Feature #5462

Persistence preset: Tor state

Added by Tails over 3 years ago. Updated 11 days ago.

Status:ConfirmedStart date:08/26/2016
Priority:NormalDue date:
Assignee:segfault% Done:

0%

Category:Persistence
Target version:2017
QA Check: Blueprint:

https://tails.boum.org/blueprint/persistent_Tor_state/

Feature Branch: Easy:No
Type of work:Research Affected tool:

Description

See the blueprint.

Team: segfault, anonym, sycamoreone


Subtasks

Feature #11732: Make guard nodes stable across rebootConfirmed


Related issues

Related to Tails - Feature #5461: Persistence preset: Tor configuration Confirmed
Related to Tails - Feature #10553: Add "Don't ask me again" option to notifications where appropriate Confirmed 11/16/2015
Related to Tails - Bug #11070: Easy import/export of state file. Rejected 02/07/2016
Blocked by Tails - Feature #5774: Robust time syncing In Progress 05/17/2015

History

#1 Updated by intrigeri about 3 years ago

  • Category set to Persistence
  • Easy set to No

#2 Updated by Anonymous almost 3 years ago

(removed spam)

#3 Updated by Anonymous almost 3 years ago

(removed spam)

#4 Updated by intrigeri almost 3 years ago

  • Description updated (diff)

#5 Updated by Anonymous almost 3 years ago

(removed spam)

#6 Updated by Anonymous almost 3 years ago

(removed spam)

#7 Updated by Anonymous almost 3 years ago

(removed spam)

#8 Updated by BitingBird over 2 years ago

  • Subject changed from persistence preset - tor to Persistence preset - tor

#9 Updated by intrigeri over 2 years ago

  • Subject changed from Persistence preset - tor to Persistence preset - Tor state

#10 Updated by intrigeri over 2 years ago

  • Description updated (diff)

#11 Updated by sajolida almost 2 years ago

#12 Updated by BitingBird over 1 year ago

  • Subject changed from Persistence preset - Tor state to Persistence preset: Tor state

#13 Updated by intrigeri over 1 year ago

#14 Updated by anonym over 1 year ago

I had a look at the tools solving the "Persistent entry guards vs. mobile users" problem:

Subgraph's torshiftchange

[... moved to the blueprint ...]

tordyguards

[... moved to the blueprint ...]

What to do?

[... moved to the blueprint ...]

#15 Updated by intrigeri over 1 year ago

#16 Updated by intrigeri over 1 year ago

#17 Updated by intrigeri over 1 year ago

#18 Updated by intrigeri over 1 year ago

  • Blueprint set to https://tails.boum.org/blueprint/persistent_Tor_state/

#19 Updated by intrigeri over 1 year ago

  • Type of work changed from Code to Research

#20 Updated by intrigeri over 1 year ago

  • Description updated (diff)

(Moved description to the blueprint.)

#21 Updated by intrigeri over 1 year ago

  • Status changed from Confirmed to In Progress

#22 Updated by intrigeri over 1 year ago

#23 Updated by sajolida over 1 year ago

  • Description updated (diff)
  • Assignee set to intrigeri

#24 Updated by sajolida about 1 year ago

  • Target version changed from Hardening_M1 to 2017

#25 Updated by sajolida about 1 year ago

Blueprint is mentioning "Do not ask me again", so adding a relation with #10553.

#26 Updated by intrigeri 12 months ago

  • Related to Feature #10553: Add "Don't ask me again" option to notifications where appropriate added

#27 Updated by intrigeri 12 months ago

sajolida wrote:

Blueprint is mentioning "Do not ask me again", so adding a relation with #10553.

I just did it.

#28 Updated by intrigeri 12 months ago

NetworkManager folks are designing something similar to solve a similar problem: https://blogs.gnome.org/lkundrak/2015/12/03/networkmanager-and-privacy-in-the-ipv6-internet/

#29 Updated by sajolida 10 months ago

  • Related to Bug #11070: Easy import/export of state file. added

#30 Updated by Dr_Whax 4 months ago

  • Description updated (diff)
  • Status changed from In Progress to Confirmed
  • Assignee changed from intrigeri to segfault

#31 Updated by cypherpunks 2 months ago

Tails wrote:

See the blueprint.

Team: segfault, anonym, sycamoreone

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

#32 Updated by intrigeri 2 months ago

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

What do you mean exactly with "persistent Tor state"? Which files do you have in mind?

#33 Updated by cypherpunks 12 days ago

intrigeri wrote:

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

What do you mean exactly with "persistent Tor state"? Which files do you have in mind?

As a temporary solution, there could be an option in "Configure persistent volume" to "save" Tor "settings". Upon reboot Tails could take note of the guards in use and save them in Peristent. At the next boot, Tor would pull the guards from Persistent and use them instead whatever it was going to use.

This is roughly what I had in mind. I don't know how viable this would be as I'm only a Tails user.

#34 Updated by cypherpunks 11 days ago

Persistent Tor State (file) keeps users from controlling Tor.

Tails restricts control of the file system, most notably, /tor.

Why are these projects colluding to control the user?

https://cpunks.org

Also available in: Atom PDF