guardianproject / orbot

The Github home of Orbot: Tor on Android (Also available on gitlab!)
https://gitlab.com/guardianproject/orbot
Other
2.27k stars 338 forks source link

[Feature Request] Orbot's default SOCKS port settings could be better #1192

Open twesterhever opened 4 weeks ago

twesterhever commented 4 weeks ago

Is your feature request related to a problem? Please describe. While using Orbot, I noticed two default SOCKS port settings differ from those used in conjunction with Tor Browser on desktop operating systems:

The latter became obvious when multiple websites blocked my requests, displaying the same source IP address.

Describe the Solution You'd Like To the best of my understanding, both of the discrepancies to Tor Browser on desktop operating systems are somewhat detrimental to the anonymity of Orbot users:

Describe the Alternatives You've Considered N/A

Additional Context N/A

syphyr commented 3 weeks ago

IsolateDestAddr is not the default because you don't want all of the facebook thumbs to use the same circuit, you want all of the stuff on each page to use the same circuit.

Tor browser configures its socksport with the KeepAliveIsolateSOCKSAuth flag and then it indicates which things should be isolated from each other by user:password in the socks handshake. Tor browser also does not enable IsolateDestAddr.

twesterhever commented 3 weeks ago

I see, thank you for clarifying. Would it make sense to toggle IsolateDestAddr depending on the number of apps Orbot is configured to process network traffic for? Assuming more than one app is selected, my understanding is that correlating traffic at exit node level, as outlined above, remains a threat to the user's anonymity which can be mitigated by enabling IsolateDestAddr. Am I mistaken here?

Does this have any impact on the PreferIPv6 topic? Would you prefer a dedicated issue for that one?

syphyr commented 1 week ago

I see, thank you for clarifying. Would it make sense to toggle IsolateDestAddr depending on the number of apps Orbot is configured to process network traffic for? Assuming more than one app is selected, my understanding is that correlating traffic at exit node level, as outlined above, remains a threat to the user's anonymity which can be mitigated by enabling IsolateDestAddr. Am I mistaken here?

Does this have any impact on the PreferIPv6 topic? Would you prefer a dedicated issue for that one?

Tor browser also uses the PreferIPv6 flag, so there is no reason to change that default setting.

Enabling IsolateDestAddr may improve privacy at the exit node, but it was not recommended to use when I asked about it in #tor.