Feature #5462

Persistence preset: Tor state

Added by Tails over 3 years ago. Updated 3 months ago.

Status:ConfirmedStart date:08/26/2016
Priority:NormalDue date:
Assignee:segfault% Done:

0%

Category:Persistence
Target version:2017
QA Check: Blueprint:

https://tails.boum.org/blueprint/persistent_Tor_state/

Feature Branch: Easy:No
Type of work:Research Affected tool:

Description

See the blueprint.

Team: segfault, anonym, sycamoreone


Subtasks

Feature #11732: Make guard nodes stable across rebootConfirmed


Related issues

Related to Tails - Feature #5461: Persistence preset: Tor configuration Confirmed
Related to Tails - Feature #10553: Add "Don't ask me again" option to notifications where appropriate Confirmed 11/16/2015
Related to Tails - Bug #11070: Easy import/export of state file. Rejected 02/07/2016
Blocked by Tails - Feature #5774: Robust time syncing In Progress 05/17/2015

History

#1 Updated by intrigeri over 3 years ago

  • Category set to Persistence
  • Easy set to No

#2 Updated by Anonymous about 3 years ago

(removed spam)

#3 Updated by Anonymous about 3 years ago

(removed spam)

#4 Updated by intrigeri about 3 years ago

  • Description updated (diff)

#5 Updated by Anonymous about 3 years ago

(removed spam)

#6 Updated by Anonymous about 3 years ago

(removed spam)

#7 Updated by Anonymous about 3 years ago

(removed spam)

#8 Updated by BitingBird over 2 years ago

  • Subject changed from persistence preset - tor to Persistence preset - tor

#9 Updated by intrigeri over 2 years ago

  • Subject changed from Persistence preset - tor to Persistence preset - Tor state

#10 Updated by intrigeri over 2 years ago

  • Description updated (diff)

#11 Updated by sajolida about 2 years ago

#12 Updated by BitingBird almost 2 years ago

  • Subject changed from Persistence preset - Tor state to Persistence preset: Tor state

#13 Updated by intrigeri almost 2 years ago

#14 Updated by anonym almost 2 years ago

I had a look at the tools solving the "Persistent entry guards vs. mobile users" problem:

Subgraph's torshiftchange

[... moved to the blueprint ...]

tordyguards

[... moved to the blueprint ...]

What to do?

[... moved to the blueprint ...]

#15 Updated by intrigeri almost 2 years ago

#16 Updated by intrigeri almost 2 years ago

#17 Updated by intrigeri almost 2 years ago

#18 Updated by intrigeri almost 2 years ago

  • Blueprint set to https://tails.boum.org/blueprint/persistent_Tor_state/

#19 Updated by intrigeri almost 2 years ago

  • Type of work changed from Code to Research

#20 Updated by intrigeri almost 2 years ago

  • Description updated (diff)

(Moved description to the blueprint.)

#21 Updated by intrigeri almost 2 years ago

  • Status changed from Confirmed to In Progress

#23 Updated by sajolida over 1 year ago

  • Description updated (diff)
  • Assignee set to intrigeri

#24 Updated by sajolida over 1 year ago

  • Target version changed from Hardening_M1 to 2017

#25 Updated by sajolida about 1 year ago

Blueprint is mentioning "Do not ask me again", so adding a relation with #10553.

#26 Updated by intrigeri about 1 year ago

  • Related to Feature #10553: Add "Don't ask me again" option to notifications where appropriate added

#27 Updated by intrigeri about 1 year ago

sajolida wrote:

Blueprint is mentioning "Do not ask me again", so adding a relation with #10553.

I just did it.

#28 Updated by intrigeri about 1 year ago

NetworkManager folks are designing something similar to solve a similar problem: https://blogs.gnome.org/lkundrak/2015/12/03/networkmanager-and-privacy-in-the-ipv6-internet/

#29 Updated by sajolida about 1 year ago

  • Related to Bug #11070: Easy import/export of state file. added

#30 Updated by Dr_Whax 6 months ago

  • Description updated (diff)
  • Status changed from In Progress to Confirmed
  • Assignee changed from intrigeri to segfault

#31 Updated by cypherpunks 5 months ago

Tails wrote:

See the blueprint.

Team: segfault, anonym, sycamoreone

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

#32 Updated by intrigeri 5 months ago

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

What do you mean exactly with "persistent Tor state"? Which files do you have in mind?

#33 Updated by cypherpunks 3 months ago

intrigeri wrote:

Wouldn't a temporary solution be to let users have a persistent Tor state if they have Persistence enabled?

What do you mean exactly with "persistent Tor state"? Which files do you have in mind?

As a temporary solution, there could be an option in "Configure persistent volume" to "save" Tor "settings". Upon reboot Tails could take note of the guards in use and save them in Peristent. At the next boot, Tor would pull the guards from Persistent and use them instead whatever it was going to use.

This is roughly what I had in mind. I don't know how viable this would be as I'm only a Tails user.

#34 Updated by cypherpunks 3 months ago

Persistent Tor State (file) keeps users from controlling Tor.

Tails restricts control of the file system, most notably, /tor.

Why are these projects colluding to control the user?

https://cpunks.org

Also available in: Atom PDF