Using Tor correctly: Anonymous browsing edition

Automated disclaimer: This post was written more than 15 years ago and I may not have looked at it since.

Older posts may not align with who I am today and how I would think or write, and may have been written in reaction to a cultural context that no longer applies. Some of my high school or college posts are just embarrassing. However, I have left them public because I believe in keeping old web pages aliveā€”and it's interesting to see how I've changed.

Tor is a popular system for sending Internet traffic anonymously. It is mainly used for three purposes: hiding one's identity, hiding the identity of the site one is visiting, and hiding the data that one is sending and receiving. However, using Tor without some basic precautions is worse than not using Tor at all, leading to privacy violations, data theft, and security concerns. Here, I cover browser security with respect to preventing identity and data leakage when using the Tor network. If you are only using it to defeat web filtering, feel free to read only the section called "Locking yourself down".

At the end is an executive summary. Use it as a guideline, but make sure to read this entire post first -- it contains important instructions on how to change your browsing habits.

Security is a mindset

Anonymity, security, and privacy are not all-or-nothing. Each is a continuum, and the goal of the security-conscious individual is to move a reasonable distance towards the secure end of the spectrum. How far an individual decides to go depends on the specific circumstances: the importance of the data or identity being protected, the consequences of a breach, the likelihood of an attack, the resources of the attacker, and the resources of the individual. In this guide I am concentrating on defeating automated attacks by a casual attacker. Anything above that likely falls outside of the realm of Tor security, and more into the realm of application, data, and physical security. Besides, it would be silly to put in place any security measures more robust than Tor itself -- rememebr that Tor is experimental software.

I will first discuss the Tor threat model, and only then provide suggestions as to how to alleviate threats. You need to understand the system you are using before you can really rely on it, otherwise you will develop a false sense of security. So hang in there.

What you need to know about Tor

Tor uses a client-peer model. The client is what you install on your computer. It accepts connections from other programs on your computer (such as webpage requests from your browser) and sends the data out to the Tor network. (Any responses also come back through the Tor client.) Note that the Tor client is data-blind, meaning that it does not check the data flowing through it for potential identity leaks or malware.

Any program that wants to use the Tor network has to be configured to do so. Simply installing the Tor client is not enough.

Each of the peers is a computer like your own, but running an extra part of Tor: the server. These computers are referred to as "nodes" or "onion routers", and your data flows through them. When data leaves the Tor client, it passes through a randomly predetermined chain of these nodes. Due to the Tor algorithms, each node only knows who is immediately before and after it in the chain. Only the first one knows who you are, and only the last one knows where your data is going. Only the last one (the "exit node") can read the data you are sending out. Note that it can also alter the data you are sending and receiving. Therefore, the trustworthiness of the websites you contact is not relevant, since the data you and they send has to pass through an untrusted thrid party.

Threat model

Attacks can be launched against the Tor network itself, such as timing attacks, but we're not concerned about that here. The goal is to secure the data that is flowing through the pipes, and let the Tor programmers secure the pipes themselves. Here are the threats you need to be concerned about:

  • Personally identifiable information (PII) that you send out
  • Code sent to you that will reveal your identity from inside Tor
  • Code sent to you that will reveal your identity from outside Tor

Locking down Firefox

Make sure you have the latest stable version of Mozilla Firefox installed. Older versions have known security holes.

For several reasons, you should create another Firefox account. (Another reason is to keep you mindful of when you are using Tor and when you are not.) The best way of doing this is to create another user on your computer specifically for Tor browsing. If you can't do that, learn how to use the Firefox profile manager. The rest of these instructions will assume you are using that new Firefox account.

Locking yourself down

Ultimately, you are the weakest link in the chain of security. Here's the proper mindset for browsing through Tor: Assume that the URLs of the pages you ask for and any data you send or receive is being broadcast to the entire world. Assume that the exit node has secretly altered the page you are looking at, or even altered your request to secretly go to a different website. Since the data you send and receive can be altered and read by an untrusted third party, how can you do anything at all? There's one trick that will defeat a malicious exit node: SSL. When a page's URL begins with https://, that means that SSL is in effect. SSL prevents the exit node from reading the data going back and forth or altering it. (It can only see three things: the site you are talking to, the timing of the data, and the size of the data.) If you visit a site and the browser tells you that the SSL certificate may be invalid, don't trust it! If there is any doubt about the authenticity of the SSL certficate, pretend the site isn't using SSL at all and act accordingly.

This means never log in to a site if the login does not use SSL. Otherwise, your password will be stolen.

Just to be on the safe side, turn on warnings for secure and insecure sites. At the Firefox configuration URL about:config, find the keys beginning with security.warn_. Set all of them to true, except for the once ending in .show_once, which should be set to false. Then set security.warn_entering_secure to false -- you really don't need to be alerted to that.

I recommend installing a theme from mozilla.org that is somewhat different from your usual theme. This will help you remember that you are using Tor (and should therefore browse defensively.)

Additionally, if you are using Tor for anonymity... don't send any information that can identify you. That includes not using your real name or email address, by the way.

Keeping PII out of the data

Now that you have a clean slate to work from, let's make sure it doesn't get dirtied up. In Firefox, open the Preferences window (Mac: Firefox->Preferences, Linux: Edit->Preferences, Windows: Tools->Options.)

Websites are allowed to store bits of information (called "cookies") on your computer, so they know who you are when you come back. This is great for regular browsing, but not when you want to dissociate from your real identity. (A website might notice that your real identity and Tor identity are using the same cookie, meaning you're the same person.) Since you've already created a new Firefox account, you won't need to worry about crossover. However, you do have to worry about cross-site cookies. Under Preferences->Privacy->Cookies, allow cookies for the originating website only, and have them kept only until Firefox is closed. You may wish to disable cookies altogether, and use the Exceptions button to allow specific sites.

Remove internal leaks

Leaks within the Tor channel are generally caused by plugin technologies such as Java and Flash. These can share information about you across sites, and more importantly they know your real IP address and can communicate this back to their home server. Install the following extensions from mozilla.org:

  • FlashBlock: Blocks Flash objects by default.
  • NoScript: Block javascript and plugins, allow selectively. In the NoScript options, disallow everything (for now). Disabling Java here is equivalent to disabling Java in the Firefox Preferences window.

Remove external leaks

Webpage requests are not the only data that are sent out when you visit a URL. Your browser also has to determine what the IP address of the server is, a process called DNS resolution. To force DNS requests into the Tor channel, visit the special URL about:config and find the key network.proxy.socks_remote_dns. Set it to true.

Summary

(I sure hope you read all the stuff above this and didn't just skip down here right away.)

  1. Create a new Firefox account (use the profile manager or a new user account in your OS)
  2. Assume someone is maliciously reading and altering everything not sent through an https:// connection with a good certificate.
  3. In about:config, turn the security.warn_* alerts on, and the one-time option off.
  4. Use a different Firefox theme.
  5. Allow cookies for the originating site, and only until Firefox is closed. You might turn cookies off.
  6. Install the FlashBlock and NoScript extensions, and configure them to disallow everything.
  7. Set the about:config property network.proxy.socks_remote_dns to true.

Oh, and now would be a good time to install the TorButton extension, configure it to display the way you like, and turn it on. Once you've done that go to Preferences->Privacy and use the Clear Private Data tool.

This set of guidelines is not complete, but following it will probably put you ahead of the majority of Tor users. Armed with some knowledge of how the Tor network functions, you'll be able to make better choices. Safe browsing!

Responses: 12 so far Feed icon

  1. Sally Carson says:

    This is really interesting Tim!

    I'm wondering if Tor is a system that people in countries with restricted internet access (like China) can use to hide their location? Would this help them get through the Great Firewall?

  2. Tim McCormack says:

    You bet. Of course, the same rules apply: they should do all of their anonymous web stuff in a separate account, and not do general browsing through Tor. (Otherwise, you're just asking for either a) your identity to be revealed, or b) your passwords to be stolen.)

  3. Tim says:

    I'm Editor in Chief of PCLinuxOS Magazine. Recently I needed anonymity for a while and found Tor an effective tool. We published a very short "how to install" in November.

    I think your article would be of interest to our readers. May I have permission to publish it, with full credits, of course?

    Contact me at the email address I placed with this request. Our magazine can be found at http://mag.mypclinuxos.com

    Thanks,

    Tim

    [Admin note: replied by email.]

  4. Amit Pandita says:

    I am an employee in a small firm. use tor very often. wanted to know how to avoid the repetition of the same ip's while usind tor even when we change its user identity. Regards. Amit

  5. Ron Gauci says:

    Love it. At last I can communicate with some of my friends without any fear.....

  6. Torddy says:

    What about using Tor with chrome? There don't seem to be any articles on how to optimize my chrome browser for maximum efficiency using tor.

  7. Tim McCormack says:

    Author note: Due to interest in reprinting, I'm putting this blog entry under the Creative Commons Attribution Share-Alike 3.0 Unported license ("cc-by-sa v3.0"). As usual, I am leaving off the "NC" clause, because defining commercial use is tricky.

    I also hereby release it under the GFDL v1.3, if that's your bag.

  8. Louis says:

    Thank you very much for this article. I appreciate the extra security you have just granted me! Have you considered HTTPS everywhere as another layer of protection? I use it.

  9. Sean A.O. Harney says:

    Therefore, the trustworthiness of the websites you contact is not relevant, since the data you and they send has to pass through an untrusted thrid party.

    I would hope the trustworthyness of the website is relevant still. Both of those layers of the onion, the TOR exit node, and the webserver might be the weak link in the chain on onion layers.

  10. Chris says:

    Excellent post. Still very relevant 5+ years later. Tor is an excellent utility and it's important to know how to properly use it. Just like anything else available in any category of life... if you don't know how to properly use it then you probably shouldn't be using it.

  11. Someone says:

    FYI: From the Flashblock website... https://addons.mozilla.org/en-US/firefox/addon/flashblock/

    "Note: Flashblock does not work with Javascript disabled or with NoScript installed."

  12. Morgan says:

    Hi,

    I'm in the about:config screen in Firefox (vers. 20.0) and I want to change all keys beginning with security.warn_...... to true accept the ones ending show once which I want set to false.

    The thing is, there are no lines with this. The closest I can see is security.ssl.warn_missing_rfc5746;1. There are a bunch of lines beginning with security.ssl3.... but nothing with security.warn_.......

    Am I missing something here?

    Thanks.

Self-service commenting is not yet reimplemented after the Wordpress migration, sorry! For now, you can respond by email; please indicate whether you're OK with having your response posted publicly (and if so, under what name).