Feature #5462
Persistence preset: Tor state
0%
Description
See the blueprint.
Team: kurono and?
Only the part about Entry Guards is a candidate for our roadmap at the moment.
Related issues
Related to Tails - Feature #5461: Persistence preset: Tor configuration | Confirmed | ||
Related to Tails - Feature #10553: Add "Don't ask me again" option to notifications where appropriate | Confirmed | 2015-11-16 | |
Related to Tails - |
Rejected | 2016-02-07 | |
Blocked by Tails - Feature #5774: Robust time syncing | In Progress | 2015-05-17 |
History
#1 Updated by intrigeri 2013-10-04 08:14:47
- Category set to Persistence
- Starter set to No
#2 Updated by Anonymous 2014-02-18 01:16:20
(removed spam)
#3 Updated by Anonymous 2014-02-18 07:57:23
(removed spam)
#4 Updated by intrigeri 2014-02-18 09:27:40
- Description updated
#5 Updated by Anonymous 2014-02-18 09:43:31
(removed spam)
#6 Updated by Anonymous 2014-02-18 11:27:46
(removed spam)
#7 Updated by Anonymous 2014-02-18 13:25:39
(removed spam)
#8 Updated by BitingBird 2014-06-09 10:51:19
- Subject changed from persistence preset - tor to Persistence preset - tor
#9 Updated by intrigeri 2014-07-20 14:51:39
- Subject changed from Persistence preset - tor to Persistence preset - Tor state
#10 Updated by intrigeri 2014-08-03 14:50:22
- Description updated
#11 Updated by sajolida 2015-01-30 09:28:20
- related to Feature #8825: Provide default bridges added
#12 Updated by BitingBird 2015-03-14 13:58:56
- Subject changed from Persistence preset - Tor state to Persistence preset: Tor state
#13 Updated by intrigeri 2015-03-15 10:32:04
- related to deleted (
Feature #8825: Provide default bridges)
#14 Updated by anonym 2015-03-26 14:46:50
I had a look at the tools solving the “Persistent entry guards vs. mobile users” problem:
Subgraph’s torshiftchange
[… moved to the blueprint …]
tordyguards
[… moved to the blueprint …]
What to do?
[… moved to the blueprint …]
#15 Updated by intrigeri 2015-05-17 14:33:54
- blocks Feature #5774: Robust time syncing added
#16 Updated by intrigeri 2015-05-17 14:34:11
- blocked by deleted (
Feature #5774: Robust time syncing)
#17 Updated by intrigeri 2015-05-17 14:34:19
- blocked by Feature #5774: Robust time syncing added
#18 Updated by intrigeri 2015-05-17 14:41:28
- Blueprint set to https://tails.boum.org/blueprint/persistent_Tor_state/
#19 Updated by intrigeri 2015-05-17 14:42:03
- Type of work changed from Code to Research
#20 Updated by intrigeri 2015-05-17 17:13:48
- Description updated
(Moved description to the blueprint.)
#21 Updated by intrigeri 2015-05-17 21:33:46
- Status changed from Confirmed to In Progress
#22 Updated by intrigeri 2015-05-18 14:40:47
Sent a RFC to tails-dev@.
#23 Updated by sajolida 2015-08-14 12:15:43
- Description updated
- Assignee set to intrigeri
#24 Updated by sajolida 2015-09-10 12:04:49
- Target version changed from Hardening_M1 to 2017
#25 Updated by sajolida 2015-11-30 09:23:40
Blueprint is mentioning “Do not ask me again”, so adding a relation with Feature #10553.
#26 Updated by intrigeri 2015-12-15 09:22:34
- related to Feature #10553: Add "Don't ask me again" option to notifications where appropriate added
#27 Updated by intrigeri 2015-12-15 09:22:51
sajolida wrote:
> Blueprint is mentioning “Do not ask me again”, so adding a relation with Feature #10553.
I just did it.
#28 Updated by intrigeri 2015-12-15 09:24:00
NetworkManager folks are designing something similar to solve a similar problem: https://blogs.gnome.org/lkundrak/2015/12/03/networkmanager-and-privacy-in-the-ipv6-internet/
#29 Updated by sajolida 2016-02-09 11:12:54
- related to
Bug #11070: Easy import/export of state file. added
#30 Updated by Dr_Whax 2016-08-20 12:52:19
- Description updated
- Status changed from In Progress to Confirmed
- Assignee changed from intrigeri to segfault
#31 Updated by cypherpunks 2016-09-26 14:37:27
Tails wrote:
> See the blueprint.
>
> Team: segfault, anonym, sycamoreone
Wouldn’t a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?
#32 Updated by intrigeri 2016-09-28 02:47:52
> Wouldn’t a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?
What do you mean exactly with “persistent Tor state”? Which files do you have in mind?
#33 Updated by cypherpunks 2016-11-26 19:02:40
intrigeri wrote:
> > Wouldn’t a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?
>
> What do you mean exactly with “persistent Tor state”? Which files do you have in mind?
As a temporary solution, there could be an option in “Configure persistent volume” to “save” Tor “settings”. Upon reboot Tails could take note of the guards in use and save them in Peristent. At the next boot, Tor would pull the guards from Persistent and use them instead whatever it was going to use.
This is roughly what I had in mind. I don’t know how viable this would be as I’m only a Tails user.
#34 Updated by cypherpunks 2016-11-26 20:56:43
Persistent Tor State (file) keeps users from controlling Tor.
Tails restricts control of the file system, most notably, /tor.
Why are these projects colluding to control the user?
#35 Updated by BitingBird 2017-08-28 20:16:19
- Description updated
- Target version changed from 2017 to 2018
#36 Updated by cypherpunks 2017-09-11 11:46:01
I consider Tails picking a new set of guards each time it boots to be a feature. This is not the same as saying “UseGuards 0”, which picks a new first hop for each circuit - that would be crazy!
But using the same guards on different tails sessions is not actually something I want to do. If I’m at home, and then at work, and then at a cafe, I don’t want to be connecting to the same guards in each place. This makes it easy for a passive adversary at the local ISP to link all of my sessions together!
There is a years old Tor Trac ticket about this problem which I just re-opened: https://trac.torproject.org/projects/tor/ticket/10969
It links to two different projects meant to mitigate this issue by having different state files for different locations. But the easiest way to avoid this linkability problem today is to simply use tails - unless this ticket is implemented! So, please reconsider. Thanks!
#37 Updated by intrigeri 2017-09-28 12:15:12
- Description updated
#38 Updated by intrigeri 2018-09-14 08:27:30
- Description updated
- Target version changed from 2018 to 2019
Postponing as per summit 2018. But we need a team => see upcoming email to -summit@.
#39 Updated by intrigeri 2018-10-11 09:33:37
- Description updated
- Assignee deleted (
segfault) - Target version deleted (
2019)