Stream the following services https://gitlab.torproject.org/tpo/core/arti.git
Go to file
eta 5bdc44d14d Merge branch 'proto-circuit-refactor' into 'main'
Completely overhaul the tor-proto circuit reactor

See merge request tpo/core/arti!126
2021-11-12 15:22:21 +00:00
.cargo-husky/hooks Reorder Cargo Husky hooks 2021-08-25 14:53:22 -07:00
.gitlab/issue_templates Adds issue creation templates for bugs, features, proposals and documentation. 2020-12-17 13:57:06 -03:00
arti-corpora@f6f889d3d3 Latest arti-corpora. 2021-09-07 15:51:10 -04:00
crates Get rid of unbounded stream sender, and RawCellStream 2021-11-12 15:04:27 +00:00
doc Add a file to track per-crate semver status. 2021-11-11 10:35:38 -05:00
maint Add a shell script to find binary size and download size. 2021-11-09 12:11:20 -05:00
tests/chutney move integration tests to scripts 2021-10-28 11:28:22 -04:00
.gitignore move integration tests to scripts 2021-10-28 11:28:22 -04:00
.gitlab-ci.yml In rust-nightly CI, forbid debugging prints. 2021-11-04 11:13:29 -04:00
.gitmodules use https submodule 2021-08-30 16:22:38 +02:00
.typos.toml Fix some typos in comments. 2021-10-19 10:40:32 -04:00
CHANGELOG.md Typo fix in Changelog 2021-10-29 10:27:22 -04:00
CODE_OF_CONDUCT Fix typos and cleanup 2021-10-25 19:58:42 +03:00
CONTRIBUTING.md Improve and future-proof the `arti` CLI 2021-10-27 19:11:48 +01:00
Cargo.lock Completely overhaul the tor-proto circuit reactor 2021-11-12 15:04:24 +00:00
Cargo.toml Tune the 'profile.release' options for a smaller compile size. 2021-11-08 14:33:10 -05:00
README.md readme: Add crates.io badge at the top 2021-10-29 12:15:18 -04:00
WANT_FROM_OTHER_CRATES Remove doubly incorrect entry from WANT_FROM_OTHER_CRATES 2021-11-08 16:11:27 -05:00

README.md

Crates.io

Arti: reimplementing Tor in Rust

Arti is a project to produce an embeddable, production-quality implementation of the Tor anonymity protocols in the Rust programming language.

Arti is not ready for production use; see below for more information.

Why rewrite Tor in Rust?

Rust is more secure than C. Despite our efforts, it's all too simple to mess up when using a language that does not enforce memory safety. We estimate that at least half of our tracked security vulnerabilities would have been impossible in Rust, and many of the others would have been very unlikely.

Rust enables faster development than C. Because of Rust's expressiveness and strong guarantees, we've found that we can be far more efficient and confident writing code in Rust. We hope that in the long run this will improve the pace of our software development.

Arti is more flexible than our C tor implementation. Unlike our C tor, which was designed as SOCKS proxy originally, and whose integration features were later "bolted on", Arti is designed from the ground up to work as a modular, embeddable library that other applications can use.

Arti is cleaner than our C tor implementation. Although we've tried to develop C tor well, we've learned a lot since we started it back in 2002. There are lots of places in the current C codebase where complicated "spaghetti" relationships between different pieces of code make our software needlessly hard to understand and improve.

Current status

Arti is a work-in-progress. It can connect to the Tor network, bootstrap a view of the Tor directory, and make anonymized connections over the network.

We're not aware of any critical security features missing in Arti; but however, since Arti is comparatively new software, you should probably be cautious about using it in production.

There are no guarantees about API stability yet: if you write code that uses Arti, you should expect it to break with future versions. If you write an a configuration file for Arti, it might stop working in the future.

Trying it out today

Arti can act as a SOCKS proxy that uses the Tor network. It knows how to download directory information and how to load it from cache, but it doesn't try to download more than one directory per run.

To try it out, run the demo program in arti as follows. It will open a SOCKS proxy on port 9150.

% cargo run --release -- proxy

Again, do not use this program yet if you seriously need anonymity, privacy, security, or stability.

Minimum supported Rust Version

Arti should always build with the most recent stable Rust release, and may build with one or two older Rust releases. Eventually, we may declare some long-term Minimum Supported Rust Version (MSRV), but while Arti is still in its early stages, you'll need to stay up-to-date.

As of this writing (24 August 2021), Arti works with Rust 1.53 and later.

Helping out

Have a look at our contributor guidelines.

Roadmap

Thanks to a generous grant from Zcash Open Major Grants (ZOMG), we're able to devote some significant time to Arti in the years 2021-2022. Here is our rough set of plans for what we hope to deliver when.

The goal times below are complete imagination, based on broad assumptions about developer availability. Please don't take them too seriously until we can get our project manager to sign off on them.

  • Arti 0.0.1: Minimal Secure Client (Goal: end of October 2021??)

    • Target audience: developers
    • Guard support
    • Stream Isolation
    • High test coverage
    • Draft APIs for basic usage
    • Code cleanups
    • and more...
  • Arti 0.1.0: Okay for experimental embedding (Goal: Mid March, 2022??)

    • Target audience: beta testers
    • Performance: preemptive circuit construction
    • Performance: circuit build timeout inference
    • API support for embedding
    • API support for status reporting
    • Correct timeout behavior
    • and more...
  • Arti 1.0.0: Initial stable release (Goal: Mid September, 2022??)

    • Target audience: initial users
    • Security audit
    • Stable API
    • Stable CLI
    • Stable configuration format
    • Automatic detection and response of more kinds of network problems
    • More performance work
    • and more...
  • Arti 1.1.0: Anti-censorship features (Goal: End of October, 2022?)

    • Target audience: censored users
    • Bridges
    • Pluggable transports
    • and more...?
  • Arti 1.2.0: Onion service support (not funded, timeframe TBD)

  • Arti 2.0.0: Feature parity with C tor as a client (not funded, timeframe TBD)

  • Arti ?.?.?: Relay support

How can I help out?

See CONTRIBUTING.md for a few ideas for how to get started.

License

This code is licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

(The above notice, or something like it, seems to be pretty standard in Rust projects, so I'm using it here too. This instance of it is copied from the RustCrypto project's README.md file.)