
tor_relay_load_onionskins_total{type="tap",action="processed"} 0
tor_relay_load_onionskins_total{type="tap",action="dropped"} 0
tor_relay_load_onionskins_total{type="fast",action="processed"} 0
tor_relay_load_onionskins_total{type="fast",action="dropped"} 0
tor_relay_load_onionskins_total{type="ntor",action="processed"} 0
tor_relay_load_onionskins_total{type="ntor",action="dropped"} 0
# HELP tor_relay_exit_dns_query_total Total number of DNS queries done by this relay
# TYPE tor_relay_exit_dns_query_total counter
tor_relay_exit_dns_query_total{record="A"} 0
tor_relay_exit_dns_query_total{record="PTR"} 0
tor_relay_exit_dns_query_total{record="AAAA"} 0
# HELP tor_relay_exit_dns_error_total Total number of DNS errors encountered by this relay
# TYPE tor_relay_exit_dns_error_total counter
tor_relay_exit_dns_error_total{record="A",reason="success"} 0
tor_relay_exit_dns_error_total{record="A",reason="format"} 0
tor_relay_exit_dns_error_total{record="A",reason="serverfailed"} 0
tor_relay_exit_dns_error_total{record="A",reason="notexist"} 0
tor_relay_exit_dns_error_total{record="A",reason="notimpl"} 0
tor_relay_exit_dns_error_total{record="A",reason="refused"} 0
tor_relay_exit_dns_error_total{record="A",reason="truncated"} 0
tor_relay_exit_dns_error_total{record="A",reason="unknown"} 0
tor_relay_exit_dns_error_total{record="A",reason="timeout"} 0
tor_relay_exit_dns_error_total{record="A",reason="shutdown"} 0
tor_relay_exit_dns_error_total{record="A",reason="cancel"} 0
tor_relay_exit_dns_error_total{record="A",reason="nodata"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="success"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="format"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="serverfailed"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="notexist"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="notimpl"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="refused"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="truncated"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="unknown"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="timeout"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="shutdown"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="cancel"} 0
tor_relay_exit_dns_error_total{record="PTR",reason="nodata"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="success"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="format"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="serverfailed"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="notexist"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="notimpl"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="refused"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="truncated"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="unknown"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="timeout"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="shutdown"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="cancel"} 0
tor_relay_exit_dns_error_total{record="AAAA",reason="nodata"} 0
# HELP tor_relay_load_tcp_exhaustion_total Total number of times we ran out of TCP ports
# TYPE tor_relay_load_tcp_exhaustion_total counter
tor_relay_load_tcp_exhaustion_total 0
# HELP tor_relay_load_socket_total Total number of sockets
# TYPE tor_relay_load_socket_total gauge
tor_relay_load_socket_total{state="opened"} 135
tor_relay_load_socket_total 1048544
# HELP tor_relay_load_oom_bytes_total Total number of bytes the OOM has freed by subsystem
# TYPE tor_relay_load_oom_bytes_total counter
tor_relay_load_oom_bytes_total{subsys="cell"} 0
tor_relay_load_oom_bytes_total{subsys="dns"} 0
tor_relay_load_oom_bytes_total{subsys="geoip"} 0
tor_relay_load_oom_bytes_total{subsys="hsdir"} 0
# HELP tor_relay_load_global_rate_limit_reached_total Total number of global connection bucket limit reached
# TYPE tor_relay_load_global_rate_limit_reached_total counter
tor_relay_load_global_rate_limit_reached_total{side="read"} 0
tor_relay_load_global_rate_limit_reached_total{side="write"} 0
Let's find out what some of these lines actually mean:
tor_relay_load_onionskins_total{type="ntor",action="dropped"} 0
When a relay starts seeing "dropped", it is a CPU/RAM problem usually.
Tor is sadly single threaded except for when the "onion skins" are processed. The "onion skins" are the cryptographic work that needs to be done on the famous "onion layers" in every circuits.
When tor processes the layers we use a thread pool and outsource all of that work to that pool. It can happen that this pool starts dropping work due to memory or CPU pressure and this will trigger an overload state.
If your server is running at capacity this will likely be triggered.
tor_relay_exit_dns_error_total{...}
Any counter in the "*_dns_error_total" realm indicates a DNS problem.
DNS timeouts issues only apply to Exit nodes. If tor starts noticing DNS timeouts, you'll get the overload flag. This might not be because your relay is overloaded in terms of resources but it signals a problem on the network.
DNS timeouts at the Exits are a huge UX problem for tor users. Therefore Exit operators really need to address these issues to help the network.
tor_relay_load_oom_bytes_total{...}
An Out-Of-Memory invocation indicates a RAM problem. The relay might need more RAM or it is leaking memory. If you noticed that the tor process is leaking memory, please report the issue either via Tor gitLab or sending an email to the tor-relays mailing list.
Tor has its own OOM handler and it is invoked when 75%, of the total memory tor thinks is available, is reached. Thus, let say tor thinks it can use 2GB in total then at 1.5GB of memory usage, it will start freeing memory. That is considered an overload state.
To estimate the amount of memory it has available, when tor starts, it will use MaxMemInQueues or, if not set, will look at the total RAM available on the system and apply this algorithm:
if RAM >= 8GB {
memory = RAM * 40%
} else {
memory = RAM * 75%
}
/* Capped. */
memory = min(memory, 8GB) -> [8GB on 64bit and 2GB on 32bit)
/* Minimum value. */
memory = max(250MB, memory)
To avoid an overloaded state we recommend to run a relay above 2GB of RAM on 64bit. 4GB is advised, although of course it doesn't hurt to add more RAM if you can.
One might notice that tor could be called by the OS OOM handler itself. Because tor takes the total memory on the system when it starts, if the overall system has many other applications running using RAM, it ends up eating too much memory. In this case the OS could OOM tor, without tor even noticing memory pressure.
tor_relay_load_socket_total
These lines indicate the relay is running out of sockets.
The solution is to increase ulimit -n
for the tor process.
tor_relay_load_tcp_exhaustion_total
These lines indicate the relay is running out of TCP ports.
Try to tune sysctl
as described above.
tor_relay_load_global_rate_limit_reached_total
If this counter is incremented by some noticeable value over a short period of time, the relay is congested. It is likely being used as a Guard by a big onion service or for an ongoing DDoS on the network.
If your relay is still overloaded and you don't know why, please get in touch with network-report@torproject.org. You can encrypt your email using network-report OpenPGP key.
How can I limit the total amount of bandwidth used by my Tor relay?
The accounting options in the torrc file allow you to specify the maximum amount of bytes your relay uses for a time period.
AccountingStart day week month [day] HH:MM
This specifies when the accounting should reset. For instance, to setup a total amount of bytes served for a week (that resets every Wednesday at 10:00am), you would use:
AccountingStart week 3 10:00
AccountingMax 500 GBytes
This specifies the maximum amount of data your relay will send during an accounting period, and the maximum amount of data your relay will receive during an account period. When the accounting period resets (from AccountingStart), then the counters for AccountingMax are reset to 0.
Example: Let's say you want to allow 50 GB of traffic every day in each direction and the accounting should reset at noon each day:
AccountingStart day 12:00
AccountingMax 50 GBytes
Note that your relay won't wake up exactly at the beginning of each accounting period. It will keep track of how quickly it used its quota in the last period, and choose a random point in the new interval to wake up. This way we avoid having hundreds of relays working at the beginning of each month but none still up by the end.
If you have only a small amount of bandwidth to donate compared to your connection speed, we recommend you use daily accounting, so you don't end up using your entire monthly quota in the first day. Just divide your monthly amount by 30. You might also consider rate limiting to spread your usefulness over more of the day: if you want to offer X GB in each direction, you could set your RelayBandwidthRate to 20*X KBytes. For example, if you have 50 GB to offer each way, you might set your RelayBandwidthRate to 1000 KBytes: this way your relay will always be useful for at least half of each day.
AccountingStart day 0:00
AccountingMax 50 GBytes
RelayBandwidthRate 1000 KBytes
RelayBandwidthBurst 5000 KBytes # allow higher bursts but maintain average
I'd run a relay, but I don't want to deal with abuse issues.
Great. That's exactly why we implemented exit policies.
Each Tor relay has an exit policy that specifies what sort of outbound connections are allowed or refused from that relay. The exit policies are propagated to Tor clients via the directory, so clients will automatically avoid picking exit relays that would refuse to exit to their intended destination. This way each relay can decide the services, hosts, and networks it wants to allow connections to, based on abuse potential and its own situation. Read the Support entry on issues you might encounter if you use the default exit policy, and then read Mike Perry's tips for running an exit node with minimal harassment.
The default exit policy allows access to many popular services (e.g. web browsing), but restricts some due to abuse potential (e.g. mail) and some since the Tor network can't handle the load (e.g. default file-sharing ports). You can change your exit policy by editing your torrc file. Jika Anda ingin menghindari sebagian besar potensi penyalahgunaan, setel ke "tolak *:*". This setting means that your relay will be used for relaying traffic inside the Tor network, but not for connections to external websites or other services.
If you do allow any exit connections, make sure name resolution works (that is, your computer can resolve Internet addresses correctly). If there are any resources that your computer can't reach (for example, you are behind a restrictive firewall or content filter), please explicitly reject them in your exit policy otherwise Tor users will be impacted too.
Why isn't my relay being used more?
If your relay is relatively new then give it time. Tor decides which relays it uses heuristically based on reports from Bandwidth Authorities. These authorities take measurements of your relay's capacity and, over time, directs more traffic there until it reaches an optimal load. The lifecycle of a new relay is explained in more depth in this blog post. If you've been running a relay for a while and still having issues then try asking on the tor-relays list.
I want to run more than one Tor relay.
Great. If you want to run several relays to donate more to the network, we're happy with that. But please don't run more than a few dozen on the same network, since part of the goal of the Tor network is dispersal and diversity.
If you do decide to run more than one relay, please set the "MyFamily" config option in the torrc of each relay, listing all the relays (comma-separated) that are under your control:
MyFamily $fingerprint1,$fingerprint2,$fingerprint3
where each fingerprint is the 40 character identity fingerprint (without spaces).
That way, Tor clients will know to avoid using more than one of your relays in a single circuit. You should set MyFamily if you have administrative control of the computers or of their network, even if they're not all in the same geographic location.
Is there a list of default exit ports?
The default open ports are listed below but keep in mind that, any port or ports can be opened by the relay operator by configuring it in torrc or modifying the source code. The default according to src/or/policies.c (line 85 and line 1901) from the source code release release-0.4.6:
reject 0.0.0.0/8
reject 169.254.0.0/16
reject 127.0.0.0/8
reject 192.168.0.0/16
reject 10.0.0.0/8
reject 172.16.0.0/12
reject *:25
reject *:119
reject *:135-139
reject *:445
reject *:563
reject *:1214
reject *:4661-4666
reject *:6346-6429
reject *:6699
reject *:6881-6999
accept *:*
My relay is picking the wrong IP address.
Tor guesses its IP address by asking the computer for its hostname, and then resolving that hostname. Often people have old entries in their /etc/hosts file that point to old IP addresses.
If that doesn't fix it, you should use the "Address" config option to specify the IP you want it to pick. If your computer is behind a NAT and it only has an internal IP address, see the following Support entry on dynamic IP addresses.
Also, if you have many addresses, you might also want to set "OutboundBindAddress" so external connections come from the IP you intend to present to the world.
Relai saya lambat, bagaimana cara memperbaikinya?
Why Relay Load Varies
Tor manages bandwidth across the entire network. It does a reasonable job for most relays. But Tor's goals are different to protocols like BitTorrent. Tor wants low-latency web pages, which requires fast connections with headroom. BitTorrent wants bulk downloads, which requires using all the bandwidth.
We're working on a new bandwidth scanner, which is easier to understand and maintain. It will have diagnostics for relays that don't get measured, and relays that have low measurements.
Why does Tor need bandwidth scanners?
Most providers tell you the maximum speed of your local connection. But Tor has users all over the world, and our users connect to one or two Guard relays at random. So we need to know how well each relay can connect to the entire world.
So even if all relay operators set their advertised bandwidth to their local connection speed, we would still need bandwidth authorities to balance the load between different parts of the Internet.
What is a normal relay load?
It's normal for most relays to be loaded at 30%-80% of their capacity. This is good for clients: an overloaded relay has high latency. (We want enough relays to so that each relay is loaded at 10%. Then Tor would be almost as fast as the wider Internet).
Sometimes, a relay is slow because its processor is slow or its connections are limited. Other times, it is the network that is slow: the relay has bad peering to most other tor relays, or is a long distance away.
Finding Out what is Limiting a Relay
Lots of things can slow down a relay. Here's how to track them down.
Batasan Sistem
- Check RAM, CPU, and socket/file descriptor usage on your relay
Tor logs some of these when it starts. Others can be viewed using top or similar tools.
Provider Limits
- Check the Internet peering (bandwidth, latency) from your relay's provider to other relays. Relays transiting via Comcast have been slow at times. Relays outside North America and Western Europe are usually slower.
Tor Network Limits
Relay bandwidth can be limited by a relay's own observed bandwidth, or by the directory authorities' measured bandwidth. Here's how to find out which measurement is limiting your relay:
- Check each of the votes for your relay on consensus-health (large page), and check the median.
If your relay is not marked Running by some directory authorities:
- Does it have the wrong IPv4 or IPv6 address?
- Is its IPv4 or IPv6 address unreachable from some networks?
- Are there more than 2 relays on its IPv4 address?
Otherwise, check your relay's observed bandwidth and bandwidth rate (limit). Look up your relay on Metrics. Then mouse over the bandwidth heading to see the observed bandwidth and relay bandwidth rate.
Here is some more detail and some examples: Drop in consensus weight and Rampup speed of Exit relay.
How to fix it
The smallest of these figures is limiting the bandwidth allocated to the relay.
- If it's the bandwidth rate, increase the BandwidthRate/Burst or RelayBandwidthRate/Burst in your torrc.
- If it's the observed bandwidth, your relay won't ask for more bandwidth until it sees itself getting faster. You need to work out why it is slow.
- If it's the median measured bandwidth, your relay looks slow from a majority of bandwidth authorities. You need to work out why they measure it slow.
Doing Your Own Relay Measurements
If your relay thinks it is slow, or the bandwidth authorities think it is slow, you can test the bandwidth yourself:
- Run a test using tor to see how fast tor can get on your network/CPU.
- Run a test using tor and chutney to find out how fast tor can get on your CPU. Keep increasing the data volume until the bandwidth stops increasing.
What type of relays are most needed?
- The exit relay is the most needed relay type but it also comes with the highest legal exposure and risk (and you should NOT run them from your home).
- If you are looking to run a relay with minimal effort, fast guard relays are also very useful
- Followed by bridges.
What bandwidth shaping options are available to Tor relays?
There are two options you can add to your torrc file:
BandwidthRate is the maximum long-term bandwidth allowed (bytes per second). For example, you might want to choose "BandwidthRate 10 MBytes" for 10 megabytes per second (a fast connection), or "BandwidthRate 500 KBytes" for 500 kilobytes per second (a decent cable connection). The minimum BandwidthRate setting is 75 kilobytes per second.
BandwidthBurst is a pool of bytes used to fulfill requests during short periods of traffic above BandwidthRate but still keeps the average over a long period to BandwidthRate. A low Rate but a high Burst enforces a long-term average while still allowing more traffic during peak times if the average hasn't been reached lately. For example, if you choose "BandwidthBurst 500 KBytes" and also use that for your BandwidthRate, then you will never use more than 500 kilobytes per second; but if you choose a higher BandwidthBurst (like 5 MBytes), it will allow more bytes through until the pool is empty.
If you have an asymmetric connection (upload less than download) such as a cable modem, you should set BandwidthRate to less than your smaller bandwidth (Usually that's the upload bandwidth). Otherwise, you could drop many packets during periods of maximum bandwidth usage - you may need to experiment with which values make your connection comfortable. Then set BandwidthBurst to the same as BandwidthRate.
Linux-based Tor nodes have another option at their disposal: they can prioritize Tor traffic below other traffic on their machine, so that their own personal traffic is not impacted by Tor load. A script to do this can be found in the Tor source distribution's contrib directory.
Additionally, there are hibernation options where you can tell Tor to only serve a certain amount of bandwidth per time period (such as 100 GB per month). These are covered in the hibernation entry below.
Note that BandwidthRate and BandwidthBurst are in Bytes, not Bits.
Saya harus menjalankan relay keluar di rumah?
Tidak. Jika penegakan hukum menjadi tertarik pada lalu lintas dari relay keluar Anda, sangat mungkin bahwa petugas akan merebut komputer Anda. Untuk alasan itu, lebih baik tidak untuk menjalankan relay keluar di rumah Anda atau menggunakan koneksi internet rumah.
Sebaliknya, mempertimbangkan menjalankan relay keluar Anda dalam fasilitas komersial yang mendukung Tor. Miliki alamat IP terpisah untuk relay keluar Anda, dan jangan merutekan lintas Anda sendiri lalu melalui IP itu. Tentu saja, Anda harus menghindari menyimpan informasi sensitif atau pribadi apa pun pada komputer yang menghosting relay keluar Anda.
How should I configure the outgoing filters on my relay?
All outgoing connections must be allowed, so that each relay can communicate with every other relay.
In many jurisdictions, Tor relay operators are legally protected by the same common carrier regulations that prevent internet service providers from being held liable for third-party content that passes through their network. Exit relays that filter some traffic would likely forfeit those protections.
Tor promotes free network access without interference. Exit relays must not filter the traffic that passes through them to the internet. Exit relays found to be filtering traffic will get the BadExit flag once detected.
What is the BadExit flag?
When an exit is misconfigured or malicious it's assigned the BadExit flag. This tells Tor to avoid exiting through that relay. In effect, relays with this flag become non-exits. If you got this flag then we either discovered a problem or suspicious activity when routing traffic through your exit and weren't able to contact you. Please reach out to the bad-relays team so we can sort out the issue.
Saya menghadapi masalah hukum. Bagaimana cara membuktikan bahwa server saya adalah relai Tor pada waktu tertentu?
Exonerator is a web service that can check if an IP address was a relay at a given time. We can also provide a signed letter if needed.
Bagaimana cara menjalankan relay keluar pada Debian?
For the most in-depth resource on running a relay, see the Relay Setup Guide.
Can I run a Tor relay using a dynamic IP address?
Tor can handle relays with dynamic IP addresses just fine. Just leave the "Address" line in your torrc blank, and Tor will guess.
Bagaimanakah cara menjalankan relay tengah atau penjaga di FreeBSD or HardenedBSD?
For the most in-depth resource on running a relay, see the Relay Setup Guide.
I want to upgrade/move my relay. How do I keep the same key?
When upgrading your Tor relay, or moving it on a different computer, the important part is to keep the same identity keys (stored in "keys/ed25519_master_id_secret_key" and "keys/secret_id_key" in your DataDirectory). Keeping backups of the identity keys so you can restore a relay in the future is the recommended way to ensure the reputation of the relay won't be wasted.
This means that if you're upgrading your Tor relay and you keep the same torrc and the same DataDirectory, then the upgrade should just work and your relay will keep using the same key. If you need to pick a new DataDirectory, be sure to copy your old keys/ed25519_master_id_secret_key and keys/secret_id_key over.
Note: As of Tor 0.2.7 we are using new generation identities for relays based on ed25519 elliptic curve cryptography. Eventually they will replace the old RSA identities, but that will happen in time, to ensure compatibility with older versions. Until then, each relay will have both an ed25519 identity (identity key file: keys/ed25519_master_id_secret_key) and a RSA identity (identity key file: keys/secret_id_key). You need to copy / backup both of them in order to restore your relay, change your DataDirectory or migrate the relay on a new computer.
Bagaimanakah cara menjalankan relay tengah atau penjaga di Debian?
For the most in-depth resource on running a relay, see the Relay Setup Guide.
Why is my Tor relay using so much memory?
If your Tor relay is using more memory than you'd like, here are some tips for reducing its footprint:
- If you're on Linux, you may be encountering memory fragmentation bugs in glibc's malloc implementation.
That is, when Tor releases memory back to the system, the pieces of memory are fragmented so they're hard to reuse.
The Tor tarball ships with OpenBSD's malloc implementation, which doesn't have as many fragmentation bugs (but the tradeoff is higher CPU load).
You can tell Tor to use this malloc implementation instead:
./configure --enable-openbsd-malloc
. - If you're running a fast relay, meaning you have many TLS connections open, you are probably losing a lot of memory to OpenSSL's internal buffers (38KB+ per socket). We've patched OpenSSL to release unused buffer memory more aggressively. If you update to OpenSSL 1.0.0 or newer, Tor's build process will automatically recognize and use this feature.
- If you still can't handle the memory load, consider reducing the amount of bandwidth your relay advertises.
Advertising less bandwidth means you will attract fewer users, so your relay shouldn't grow as large.
See the
MaxAdvertisedBandwidth
option in the man page.
All of this said, fast Tor relays do use a lot of ram. It is not unusual for a fast exit relay to use 500-1000 MB of memory.
Should I install Tor from my package manager, or build from source?
If you're using Debian or Ubuntu especially, there are a number of benefits to installing Tor from the Tor Project's repository.
- Your
ulimit -n
gets set to 32768 high enough for Tor to keep open all the connections it needs. - A user profile is created just for Tor, so Tor doesn't need to run as root.
- An init script is included so that Tor runs at boot.
- Tor runs with
--verify-config
, so that most problems with your config file get caught. - Tor can bind to low level ports, then drop privileges.
How do I run an obfs4 bridge?
See our obfs4 setup guide to learn how to set up an obfs4 bridge.
How do I run a relay in Windows?
You can run a relay in Windows following this tutorials:
- For running a guard relay in Windows, please read: https://community.torproject.org/relay/setup/guard/windows/
- For running a bridge relay in Windows, please read: https://community.torproject.org/relay/setup/bridge/windows/
You should only run a Windows relay if you can run it 24/7. If you are unable to guarantee that, Snowflake is a better way to contribute your resources to the Tor network.
Layanan Onion
Saya tidak dapat membuka X.onion!
Jika Anda tidak dapat menjangkau layanan onion yang Anda inginkan, pastikan Anda telah memasukkan 16 karakter atau, dengan format terbaru, yakni 56 karakter alamat onion dengan benar; bahkan kesalahan kecil akan menghentikan Tor Browser untuk dapat menjangkau situs tersebut. Bila anda tetap tidak dapat terhubung ke layanan onion, mohon coba kembali. Mungkin ada persoalan koneksi, atau operator situs membuatnya "offline" tanpa peringatan.
Anda juga dapat memastikan bahwa Anda dapat mengakses layanan onion lainnya dengan menghubungkan ke layanan onion DuckDuckGo.
Apa arti ".onion tersedia" di peramban saya?
Onion-Location adalah tajuk HTTP baru yang dapat digunakan situs web untuk mengiklankan situs salinan onion mereka. Jika situs web yang Anda kunjungi memiliki situs onion, petunjuk berwarna ungu akan muncul pada bilah URL mengatakan ".onion tersedia". Ketika Anda mengklik ".onion available", situs web akan dimuat ulang dan dialihkan ke salinan onion situs tersebut. Saat ini, Onion-Location tersedia untuk desktop Tor Browser (Windows, macOS dan GNU/Linux). Anda dapat mempelajari lebih lanjut tentang Onion-Location di Panduan Tor Browser. Jika Anda operator layanan onion, pelajari cara mengonfigurasi Onion-Location di situs onion Anda.
Apakah Tor Project menjalankan Layanan Onion?
Ya! Daftar Layanan Onion kami tersedia di onion.torproject.org.
Saya pernah mendengar tentang situs-situs yang hanya dapat diakses melalui Tor. Situs-situs apa saja dan bagaimana cara mengakses mereka?
Situs-situs yang hanya dapat diakses melalui Tor disebut "onion" dan berakhir dengan akhiran .onion. Misalnya, DuckDuckGo onion adalah https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/. Anda dapat mengakses situs-situs tersebut dengan menggunakan Tor Browser. Alamat situsnya harus diberikan oleh pemiliknya karena tidak terindeks oleh mesin pencari seperti situs biasa.
Apa arti ikon onion yang berbeda di kolom alamat?
Saat menelusuri Layanan Onion, Tor Browser menampilkan ikon onion yang berbeda di kolom alamat yang menunjukkan keamanan halaman web saat ini.
Arti dari onion adalah:
- Layanan Onion disajikan melalui HTTP, atau HTTPS dengan sertifikat yang diterbitkan CA.
- Layanan Onion disajikan melalui HTTPS dengan sertifikat yang Ditandatangani Sendiri.
onion dengan garis miring merah berarti:
- Layanan Onion disajikan dengan skrip dari URL yang tidak aman.
Onion dengan tanda hati-hati berarti:
- Layanan Onion disajikan melalui HTTPS dengan Sertifikat yang kedaluwarsa.
- Layanan Onion disajikan melalui HTTPS dengan Domain yang salah.
- Layanan Onion disajikan dengan bentuk campuran melalui URL yang tidak aman.
Apa itu auntentikasi klien atau onion?
Layanan onion yang terautentikasi adalah layanan onion yang mengharuskan Anda untuk memberikan token autentikasi (dalam hal ini, kunci pribadi) sebelum mengakses layanan. The private key is not transmitted to the service, and it's only used to decrypt its descriptor locally. Anda bisa mendapatkan akses kredensial dari operator layanan onion. Hubungi operator dan minta akses. Pelajari lebih lanjut cara menggunakan autentikasi onion di Tor Browser. Jika Anda ingin membuat layanan onion dengan autentikasi klien, silakan lihat Otorisasi Klien di portal Komunitas.
Apa itu .onion atau apa itu onion service?
Onion service memungkinkan orang untuk melihat, tetapi juga untuk mempublikasikan secara anonim, termasuk penerbitan website anonim.
Layanan Onion juga diandalkan untuk obrolan bebas metadata dan berbagi berkas, interaksi yang lebih aman antara jurnalis dan sumbernya seperti SecureDrop atau OnionShare, pembaruan perangkat lunak yang lebih aman, dan merupakan cara yang lebih aman untuk menjangkau situs web populer seperti Facebook.
Layanan ini menggunakan top level domain (TLD) .onion (sebagai ganti dari .com, .net, .org, dll.) dan hanya dapat diakses melalui jaringan Tor.
When accessing a website that uses an onion service, Tor Browser will show at the URL bar an icon of an onion displaying the state of your connection: secure and using an onion service.
Penghentian Layanan Onion V2
Bagaimana mengetahui jika saya menggunakan layanan onion v2 atau v3?
Anda dapat mengidentifikasi alamat onion v3 dengan panjang 56 karakternya, misalnya, Alamat v2 Tor Project:http://expyuzz4wqqyqhjn.onion/
, dan alamat v3 Tor Project: http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion/
Jika Anda seorang administrator layanan onion, Anda harus meningkatkan ke layanan onion v3 sesegera mungkin. Jika Anda pengguna, pastikan Anda memperbarui markah ke alamat onion v3 situs web.
What is the timeline for the v2 deprecation?
Pada September 2020, Tor mulai memperingatkan operator dan klien layanan onion bahwa v2 akan ditinggalkan dan selesai di versi 0.4.6. Tor Browser mulai memperingatkan pengguna pada Juni 2021.
Pada Juli 2021, 0.4.6 Tor tidak lagi mendukung v2 dan dukungan akan dihapus dari basis kode.
In October 2021, we will release new Tor client stable versions for all supported series that will disable v2.
Anda dapat membaca lebih lanjut di posting blog Tor Project Linimasa penghentian Layanan Onion versi 2.
Dapatkah saya tetap menggunakan alamat onion v2 saya? Bagaimana mengakses onion v2 saya setelah September? Apakah ini perubahan yang tidak kompatibel ke belakang?
Alamat onion V2 pada dasarnya tidak aman. Jika Anda memiliki onion v2, kami sarankan Anda bermigrasi sekarang. Ini adalah perubahan yang tidak kompatibel ke belakang: layanan bawang v2 tidak akan dapat dijangkau setelah September 2021.
What is the recommendation for developers to migrate? Any tips on how to spread the new v3 addresses to people?
In torrc, to create a version 3 address, you simply need to create a new service just as you did your v2 service, with these two lines:
HiddenServiceDir /full/path/to/your/new/v3/directory/
HiddenServicePort <virtual port> <target-address>:<target-port>
The default version is now set to 3 so you don't need to explicitly set it. Restart tor, and look on your directory for the new address. If you wish to keep running your version 2 service until it is deprecated to provide a transition path to your users, add this line to the configuration block of your version 2 service:
HiddenServiceVersion 2
This will allow you to identify in your configuration file which one is which version.
If you have Onion-Location configured on your website, you need to set the header with your new v3 address. For technical documentation about running onion services, please read the Onion Services page in our Community portal.
I didn't see the announcement, can I get more time to migrate?
No, v2 onion connections will start failing nowish, first slowly, then suddenly. It's time to move away.
Apakah layanan mulai gagal dijangkau pada bulan September, atau sebelumnya?
Already, introduction points are not in Tor 0.4.6 anymore, so they will not be reachable if relay operators update.
Sebagai admin situs web, dapatkah saya mengalihkan pengguna dari v2 onion ke v3?
Yes, it will work until the v2 onion address is unreachable. You may want to encourage users to update their bookmarks.
Apakah server onion v3 akan membantu memitigasi masalah DDos?
Yes, we are continuously working on improving onion services security. Some of the work we have in our roadmap is ESTABLISH_INTRO Cell DoS Defense Extension, Res tokens: Anonymous Credentials for Onion Service DoS Resilience, and A First Take at PoW Over Introduction Circuits. For an overview about these proposals, read the detailed blog post How to stop the onion denial (of service).
Lain-lain
File-file di komputer saya terkunci dan seseorang menyuruh saya mengunduh peramban Tor Browser untuk membayar tebusan atas file-file saya!
Kami minta maaf, tapi Anda telah terinfeksi dengan malware. Tor Project tidak menciptakan malware ini. Pencipta malware itu meminta Anda mengunduh Tor Browser supaya Anda dapat menghubungi mereka secara anonim dengan tebusannya.
Jika ini adalah perkenalan pertama Anda dengan Tor Browser, kami paham kalau Anda berpikir kami adalah orang-orang jahat yang membantu orang-orang yang lebih jahat.
Namu, mohon ketahui bahwa perangkat lunak kami digunakan untuk beragam tujuan oleh aktivis hak asasi manusia, wartawan, orang-orang yang selamat dari kekerasan rumah tangga, whistle blower, penegak hukum, dan banyak lain. Sayangnya, perlindungan yang disediakan perangkat lunak kami kepada orang-orang tersebut dapat disalahgunakan oleh penjahat dan pembuat malware. Tor Project tidak mendukung atau merestui penggunaan perangkat lunak kami untuk tujuan jahat.
Apakah saya dapat menggunakan logo Tor di produk saya?
Anda dapat membaca seluruhnya pada Halaman FAQ merk dagang.
How do I check if my application that uses SOCKS is leaking DNS requests?
Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries. This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc. If you suspect your application might behave like this, follow the instructions below to check.
- Add
TestSocks 1
to your torrc file. - Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (
socks5://127.0.0.1:9050
by default). - Watch your logs as you use your application. For each socks connection, Tor will log a
notice
for safe connections, and awarn
for connections leaking DNS requests.
If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1
in your torrc file.
Kenapa kalian tidak mencegah orang jahat melakukan kejahatan menggunakan Tor?
Tor dirancang untuk melindungi hak asasi manusia dan privasi dengan mencegah siapa saja dalam menyensor apapun, mencegah siapapun bahkan diri kami sendiri. Kami tidak suka kalau ada orang-orang yang menggunakan Tor untuk hal-hal buruk, tapi kami tidak dapat melakukan apapun dalam menyingkirkan mereka tanpa mengabaikan aktivis HAM, wartawan, orang-orang yang selamat dari pelecehan, dan orang lain yang menggunakan Tor untuk kebaikan. Jika kami menghalangi sebagian orang menggunakan Tor, kami pada dasarnya akan menambah pintu belakang di perangkat lunak ini, yang akan buka kelemahan pengguna kami kepada pemerintah yang tidak baik dan musuh-musuh lain.</p>
Apakah Tor menyimpan log?
Tor tidak menyimpan log apapun yang dapat mengidentifikasi pengguna tertentu. Kami melakukan beberapa pengukuran aman tentang bagaimana fungsi jaringan, yang dapat Anda lihat di Metrik Tor.
Saya mendapat masalah dalam memperbarui atau menggunakan Vidalia.
Vidalia sudah tidak dipelihara atau didukung. Sebagian besar fitur Vidalia sudah terintegrasi ke Tor Browser.
Apakah saya dapat mengubah jumlah hop yang digunakan Tor?
Saat ini panjangnya path terkode dalam 3 plus jumlah node di path Anda yang sensitif. Yaitu, di keadaan normal, adalah 3, tapi misalnya jika Anda mengakses sebuah onion service atau sebuah alamat ".exit", jumlah ini dapat lebih besar.
Kami tidak ingin mendorong orang untuk menggunakan path lebih panjang dari ini karena akan meningkatkan beban jaringan (sejauh yang kami ketahui) tanpa menambah keamanan. Selain itu, menggunakan jalur yang lebih panjang dari 3 dapat membahayakan anonimitas, pertama karena membuat serangan penolakan keamanan lebih mudah, dan kedua karena dapat bertindak sebagai pengenal jika hanya sejumlah kecil pengguna yang memiliki panjang jalur yang sama dengan Anda.
Apakah Tor Project membuat aplikasi untuk chatting privat?
Tidak. Setelah sebelas rilis beta, kami menghentikan dukungan Tor Messenger. Kita masih bisa percaya kemampuan Tor untuk digunakan dalam aplikasi pesan, tapi kita tidak memiliki sumber daya untuk membuat hal itu terjadi sekarang. Apakah Anda? Hubungi kami.
How to Report a Bug or Give Feedback
Tor mengandalkan dukungan dari pengguna dan sukarelawan di seluruh dunia untuk membantu meningkatkan perangkat lunak dan sumber daya kami, jadi umpan balik Anda sangat berharga untuk kami (dan untuk semua pengguna Tor).
Format Masukan
When sending us feedback or reporting a bug, please include as many of these as possible:
- Operating System you are using
- Tor Browser version
- Tor Browser Security Level
- Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
- A screenshot of the problem
- The log
Cara Menghubungi Kami
There are several ways to reach us, so please use what works best for you.
Forum Tor
We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.
GitLab
First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.
Surel
Send us an email to frontdesk@torproject.org
In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.
For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.
Komentar pada posting blog
You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.
IRC
You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.
Learn how to connect to OFTC servers.
Daftar Surel
For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.
For feedback or issues related to Tor Browser, Tor network or other projects developed by Tor: tor-talk
For feedback or issues related to our websites: ux
For feedback or issues related to running a Tor relay: tor-relays
For feedback on content related to Tor Browser Manual or Support website: tor-community-team
Laporkan isu keamanan
If you've found a security issue in one of our projects or in our infrastructure, please email tor-security@lists.torproject.org. If you've found a security bug in Tor or Tor Browser, feel free to submit it for our bug bounty program. If you want to encrypt your mail, you can get the GPG public key for the list by contacting tor-security-sendkey@lists.torproject.org or from pool.sks-keyservers.net. Here is the fingerprint:
gpg --fingerprint tor-security@lists.torproject.org
pub 4096R/1A7BF184 2017-03-13
Key fingerprint = 8B90 4624 C5A2 8654 E453 9BC2 E135 A8B4 1A7B F184
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
sub 4096R/C00942E4 2017-03-13
Bagaimana berbagi file secara anonim melalui Tor?
Untuk berbagi berkas melalui Tor, OnionShare adalah opsi yang baik. OnionShare adalah sarana bersumber terbuka untuk mengirim dan menerima berkas secara aman dan anonim menggunakan layanan servis Tor onion. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.
Tidak seperti layanan surel, Google Drive, DropBox, WeTransfer, atau hampir semua cara yang biasanya dilakukan orang untuk mengirim berkas satu sama lain, saat Anda menggunakan OnionShare, Anda tidak memberikan akses kepada perusahaan mana pun ke file yang Anda bagikan. Selama Anda membagikan alamat web yang tidak dapat ditebak dengan cara yang aman (seperti menempelkannya di aplikasi perpesanan terenkripsi), tidak seorang pun kecuali Anda dan orang yang Anda ajak berbagi yang dapat mengakses berkas tersebut.
OnionShare dikembangkan oleh Micah Lee.
Banyak exit node diatur untuk menghalangi beberapa jenis lalu-lintas file sharing, seperti BitTorrent. BitTorrent pada khususnya tidak anonim melalui Tor.
Bagaimana cara memberikan donasi kepada Tor Project?
Terima kasih atas dukungan Anda! Anda dapat menemukan informasi lebih lanjut untuk berdonasi di FAQ donor kami.
Siapa yang membiayai Tor?
Tor dibiayai beberapa sponsor termasuk lembaga federal Amerika Serikat, yayasan swasta, dan donor individu. Lihat daftar semua sponsor kami dan serangkaianpostingan blog pada laporan keuangan kami.
Kami merasa bahwa berbicara secara terbuka mengenai sponsor dan model pendanaan kami adalah cara terbaik untuk menjaga kepercayaan dengan komunitas kami. Kami selalu mencara cara lain dalam pembiayaan, termasuk dari yayasan dan orang perorangan.
Apakah saya dapat menggunakan Tor dengan BitTorrent?
Kami tidak menyarankan penggunaan Tor dengan BitTorrent. Untuk perincian lebih lanjut, silakan lihat postingan blog kami tentang subyek ini.
Apakah Tor Project menawarkan jasa hosting situs web?
Apakah Tor Project menawarkan jasa hosting situs web?
Apakah Tor Project menawarkan jasa email atau jasa web lain yang menawarkan perlindungan privasi?Apakah Tor Project menawarkan jasa email atau jasa web lain yang menawarkan perlindungan privasi?
Tidak, kami tidak menawarkan jasa online. Seluruh daftar proyek perangkat lunak kami dapat ditemukan pada halaman proyek.
Bagaimana cara menjadi relawan pada Tor Project?
Silahkan cek halaman komunitas untuk mengetahui bagaimana caranya terlibat!
Saya punya alasan kuat untuk melacak seorang pengguna Tor. Apakah Anda dapat membantu saya?
Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. Perlindungan yang menghalangi orang jahat untuk merusak anonimitas Tor juga mencegah kami melacak pengguna.</p>
You should hide the list of Tor relays, so people can't block the exits.
There are a few reasons we don't:
- We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see.
- If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can.
- Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity.
Mengenal
Bagaimana cara mengobrol dengan tim Tor Project?
For a long time, the Tor community has been running many day-to-day activities using the IRC network known as OFTC. IRC has worked out well for us, and our community on IRC has been evolving over the years with new people joining in and new channels appearing for specific needs in the organization.
The Tor community is opening up its day-to-day conversations by bridging our IRC community the Matrix network. For regular Tor users, it means that you can chat with us using a friendly App like Element. The #tor:matrix.org room or the #tor IRC channel are connected: whichever platform you chose, your message will be shared on both platforms.
To join the conversation with Tor contributors on Matrix, you need a Matrix account. Several providers can get you one. One of these is the Matrix.org Foundation, which allows people to register an account for free. You can register an account on app.element.io.
Once you have a Matrix account, you can either join the Tor Matrix Space to browse the Tor rooms, or directly join the #tor:matrix.org user support room.
Alternatively, if you want to use IRC you can use OFTC's web IRC client:
Open OFTC webchat
Isi bagian yang kosong:
NICKNAME: Anything you want, but choose the same nickname (nick) every time you use IRC to talk to people on Tor. If your nick is already being used, you will get a message from the system and you should choose another nick.
CHANNEL: #tor
Klik Enter
Congratulations! You're on IRC.
After a few seconds, you will automatically enter #tor, which is a chatroom with Tor developers, relay operators and other community members. There are some random people in #tor as well.
You can ask questions in the empty bar at the bottom of the screen. Please, don't ask to ask, just ask your question.
People may be able to answer right away, or there may be a bit of a delay (some people are listed on the channel but are away from their keyboards and record channel activities to read later).
If you want to chat with someone specific, start your comment with their nick and they will typically receive a notification that someone is trying to contact them.
OFTC often doesn't allow people to use their webchat over Tor. For this reason, and because many people end up preferring it anyway, you should also consider using an IRC client.
Why I can't join Tor-dev and other channels?
The #tor-project channel is where Tor people discuss and coordinate daily Tor work. It has fewer members than #tor and is more focused on the work at hand. You are also welcome to join this channel. To access #tor-project, your nickname (nick) must be registered and verified.
Here's how to reach #tor-project and other registered channels.
Daftarkan nama panggilanmu
Log onto #tor. See How can I chat with Tor Project teams?
Then, click on the word "Status" at the top left of the screen.
In the window at the bottom of the page, type:
/msg nickserv REGISTER yournewpassword youremailaddress
Hit enter.
If all goes well, you will receive a message that you are registered.
The system may register you as your nick_ instead of your nick.
If so, just go with it but remember you are user_ and not user.
Every time you log on to IRC, to identify your registered nick, type:
/nick yournick
/msg nickserv IDENTIFY YourPassWord
Bagaimana memverifikasi nama panggilanmu
After registering your nickname, to gain access to the #tor-project and other protected channels, your nickname must be verified.
Go to https://services.oftc.net/ and follow the steps in the 'To verify your account' section
Go back to the IRC webpage where you are logged in and type:
/msg nickserv checkverify
Click ENTER.
If all is well, you will receive a message that says:
*!NickServ*checkverify
Usermodechange: +R
!NickServ- Successfully set +R on your nick.
`
Your nick is verified!
Now, to join #tor-project, you can just type:
/join #tor-project
fan tekan enter.
You will be allowed into the channel. If so, Congratulations!
However, if you get stuck, you can ask for help in the #tor channel.
You can toggle back and forth between channels by clicking on the different channel names at the top left of the IRC window.
How to Report a Bug or Give Feedback
Tor mengandalkan dukungan dari pengguna dan sukarelawan di seluruh dunia untuk membantu meningkatkan perangkat lunak dan sumber daya kami, jadi umpan balik Anda sangat berharga untuk kami (dan untuk semua pengguna Tor).
Format Masukan
When sending us feedback or reporting a bug, please include as many of these as possible:
- Operating System you are using
- Tor Browser version
- Tor Browser Security Level
- Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
- A screenshot of the problem
- The log
Cara Menghubungi Kami
There are several ways to reach us, so please use what works best for you.
Forum Tor
We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.
GitLab
First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.
Surel
Send us an email to frontdesk@torproject.org
In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.
For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.
Komentar pada posting blog
You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.
IRC
You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.
Learn how to connect to OFTC servers.
Daftar Surel
For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.
For feedback or issues related to Tor Browser, Tor network or other projects developed by Tor: tor-talk
For feedback or issues related to our websites: ux
For feedback or issues related to running a Tor relay: tor-relays
For feedback on content related to Tor Browser Manual or Support website: tor-community-team
Laporkan isu keamanan
If you've found a security issue in one of our projects or in our infrastructure, please email tor-security@lists.torproject.org. If you've found a security bug in Tor or Tor Browser, feel free to submit it for our bug bounty program. If you want to encrypt your mail, you can get the GPG public key for the list by contacting tor-security-sendkey@lists.torproject.org or from pool.sks-keyservers.net. Here is the fingerprint:
gpg --fingerprint tor-security@lists.torproject.org
pub 4096R/1A7BF184 2017-03-13
Key fingerprint = 8B90 4624 C5A2 8654 E453 9BC2 E135 A8B4 1A7B F184
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
sub 4096R/C00942E4 2017-03-13
Debian Repositori
Bisakah saya menggunakan tor dari repositori Ubuntu?
No. Jangan menggunakan packages di semesta Ubuntu. In the past they have not been reliably updated. That means you could be missing stability and security fixes. Instead, please use Tor Debian repository.
Mengapa dan bagaimana saya bisa mengaktifkan Tor Package Repository di Debian?
The Tor Project maintains its own Debian package repository. Since Debian provides the LTS version of Tor, this might not always give you the latest stable Tor version. Therefore, it's recommended to install tor
from our repository.
Ini cara bagaimana Anda dapat mengaktifkan Tor Package Repository di distribusi berbasis Debian:
Note: The symbol # refers to running the code as root. This means you should have access to a user account with system administration privileges, e.g your user should be in the sudo group.
Prasyarat: Verifikasi arsitektur CPU
The package repository offers amd64
, arm64
, and i386
binaries. Verify your operating system is capable of running the binary by inspecting the output of the following commend:
# dpkg --print-architecture
It should output either amd64
, arm64
, or i386
. The repository does not support other CPU architectures.
Note on Raspbian: The package repository does not offer 32-bit ARM architecture (
armhf
) images. You should either build Tor from source, or install the version Debian offers.
1. Install apt-transport-https
To enable all package managers using the libapt-pkg library to access metadata and packages available in sources accessible over https (Hypertext Transfer Protocol Secure).
# apt install apt-transport-https
2. Buat berkas baru pada /etc/apt/sources.list.d/
yag dinamakan tor.list
. Tambahkan entri berikut:
deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org <DISTRIBUTION> main
deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org <DISTRIBUTION> main
If you want to try experimental packages, add these in addition to the lines from above (Note, use whatever is the current experimental version instead of 0.4.6.x from the example below):
deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org tor-experimental-0.4.6.x-<DISTRIBUTION> main
deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org tor-experimental-0.4.6.x-<DISTRIBUTION> main
Or nightly builds:
deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org tor-nightly-main-<DISTRIBUTION> main
deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org tor-nightly-main-<DISTRIBUTION> main
Replace <DISTRIBUTION>
with your Operating System codename. Run lsb_release -c
or cat /etc/debian_version
to check the Operating System version.
Note: Ubuntu Focal dropped support for 32-bit, so instead use:
deb [arch=<ARCHITECTURE> signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org focal main
deb-src [arch=<ARCHITECTURE> signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org focal main
Replace <ARCHITECTURE>
with your system architecture (you found it earlier by writing dpkg --print-architecture
).
Warning symptom, when running sudo apt update:
Skipping acquire of configured file 'main/binary-i386/Packages' as repository 'http://deb.torproject.org/torproject.org focal InRelease' doesn't support architecture 'i386'
3. Then add the gpg key used to sign the packages by running the following command at your command prompt:
# wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg >/dev/null
4. Pasang tor dan rangkaian kunci tor debian
Kami menyediakan Debian package untuk membantu Anda menjaga signing key current. Disarankan Anda menggunakannya. Instal dengan perintah berikut:
# apt update
# apt install tor deb.torproject.org-keyring
Bisakah saya menggunakan APT di atas Tor?
Yes, deb.torproject.org
is also served through via an Onion Service: http://apow7mjfryruh65chtdydfmqfpj5btws7nbocgtaovhvezgccyjazpqd.onion/
Note: The symbol # refers to running the code as root. This means you should have access to a user account with system administration privileges, e.g your user should be in the sudo group.
To use Apt over Tor, the apt transport needs to be installed:
# apt install apt-transport-tor
Then you need to add the following entries to /etc/apt/sources.list
or a new file in /etc/apt/sources.list.d/
:
# Untuk stable version.
deb tor://apow7mjfryruh65chtdydfmqfpj5btws7nbocgtaovhvezgccyjazpqd.onion/torproject.org <DISTRIBUTION> main
# Untuk unstable version.
deb tor://apow7mjfryruh65chtdydfmqfpj5btws7nbocgtaovhvezgccyjazpqd.onion/torproject.org tor-nightly-master-<DISTRIBUTION> main
Replace <DISTRIBUTION>
with your Operating System codename. Run lsb_release -c
or cat /etc/debian_version
to check the Operating System version.
Now refresh your sources and try to install tor again:
# apt update
# apt install tor
Paket rpm Tor
How can I install Tor rpm package
The Tor Project maintains its own RPM package repository for CentOS and RHEL and Fedora.
Note: The symbol # refers to be running the code as root. That means you should have access to a user account with system administration privileges, e.g your user should be in the sudo group.
Here's how you can enable Tor Package Repository for both CentOS and RHEL and Fedora:
1. Enable epel repository (only for CentOS and RHEL)
# dnf install epel-release -y
2. Add the following to /etc/yum.repos.d/tor.repo
For CentOS or RHEL:
[tor]
name=Tor for Enterprise Linux $releasever - $basearch
baseurl=https://rpm.torproject.org/centos/$releasever/$basearch
enabled=1
gpgcheck=1
gpgkey=https://rpm.torproject.org/centos/public_gpg.key
cost=100
For Fedora:
[tor]
name=Tor for Fedora $releasever - $basearch
baseurl=https://rpm.torproject.org/fedora/$releasever/$basearch
enabled=1
gpgcheck=1
gpgkey=https://rpm.torproject.org/fedora/public_gpg.key
cost=100
3. Pasang paket Tor
Then you can install the latest Tor package.
# dnf install tor -y
Using it for the first time, you will have to import the GPG public key.
Importing GPG key 0x3621CD35:
Userid : "Kushal Das (RPM Signing key) <kushal@torproject.org>"
Fingerprint: 999E C8E3 14BC 8D46 022D 6C7D E217 C30C 3621 CD35
From : https://rpm.torproject.org/fedora/public_gpg.key
Is this ok [y/N]: y
Penyalahgunaan FAQ
I'd run a relay, but I don't want to deal with abuse issues.
Great. That's exactly why we implemented exit policies.
Each Tor relay has an exit policy that specifies what sort of outbound connections are allowed or refused from that relay. The exit policies are propagated to Tor clients via the directory, so clients will automatically avoid picking exit relays that would refuse to exit to their intended destination. This way each relay can decide the services, hosts, and networks it wants to allow connections to, based on abuse potential and its own situation. Read the Support entry on issues you might encounter if you use the default exit policy, and then read Mike Perry's tips for running an exit node with minimal harassment.
The default exit policy allows access to many popular services (e.g. web browsing), but restricts some due to abuse potential (e.g. mail) and some since the Tor network can't handle the load (e.g. default file-sharing ports). You can change your exit policy by editing your torrc file. Jika Anda ingin menghindari sebagian besar potensi penyalahgunaan, setel ke "tolak *:*". This setting means that your relay will be used for relaying traffic inside the Tor network, but not for connections to external websites or other services.
If you do allow any exit connections, make sure name resolution works (that is, your computer can resolve Internet addresses correctly). If there are any resources that your computer can't reach (for example, you are behind a restrictive firewall or content filter), please explicitly reject them in your exit policy otherwise Tor users will be impacted too.
Doesn't Tor enable criminals to do bad things?
Criminals can already do bad things. Since they're willing to break laws, they already have lots of options available that provide better privacy than Tor provides. They can steal cell phones, use them, and throw them in a ditch; they can crack into computers in Korea or Brazil and use them to launch abusive activities; they can use spyware, viruses, and other techniques to take control of literally millions of Windows machines around the world.
Tor aims to provide protection for ordinary people who want to follow the law. Only criminals have privacy right now, and we need to fix that.
Some advocates of anonymity explain that it's just a tradeoff — accepting the bad uses for the good ones — but there's more to it than that. Criminals and other bad people have the motivation to learn how to get good anonymity, and many have the motivation to pay well to achieve it. Being able to steal and reuse the identities of innocent victims (identity theft) makes it even easier. Normal people, on the other hand, don't have the time or money to spend figuring out how to get privacy online. This is the worst of all possible worlds.
So yes, criminals can use Tor, but they already have better options, and it seems unlikely that taking Tor away from the world will stop them from doing their bad things. At the same time, Tor and other privacy measures can fight identity theft, physical crimes like stalking, and so on.
What about distributed denial of service attacks?
Distributed denial of service (DDoS) attacks typically rely on having a group of thousands of computers all sending floods of traffic to a victim. Since the goal is to overpower the bandwidth of the victim, they typically send UDP packets since those don't require handshakes or coordination.
But because Tor only transports correctly formed TCP streams, not all IP packets, you cannot send UDP packets over Tor. (You can't do specialized forms of this attack like SYN flooding either.) So ordinary DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth amplification attacks against external sites: you need to send in a byte for every byte that the Tor network will send to your destination. So in general, attackers who control enough bandwidth to launch an effective DDoS attack can do it just fine without Tor.
What about spammers?
First of all, the default Tor exit policy rejects all outgoing port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to work by default. It's possible that some relay operators will enable port 25 on their particular exit node, in which case that computer will allow outgoing mails; but that individual could just set up an open mail relay too, independent of Tor. In short, Tor isn't useful for spamming, because nearly all Tor relays refuse to deliver the mail.
Of course, it's not all about delivering the mail. Spammers can use Tor to connect to open HTTP proxies (and from there to SMTP servers); to connect to badly written mail-sending CGI scripts; and to control their botnets — that is, to covertly communicate with armies of compromised computers that deliver the spam.
This is a shame, but notice that spammers are already doing great without Tor. Also, remember that many of their more subtle communication mechanisms (like spoofed UDP packets) can't be used over Tor, because it only transports correctly-formed TCP connections.
Does Tor get much abuse?
Not much, in the grand scheme of things. The network has been running since October 2003, and it's only generated a handful of complaints. Of course, like all privacy-oriented networks on the net, it attracts its share of jerks. Tor's exit policies help separate the role of "willing to donate resources to the network" from the role of "willing to deal with exit abuse complaints", so we hope our network is more sustainable than past attempts at anonymity networks.
Since Tor has many good uses as well, we feel that we're doing pretty well at striking a balance currently.
So what should I expect if I run an exit relay?
If you run a Tor relay that allows exit connections (such as the default exit policy), it's probably safe to say that you will eventually hear from somebody. Abuse complaints may come in a variety of forms. For example:
- Somebody connects to Hotmail, and sends a ransom note to a company. The FBI sends you a polite email, you explain that you run a Tor relay, and they say "oh well" and leave you alone. [Port 80]
- Somebody tries to get you shut down by using Tor to connect to Google groups and post spam to Usenet, and then sends an angry mail to your ISP about how you're destroying the world. [Port 80]
- Somebody connects to an IRC network and makes a nuisance of himself. Your ISP gets polite mail about how your computer has been compromised; and/or your computer gets DDoSed. [Port 6667]
- Somebody uses Tor to download a Vin Diesel movie, and your ISP gets a DMCA takedown notice. See EFF's Tor DMCA Response Template, which explains why your ISP can probably ignore the notice without any liability. [Arbitrary ports]
Some hosting providers are friendlier than others when it comes to Tor exits. For a listing see the good and bad ISPs wiki.
For a complete set of template responses to different abuse complaint types, see the collection of templates. You can also proactively reduce the amount of abuse you get by following these tips for running an exit node with minimal harassment and running a reduced exit policy.
You might also find that your Tor relay's IP is blocked from accessing some Internet sites/services. This might happen regardless of your exit policy, because some groups don't seem to know or care that Tor has exit policies. (If you have a spare IP not used for other activities, you might consider running your Tor relay on it.) In general, it's advisable not to use your home internet connection to provide a Tor relay.
How do I respond to my ISP about my exit relay?
A collection of templates for successfully responding to ISPs is collected here.
Tor is banned from the IRC network I want to use.
Sometimes jerks make use of Tor to troll IRC channels. This abuse results in IP-specific temporary bans ("klines" in IRC lingo), as the network operators try to keep the troll off of their network.
This response underscores a fundamental flaw in IRC's security model: they assume that IP addresses equate to humans, and by banning the IP address they can ban the human. In reality, this is not the case — many such trolls routinely make use of the literally millions of open proxies and compromised computers around the Internet. The IRC networks are fighting a losing battle of trying to block all these nodes, and an entire cottage industry of blocklists and counter-trolls has sprung up based on this flawed security model (not unlike the antivirus industry). The Tor network is just a drop in the bucket here.
On the other hand, from the viewpoint of IRC server operators, security is not an all-or-nothing thing. By responding quickly to trolls or any other social attack, it may be possible to make the attack scenario less attractive to the attacker. And most individual IP addresses do equate to individual humans, on any given IRC network at any given time. The exceptions include NAT gateways which may be allocated access as special cases. While it's a losing battle to try to stop the use of open proxies, it's not generally a losing battle to keep klining a single ill-behaved IRC user until that user gets bored and goes away.
But the real answer is to implement application-level auth systems, to let in well-behaving users and keep out badly-behaving users. This needs to be based on some property of the human (such as a password they know), not some property of the way their packets are transported.
Of course, not all IRC networks are trying to ban Tor nodes. After all, quite a few people use Tor to IRC in privacy in order to carry on legitimate communications without tying them to their real-world identity. Each IRC network needs to decide for itself if blocking a few more of the millions of IPs that bad people can use is worth losing the contributions from the well-behaved Tor users.
If you're being blocked, have a discussion with the network operators and explain the issues to them. They may not be aware of the existence of Tor at all, or they may not be aware that the hostnames they're klining are Tor exit nodes. If you explain the problem, and they conclude that Tor ought to be blocked, you may want to consider moving to a network that is more open to free speech. Maybe inviting them to #tor on irc.oftc.net will help show them that we are not all evil people.
Finally, if you become aware of an IRC network that seems to be blocking Tor, or a single Tor exit node, please put that information on The Tor IRC block tracker so that others can share. At least one IRC network consults that page to unblock exit nodes that have been blocked inadvertently.
Your nodes are banned from the mail server I want to use.
Even though Tor isn't useful for spamming, some over-zealous blocklisters seem to think that all open networks like Tor are evil — they attempt to strong-arm network administrators on policy, service, and routing issues, and then extract ransoms from victims.
If your server administrators decide to make use of these blocklists to refuse incoming mail, you should have a conversation with them and explain about Tor and Tor's exit policies.
I want to ban the Tor network from my service.
We're sorry to hear that. There are some situations where it makes sense to block anonymous users for an Internet service. But in many cases, there are easier solutions that can solve your problem while still allowing users to access your website securely.
First, ask yourself if there's a way to do application-level decisions to separate the legitimate users from the jerks. For example, you might have certain areas of the site, or certain privileges like posting, available only to people who are registered. It's easy to build an up-to-date list of Tor IP addresses that allow connections to your service, so you could set up this distinction only for Tor users. This way you can have multi-tiered access and not have to ban every aspect of your service.
For example, the Freenode IRC network had a problem with a coordinated group of abusers joining channels and subtly taking over the conversation; but when they labeled all users coming from Tor nodes as "anonymous users", removing the ability of the abusers to blend in, the abusers moved back to using their open proxies and bot networks.
Second, consider that hundreds of thousands of people use Tor every day simply for good data hygiene — for example, to protect against data-gathering advertising companies while going about their normal activities. Others use Tor because it's their only way to get past restrictive local firewalls. Some Tor users may be legitimately connecting to your service right now to carry on normal activities. You need to decide whether banning the Tor network is worth losing the contributions of these users, as well as potential future legitimate users. (Often people don't have a good measure of how many polite Tor users are connecting to their service — you never notice them until there's an impolite one.)
At this point, you should also ask yourself what you do about other services that aggregate many users behind a few IP addresses. Tor is not so different from AOL in this respect.
Lastly, please remember that Tor relays have individual exit policies. Many Tor relays do not allow exiting connections at all. Many of those that do allow some exit connections might already disallow connections to your service. When you go about banning nodes, you should parse the exit policies and only block the ones that allow these connections; and you should keep in mind that exit policies can change (as well as the overall list of nodes in the network).
If you really want to do this, we provide a Tor exit relay list or a DNS-based list you can query.
(Some system administrators block ranges of IP addresses because of official policy or some abuse pattern, but some have also asked about allowing Tor exit relays because they want to permit access to their systems only using Tor. These scripts are usable for allowlisting as well.)
Saya punya alasan kuat untuk melacak seorang pengguna Tor. Apakah Anda dapat membantu saya?
Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. The same protections that keep bad people from breaking Tor's anonymity also prevent us from figuring out what's going on.
Some fans have suggested that we redesign Tor to include a backdoor. There are two problems with this idea. First, it technically weakens the system too far. Having a central way to link users to their activities is a gaping hole for all sorts of attackers; and the policy mechanisms needed to ensure correct handling of this responsibility are enormous and unsolved. Second, the bad people aren't going to get caught by this anyway, since they will use other means to ensure their anonymity (identity theft, compromising computers and using them as bounce points, etc).
This ultimately means that it is the responsibility of site owners to protect themselves against compromise and security issues that can come from anywhere. This is just part of signing up for the benefits of the Internet. You must be prepared to secure yourself against the bad elements, wherever they may come from. Tracking and increased surveillance are not the answer to preventing abuse.
But remember that this doesn't mean that Tor is invulnerable. Traditional police techniques can still be very effective against Tor, such as investigating means, motive, and opportunity, interviewing suspects, writing style analysis, technical analysis of the content itself, sting operations, keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone including law enforcement groups to train them how to use the Tor software to safely conduct investigations or anonymized activities online.
I want some content removed from a .onion address.
The Tor Project does not host, control, nor have the ability to discover the owner or location of a .onion address. The .onion address is an address from an onion service. The name you see ending in .onion is an onion service descriptor. It's an automatically generated name which can be located on any Tor relay or client anywhere on the Internet. Onion services are designed to protect both the user and service provider from discovering who they are and where they are from. The design of onion services means the owner and location of the .onion site is hidden even from us.
But remember that this doesn't mean that onion services are invulnerable. Traditional police techniques can still be very effective against them, such as interviewing suspects, writing style analysis, technical analysis of the content itself, sting operations, keyboard taps, and other physical investigations.
If you have a complaint about child abuse materials, you may wish to report it to the National Center for Missing and Exploited Children, which serves as a national coordination point for investigation of child pornography: http://www.missingkids.com/. We do not view links you report.
Where does Tor Project stand on abusers using technology?
We take abuse seriously. Activists and law enforcement use Tor to investigate abuse and help support survivors. We work with them to help them understand how Tor can help their work. In some cases, technological mistakes are being made and we help to correct them. Because some people in survivors' communities embrace stigma instead of compassion, seeking support from fellow victims requires privacy-preserving technology.
Our refusal to build backdoors and censorship into Tor is not because of a lack of concern. We refuse to weaken Tor because it would harm efforts to combat child abuse and human trafficking in the physical world, while removing safe spaces for victims online. Meanwhile, criminals would still have access to botnets, stolen phones, hacked hosting accounts, the postal system, couriers, corrupt officials, and whatever technology emerges to trade content. They are early adopters of technology. In the face of this, it is dangerous for policymakers to assume that blocking and filtering is sufficient. We are more interested in helping efforts to halt and prevent child abuse than helping politicians score points with constituents by hiding it. The role of corruption is especially troubling; see this United Nations report on The Role of Corruption in Trafficking in Persons.
Finally, it is important to consider the world that children will encounter as adults when enacting policy in their name. Will they thank us if they are unable to voice their opinions safely as adults? What if they are trying to expose a failure of the state to protect other children?
I have legal questions about Tor abuse.
We're only the developers. We can answer technical questions, but we're not the ones to talk to about legal questions or concerns.
Please take a look at the Tor Legal FAQ, and contact EFF directly if you have any further legal questions.
I have questions about a Tor IP address for a legal case.
Please read the legal FAQ written by EFF lawyers. There's a growing legal directory of people who may be able to help you.
If you need to check if a certain IP address was acting as a Tor exit node at a certain date and time, you can use the ExoneraTor tool to query the historic Tor relay lists and get an answer.
Metrik Tor
How is it even possible to count users in an anonymity network?
We actually don't count users, but we count requests to the directories that clients make periodically to update their list of relays and estimate number of users indirectly from there.
Do all directories report these directory request numbers?
No, but we can see what fraction of directories reported them, and then we can extrapolate the total number in the network.
How do you get from these directory requests to user numbers?
We put in the assumption that the average client makes 10 such requests per day. A tor client that is connected 24/7 makes about 15 requests per day, but not all clients are connected 24/7, so we picked the number 10 for the average client. We simply divide directory requests by 10 and consider the result as the number of users. Another way of looking at it, is that we assume that each request represents a client that stays online for one tenth of a day, so 2 hours and 24 minutes.
So, are these distinct users per day, average number of users connected over the day, or what?
Average number of concurrent users, estimated from data collected over a day. We can't say how many distinct users there are.
Are there more fine-grained numbers available, for example, on the number of users per hour?
No, the relays that report these statistics aggregate requests by country of origin and over a period of 24 hours. The statistics we would need to gather for the number of users per hour would be too detailed and might put users at risk.
Are these Tor clients or users? What if there's more than one user behind a Tor client?
Then we count those users as one. We really count clients, but it's more intuitive for most people to think of users, that's why we say users and not clients.
What if a user runs Tor on a laptop and changes their IP address a few times per day? Don't you overcount that user?
No, because that user updates their list of relays as often as a user that doesn't change IP address over the day.
How do you know which countries users come from?
The directories resolve IP addresses to country codes and report these numbers in aggregate form. This is one of the reasons why tor ships with a GeoIP database.
Why are there so few bridge users that are not using the default OR protocol or that are using IPv6?
Very few bridges report data on transports or IP versions yet, and by default we consider requests to use the default OR protocol and IPv4. Once more bridges report these data, the numbers will become more accurate.
Why do the graphs end 2 days in the past and not today?
Relays and bridges report some of the data in 24-hour intervals which may end at any time of the day.
And after such an interval is over relays and bridges might take another 18 hours to report the data.
We cut off the last two days from the graphs, because we want to avoid that the last data point in a graph indicates a recent trend change which is in fact just an artifact of the algorithm.
But I noticed that the last data point went up/down a bit since I last looked a few hours ago. Why is that?
The reason is that we publish user numbers once we're confident enough that they won't change significantly anymore. But it's always possible that a directory reports data a few hours after we were confident enough, but which then slightly changed the graph.
Why are no numbers available before September 2011?
We do have descriptor archives from before that time, but those descriptors didn't contain all the data we use to estimate user numbers. Please find the following tarball for more details:
Why do you believe the current approach to estimate user numbers is more accurate?
For direct users, we include all directories which we didn't do in the old approach. We also use histories that only contain bytes written to answer directory requests, which is more precise than using general byte histories.
And what about the advantage of the current approach over the old one when it comes to bridge users?
Oh, that's a whole different story. We wrote a 13 page long technical report explaining the reasons for retiring the old approach.
tl;dr: in the old approach we measured the wrong thing, and now we measure the right thing.
What are these red and blue dots indicating possible censorship events?
We run an anomaly-based censorship-detection system that looks at estimated user numbers over a series of days and predicts the user number in the next days. If the actual number is higher or lower, this might indicate a possible censorship event or release of censorship. For more details, see our technical report.
Little-t-tor
How can I verify tor source code?
Attention: These instructions are to verify the tor source code. Please follow the right instructions to verify Tor Browser's signature.
Tandatangan digital adalah proses yang memastikan paket tertentu memang diterbitkan oleh pengembangnya dan tidak dirusak. Below we explain why it is important and how to verify that the tor source code you download is the one we have created and has not been modified by some attacker.
Each file on our download page is accompanied by a file labelled "sig" with the same name as the package and the extension ".asc". These .asc files are OpenPGP signatures. Mereka memperbolehkan Anda untuk memverifikasi berkas yang telah diunduh adalah sama persis dengan apa yang kami ingin Anda terima. This will vary by web browser, but generally you can download this file by right-clicking the "sig" link and selecting the "save file as" option.
For example, tor-0.4.6.7.tar.gz
is accompanied by tor-0.4.6.7.tar.gz.asc
.
Ini adalah contoh nama berkas dan tidak akan sama persis dengan nama berkas yang Anda unduh.
Kami sekarang menunjukkan bagaimana Anda dapat memverifikasi tandatangan digital di berkas yang diunduh pada sistem operasi yang berbeda. Harap perhatikan bahwa tanda tangan diberi tanggal saat paket telah ditandatangani. Oleh karena itu setiap kali berkas baru diunggah, tanda tangan baru dibuat dengan tanggal yang berbeda. Selama Anda telah memverifikasi tanda tangan, Anda tidak perlu khawatir bahwa tanggal yang dilaporkan mungkin berbeda.
memasang GnuPG
Pertama-tama Anda harus memasang GnuPG sebelum Anda dapat memverifikasi tanda tangan.
Untuk pengguna Windows:
Jika Anda menggunakan Windows, unduh Gpg4win dan jalankan pemasangnya.
Untuk memverifikasi tanda tangan, Anda perlu mengetik beberapa perintah di baris perintah windows, cmd.exe
.
Untuk pengguna macOS:
Jika Anda menggunakan macOS, Anda dapat memasang GPGTools.
Untuk memverifikasi tanda tangan, Anda perlu mengetikkan beberapa perintah di Terminal (di bawah "Aplikasi").
Untuk pengguna GNU/Linux:
Jika Anda menggunakan GNU/Linux, maka Anda mungkin sudah memiliki GnuPG di sistem Anda, karena sebagian besar distribusi GNU/Linux sudah dipasang sebelumnya.
In order to verify the signature you will need to type a few commands in a terminal window. How to do this will vary depending on your distribution.
Mengambil kunci Pengembang Tor
Roger Dingledine (0xEB5A896A28988BF5 and 0xC218525819F78451), Nick Mathewson (0xFE43009C4607B1FB) sign Tor source tarballs.
Fetching Nick Mathewson most recent key:
$ gpg --auto-key-locate nodefault,wkd --locate-keys nickm@torproject.org
Ini akan menunjukkan kepada Anda sesuatu seperti:
gpg: key FE43009C4607B1FB: public key "Nick Mathewson <nickm@torproject.org>" imported
gpg: Total number processed: 1
gpg: imported: 1
pub rsa4096 2016-09-21 [C] [expires: 2025-10-04]
2133BC600AB133E1D826D173FE43009C4607B1FB
uid [ unknown] Nick Mathewson <nickm@torproject.org>
sub rsa4096 2016-09-23 [S] [expires: 2025-10-04]
sub rsa4096 2016-09-23 [E] [expires: 2025-10-04]
If you get an error message, something has gone wrong and you cannot continue until you've figured out why this didn't work. You might be able to import the key using the Workaround (using a public key) section instead.
Setelah mengimpor kunci, Anda dapat menyimpannya ke berkas (mengidentifikasi dengan sidik jari di sini):
$ gpg --output ./tor.keyring --export 0x2133BC600AB133E1D826D173FE43009C4607B1FB
Perintah ini menghasilkan kunci yang disimpan ke berkas yang ditemukan di jalur ./tor.keyring
, yaitu di direktori saat ini.
Jika ./tor.keyring
tidak ada setelah menjalankan perintah ini, ada yang salah dan Anda tidak dapat melanjutkan sampai Anda mengetahui mengapa ini tidak berhasil.
Memverifikasi tanda tangan
Untuk memverifikasi tanda tangan paket yang Anda unduh, Anda perlu mengunduh berkas tanda tangan ".asc" yang sesuai serta berkas pemasang itu sendiri, dan memverifikasinya dengan perintah yang meminta GnuPG untuk memverifikasi berkas yang Anda unduh.
Contoh di bawah ini mengasumsikan bahwa Anda mengunduh dua berkas ini ke folder "Unduhan". Perhatikan bahwa perintah ini menggunakan contoh nama berkas dan milik Anda akan berbeda: Anda akan mengunduh versi yang berbeda dari 9.0 dan Anda mungkin tidak memilih versi bahasa Inggris (en-US).
Untuk pengguna Windows:
gpgv --keyring .\tor.keyring Downloads\tor-0.4.6.7.tar.gz.asc Downloads\tor-0.4.6.7.tar.gz
Untuk pengguna macOS:
gpgv --keyring ./tor.keyring ~/Downloads/tor-0.4.6.7.tar.gz.asc ~/Downloads/tor-0.4.6.7.tar.gz
Untuk pengguna GNU/Linux:
gpgv --keyring ./tor.keyring ~/Downloads/tor-0.4.6.7.tar.gz.asc ~/Downloads/tor-0.4.6.7.tar.gz
Hasil dari perintah harus menghasilkan sesuatu seperti ini:
gpgv: Signature made Mon 16 Aug 2021 04:44:27 PM -03
gpgv: using RSA key 7A02B3521DC75C542BA015456AFEE6D49E92B601
gpgv: Good signature from "Nick Mathewson <nickm@torproject.org>"
Jika Anda mendapatkan galat kesalahan yang berisi 'Tidak ada berkas atau direktori seperti itu', kemungkian ada yang salah dengan salah satu langkah sebelumnya, atau Anda lupa bahwa perintah ini menggunakan contoh nama berkas dan milik Anda akan sedikit berbeda.
Workaround (menggunakan kunci publik)
Jika Anda menemukan kesalahan yang tidak dapat Anda perbaiki, silakan unduh dan gunakan kunci publik ini sebagai gantinya. Atau, Anda dapat menggunakan perintah berikut:
$ curl -s https://openpgpkey.torproject.org/.well-known/openpgpkey/torproject.org/hu/kounek7zrdx745qydx6p59t9mqjpuhdf |gpg --import -
Nick Mathewson key is also available on keys.openpgp.org and can be downloaded from https://keys.openpgp.org/vks/v1/by-fingerprint/2133BC600AB133E1D826D173FE43009C4607B1FB.
If you're using macOS or GNU/Linux, the key can also be fetched by running the following command:
$ gpg --keyserver keys.openpgp.org --search-keys nickm@torproject.org
Anda mungkin juga ingin mempelajari lebih lanjut tentang GnuPG.
Desain Alternatif yang Tidak Kami Lakukan (Belum)
Kamu harus membuat setiap pengguna Tor menjadi relai.
Requiring every Tor user to be a relay would help with scaling the network to handle all our users, and running a Tor relay may help your anonymity. However, many Tor users cannot be good relays — for example, some Tor clients operate from behind restrictive firewalls, connect via modem, or otherwise aren't in a position where they can relay traffic. Providing service to these clients is a critical part of providing effective anonymity for everyone, since many Tor users are subject to these or similar constraints and including these clients increases the size of the anonymity set.
That said, we do want to encourage Tor users to run relays, so what we really want to do is simplify the process of setting up and maintaining a relay. We've made a lot of progress with easy configuration in the past few years: Tor is good at automatically detecting whether it's reachable and how much bandwidth it can offer.
There are four steps we need to address before we can do this though:
First, we still need to get better at automatically estimating the right amount of bandwidth to allow. It might be that switching to UDP transport is the simplest answer here — which alas is not a very simple answer at all.
Second, we need to work on scalability, both of the network (how to stop requiring that all Tor relays be able to connect to all Tor relays) and of the directory (how to stop requiring that all Tor users know about all Tor relays). Perubahan seperti ini dapat menyebabkan dampak besar pada potensi dan anonimitas yang sebenarnya. Lihat Bagian 5 dari halaman Tantangan untuk detailnya. Sekali lagi, transportasi UDP akan membantu di sini.
Ketiga, kita perlu lebih memahami risiko dari membiarkan penyerang mengirim lalu lintas melalui relai Anda ketika Anda juga memulai lalu lintas anonim Anda sendiri. Tiga different research dokumen menjelaskan cara untuk mengidentifikasi relai di sirkuit dengan menjalankan lalu lintas melalui kandidat relai dan mencari penurunan lalu lintas saat sirkuit aktif. Serangan penyumbatan ini tidak terlalu menakutkan dalam konteks Tor selama relai juga tidak pernah menjadi klien. But if we're trying to encourage more clients to turn on relay functionality too (whether as bridge relays or as normal relays), then we need to understand this threat better and learn how to mitigate it.
Fourth, we might need some sort of incentive scheme to encourage people to relay traffic for others, and/or to become exit nodes. Berikut adalah pemikiran kami saat ini tentang insentif Tor.
Mohon bantu semua ini!
You should transport all IP packets, not just TCP packets.
Ini akan berguna untuk beberapa alasan: Itu akan membuat Tor lebih mampu menangani protokol baru seperti VoIP. It could solve the whole need to socksify applications. Keluar dari relai juga tidak perlu mengalokasikan banyak berkas deskriptor untuk semua koneksi keluar.
We're heading in this direction. Some of the hard problems are:
Paket IP menyingkap karakteristik OS. We would still need to do IP-level packet normalization, to stop things like TCP fingerprinting attacks. Given the diversity and complexity of TCP stacks, along with device fingerprinting attacks, it looks like our best bet is shipping our own user-space TCP stack.
Application-level streams still need scrubbing. We will still need user-side applications like Torbutton. So it won't become just a matter of capturing packets and anonymizing them at the IP layer.
Protokol tertentu akan tetap membocorkan informasi. For example, we must rewrite DNS requests so they are delivered to an unlinkable DNS server rather than the DNS server at a user's ISP; thus, we must understand the protocols we are transporting.
DTLS (datagram TLS) basically has no users, and IPsec sure is big. Once we've picked a transport mechanism, we need to design a new end-to-end Tor protocol for avoiding tagging attacks and other potential anonymity and integrity issues now that we allow drops, resends, et cetera.
Exit policies for arbitrary IP packets mean building a secure Intrusion Detection System (IDS). Our node operators tell us that exit policies are one of the main reasons they're willing to run Tor. Adding an IDS to handle exit policies would increase the security complexity of Tor, and would likely not work anyway, as evidenced by the entire field of IDS and counter-IDS papers. Many potential abuse issues are resolved by the fact that Tor only transports valid TCP streams (as opposed to arbitrary IP including malformed packets and IP floods.) Exit policies become even more important as we become able to transport IP packets. We also need to compactly describe exit policies in the Tor directory, so clients can predict which nodes will allow their packets to exit. Clients also need to predict all the packets they will want to send in a session before picking their exit node!
The Tor-internal name spaces would need to be redesigned. We support onion service ".onion" addresses by intercepting the addresses when they are passed to the Tor client. Doing so at the IP level will require a more complex interface between Tor and the local DNS resolver.
You should let the network pick the path, not the client.
No, you cannot trust the network to pick the path. Malicious relays could route you through their colluding friends. This would give an adversary the ability to watch all of your traffic end to end.
Exit policies should be able to block websites, not just IP addresses.
It would be nice to let relay operators say things like reject www.slashdot.org
in their exit policies, rather than requiring them to learn all the IP address space that could be covered by the site (and then also blocking other sites at those IP addresses).
There are two problems, though. First, users could still get around these blocks. For example, they could request the IP address rather than the hostname when they exit from the Tor network. This means operators would still need to learn all the IP addresses for the destinations in question.
The second problem is that it would allow remote attackers to censor arbitrary sites. For example, if a Tor operator blocks www1.slashdot.org, and then some attacker poisons the Tor relay's DNS or otherwise changes that hostname to resolve to the IP address for a major news site, then suddenly that Tor relay is blocking the news site.