[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #5611 [TorBrowserButton]: Enhance "Transparent Torification (Requires custom transproxy or Tor router)" in Tor Button.
#5611: Enhance "Transparent Torification (Requires custom transproxy or Tor
router)" in Tor Button.
------------------------------+---------------------------------------------
Reporter: proper | Owner: mikeperry
Type: defect | Status: new
Priority: major | Milestone:
Component: TorBrowserButton | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------------+---------------------------------------------
I suppose you don't want people, who are behind a (Tor) transproxy or Tor
router, to use Tor over Tor. Currently there is no standalone Tor Browser
(#5236). So if they install Tor Browser, they use Tor over Tor (works,
slow and recommend or advised against?). Suggestion: once Transparent
Torification is activated, Tor Browser instantly starts standalone,
without starting Tor or Vidalia.
Ideally one could select this feature before Vidalia and Tor try
bootstrapping through the Tor proxy, e.g. by passing an option to the
launch shortcut/script
There is currently a workarround in the wiki. ("Edit 'start-tor-browser'
script and change the line: './App/vidalia --datadir Data/Vidalia/' to
'./App/Firefox/firefox -profile ./Data/profile'") But that can't become
the official recommendation to use Transparent Torification?
And how will Transparent Torification be compatible with SOCKS username
for stream isolation? (#3455)
There is no documentation about Transparent Torification. What is the
current implementation... Will it simply disable the proxy and work as a
normal browser without proxy settings? Then SOCKS username for stream
isolation wouldn't be usable with Transparent Torification.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5611>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs