Archive for March, 2009

Torora: a lightweight cross-platform browser for dedicated use with Tor

Torora is a lightweight cross-platform browser for dedicated anonymous browsing with Tor.
As a dedicated Tor browser, Torora provides explicit state separation for the user. This means they cannot fall into the trap of mixing anonymous and non-anonymous browsing with the same application. Torora prevents the user from browsing until it has verified the presence of a working Tor installation. Torora disables/modifies all browser behaviour that may allow the user to leak information to remote eavesdroppers. The Torora project includes a patch for webkit that allows users to enable javascript while protecting against common javascript-based profiling attacks.

Torora

Torora

No Comments

Torsocks

I’ve started maintaining Torsocks , a utility which allows you to use most socks-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you’re using.

Torsocks is commonly used with command-line utilities such as telnet, ssh and irssi. However it’s also suitable for ‘torifying’ popular GUI aplications such as pidgeon.

Torsocks is hosted in the Tor project’s source code repository and is the default socks client supported by Tor. It runs on Linux, BSD and Mac OSX.

Once you have installed torsocks, just launch it like so:

usewithtor [application]

So, for example you can use ssh to connect to some.ssh.com by doing:

usewithtor ssh username@some.ssh.com

1 Comment

Wireshark Dissector: Tor Protocol

View and analyze Tor traffic in Wireshark. It should be useful for researchers analyzing the behaviour of various versions of the Tor client. This patchset will not allow you to decrypt the traffic of an Onion Router (i.e. a relay node on the Tor network), only the traffic coming to and from the Tor client on your machine (i.e. an Onion Proxy). Doing the former would require a different patch to Tor and apart from being unethical might even be illegal in your jurisdiction! (You would be snooping on the traffic of other Tor users.)

Tor Dissector

Tor Dissector

No Comments