[tbb-bugs] #28556 [Applications/Tor Browser]: Detect other installed circumvention tools and offer them as transports

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Nov 21 07:35:26 UTC 2018


#28556: Detect other installed circumvention tools and offer them as transports
------------------------------------------+----------------------
     Reporter:  arma                      |      Owner:  tbb-team
         Type:  project                   |     Status:  new
     Priority:  Medium                    |  Milestone:
    Component:  Applications/Tor Browser  |    Version:
     Severity:  Normal                    |   Keywords:  ux-team
Actual Points:                            |  Parent ID:
       Points:                            |   Reviewer:
      Sponsor:  Sponsor19                 |
------------------------------------------+----------------------
 If the Tor Browser user has Lantern installed on the system too, and
 direct Tor traffic is blocked, wouldn't it be cool to offer the user the
 option to send their Tor traffic via Lantern into the Tor network?

 More broadly, many tools focus on "access" rather than Tor's more
 comprehensive goal of "safe access", and while each of them offers
 tradeoffs around performance, reliability, and safety, it seems like a net
 win to make it straightforward for Tor Browser (via the pluggable
 transport selection menu) to route through them if they're present.

 One stumbling block: some of these access tools try to make it hard for
 other processes on the system to notice that they're present. I hear
 Lantern is one of those -- it uses simple techniques like randomizing its
 proxy port, but it doesn't currently use more sophisticated approaches
 like changing its process name. But "detecting apps that don't want to be
 detected" doesn't seem like a fun arms race for Tor Browser to get into.

 Another stumbling block: some of these access tools are centralized, which
 makes it sketchier to route traffic through them. But we already accept
 exactly this tradeoff in the case of meek, so I'm ok with this angle.

 So, to make this ticket more concrete:

 * Let's make a list of other "access" tools in our space that we'd like to
 play well with.

 * Then let's ask each of them if they'd like to offer some API for us to
 detect their presence and learn how exactly to use them (similar to Tor's
 "ControlPortWriteToFile" config option, which writes out a file with
 parameters on how to interact with the running Tor).

 * Assuming the resulting set isn't empty, let's teach Tor Launcher how to
 configure Tor to use them, and add the option(s) to Tor Browser's
 pluggable transport menu.

 (The VPN interfaces are I think different from this idea, since in that
 world they already have the notion of either selecting what apps to
 capture traffic from, or they just ask to capture all traffic. So there's
 nothing the Tor Browser needs to do for those cases. Unless I'm wrong?)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28556>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tbb-bugs mailing list