-
Notifications
You must be signed in to change notification settings - Fork 8
/
faq.html.bak
327 lines (253 loc) · 25.1 KB
/
faq.html.bak
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8"/>
<title>TDP : FAQ</title>
<link type="text/css" rel="stylesheet" href="torbsd.css"/>
<meta name="author" content="gman999"/>
<meta name="editors" content="attila"/>
<meta name="date" content="20150505"/>
<meta name="note" content="These lines at the top are multimarkdown metadata; leave them."/>
<meta name="sep" content="&#8916;"/>
</head>
<body>
<h1 id="thetorbsddiversityprojecttdp"><a href="index.html">The Tor BSD Diversity Project (TDP)</a></h1>
<p>&#8916; <a href="blog.html">Blog</a> &#8916; <a href="faq.html">FAQ</a> &#8916; <a href="resources.html">Resources</a> &#8916; <a href="https://github.com/torbsd/">GitHub</a> &#8916; <a href="contact.html">Contact</a> &#8916; <a href="http://bptfp7py2wclht26.onion/">TDP Onion</a> &#8916;</p>
<p><strong><a href="projects.html">The TDP Projects</a>:</strong><br/>
&#8916; <a href="https://github.com/torbsd/openbsd-ports/">Tor Browser for OpenBSD</a> &#8916; <a href="relay-guides.html">BSD Relay Guides</a> &#8916; <a href="corp-relays.html">Corporate Relays</a> &#8916; <a href="porting-pets.html">Ports for PETs</a> &#8916; <a href="oostats.html">Statistics</a> &#8916;</p>
<h2 id="tdpfrequentlyaskedquestions"><strong>TDP</strong> Frequently Asked Questions</h2>
<p>Below are some typical questions about <strong>Tor BSD Diversity Project</strong>.
Feel free to <a href="contact.html">contact us</a> for questions or comments not
mentioned. Sooner rather than later this FAQ will need to be
categorized for clarity.</p>
<h2 id="howcanicontributetotdp">“How can I contribute to <strong>TDP</strong>?”</h2>
<p>To answer this question, we have to start with your particular skills.</p>
<dl>
<dt><strong>General</strong></dt>
<dd>Review our web site and documentation, and let us know if something is unclear or unstated. If you attend any BSD or open source events, print out some copies of the <strong>TDP</strong> informational flier. Join the <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd/">Tor-BSD mailing list</a>.</dd>
<dt><strong>Users</strong></dt>
<dd>As a BSD Tor Browser (TB) is available, start using and testing it on OpenBSD. Submit comments and questions.</dd>
<dt><strong>Developers</strong></dt>
<dd>Clone our repositories, build and break the software, submit tickets and patches.</dd>
<dt><strong>Tor BSD Relay Operators/Admins</strong></dt>
<dd>Run a BSD relay, use and review the relay guides, contribute input. Enlist your relay(s) the (unofficial) <a href="http://buildbot.pixelminers.net/">BSD Buildbot</a>.</dd>
<dt><strong>Potential Funders</strong></dt>
<dd><strong>TDP</strong> needs funding. Please contact <strong>TDP</strong> if interested in assisting us with funding, hardware donations, etc.</dd>
</dl>
<h2 id="iftdpisconcernedaboutoperatingsystemdiversitywhydoesitjustfocusonbsdsystemsandnototheroperatingsystemssuchasilluminos">“If <strong>TDP</strong> is concerned about operating system diversity, why does it just focus on BSD Systems, and not other operating systems such as Illuminos?”</h2>
<p><strong>TDP</strong> focuses on the BSDs due to our background and experience. It
is critical to note that our code and materials respect established
standards, and everything original we produce is under the
<a href="https://duckduckgo.com/l/?kh=-1&uddg=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FISC_license">ISC license</a>, a simplified version of the BSD 2-clause
license. <strong>TDP</strong> is commited to portability and interoperability. We
are building an open ecosystem.</p>
<p>In other words, if someone wanted to take <strong>TDP</strong> code and materials
and spawn a similar project based on another operating system, say
Plan 9, with the same eye on Tor diversity, <strong>TDP’s</strong> groundwork
should make that task easier. We are also open to hosting ports
work to other BSDs under cover of our GitHub account if e.g.,
some enterprising FreeBSD ports person wanted to work on it.</p>
<p>It is important to note that unlike the GNU/Linux distributions, the
BSD projects, <a href="http://www.freebsd.org/">FreeBSD</a>,
<a href="http://www.netbsd.org/">NetBSD</a>, <a href="http://www.openbsd.org/">OpenBSD</a> and
<a href="http://www.dragonflybsd.org/">DragonFly BSD</a>, are distinct operating
systems. While the Linux distributions share a reasonably common
kernel, each BSD project maintains its own kernel and userland, and
determines the third-party applications available. Each BSD project
evolved independently even though each originates with 386BSD Unix
from the early 1990s, or
<a href="http://mirrors.nycbug.org/pub/The_Unix_Archive/">earlier, depending on how it’s measured</a>. There is and continues to be a good deal of code-sharing between the
projects, including many kernel features and device drivers. However
over time, the major BSDs have chosen different focuses causing whole
aspects of their systems to diverge. For instance, each of the BSDs
has ported OpenBSD’s packet filter. Yet in the 1990’s, all the BSDs
used ipf by default. FreeBSD continues to provide ipfw, and NetBSD
developed npf, another firewall alternative.</p>
<p>The uniting aspects for all the BSDs is the preference for the
simplicity of BSD/ISC/MIT licensing and adherence to the guiding
tenets of classic Unix, such as portability, modularity and
interoperability.</p>
<h2 id="diversityitsallwritteninc.thelinuxdistrosandsomeofthebsdshavealotofcommonpieceslikegccopenssletc.">“Diversity? It’s all written in C. The Linux distros and some of the BSDs have a lot of common pieces like GCC, OpenSSL, etc.”</h2>
<p>Ultimately diversity <em>does</em> mean asking much broader questions. More
diversity in operating systems, hardware, SSL versions, geographical
locations, etc., the list could continue endlessly. It’s the right question
to ask, but <strong>TDP</strong> is only beginning to provide a small piece of a
response.</p>
<h2 id="whataboutothertypesofdiversitysuchasgeographical">What about other types of diversity, such as geographical?</h2>
<p><a href="https://torbsd.github.io/tor-less-ccs.txt">Here is a list of country codes that do not have any public Tor relays</a>. Please feel free to enlist any technically capable friends or family to start running Tor relays there.</p>
<h2 id="howmanytorrelaysarerunningabsd">“How many Tor relays are running a BSD?”</h2>
<p>The number and percentage of public Tor relays fluctuates, and this
applies to BSD relays as well. As of September 2016, the percentage is
just under 5%. Web sites such as <a href="http://torstatus.blutmagie.de/">BlutMagie</a>
provide a full list of public relays with a query function to determine
the exact current number among other data.</p>
<p><a href="https://metrics.torproject.org/platforms.html">Tor Metrics</a> provides
a clear graph that strikingly, and disturbingly in our opinions,
illustrates the monoculture in relay platforms.</p>
<h2 id="irunatorrelayonsuchandsuchlinuxdistribution.howhardwoulditbetorunabsdrelayforme">“I run a Tor relay on such and such Linux distribution. How hard would it be to run a BSD relay for me?”</h2>
<p>In reference to <a href="https://www.reddit.com/r/linux/comments/356iyy/torbsd_diversity_project_help_move_tor_nodes_from/">this Reddit thread</a>, anyone technical enough to run a robust and secure Tor relay should stick with the operating system they are most comfortable with. Nothing is more dangerous than someone running a public anonymity server on an unfamiliar operating system. <strong>We are not interested in “moving Tor nodes from Linux to BSD.”</strong> We want <em>more</em> nodes, preferably by increasing the number of BSD nodes faster, not by converting anyone to anything.</p>
<p>The best recent example of what TDP achieved is in Brazil. Before <a href="http://2015.bsdcon.com.br/">BSDCon Brasil</a>, there were 20 or so Tor relays, all Linux except for two Windows relays. After our presentation and discussions, there are around 5–9 operational relays, accounting for up to a third of observed bandwidth provided on the Tor network. The new relay administrators were BSD users with access to the necessary infrastructure, and their relays enhanced the Tor network.</p>
<p>To a large extent, <strong>TDP’s</strong> target audience is those already familiar
with the BSDs. Significant numbers in the BSD community have access to
data center space for running relays, are developers who hack code,
etc. It’s about getting the BSD community engaged into the Tor scene,
not so much vice-versa.</p>
<p>For those interested in running a BSD relay, command-line interactions
are similar enough to the Linux distros. While not the default shell
on any BSD, <a href="https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=bash">bash</a> is available as a port and package on all of them, although shells such as tcsh and ksh are more than capable in themselves. As a matter of fact, migrating from <a href="https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=bash">bash</a> might <a href="https://web.nvd.nist.gov/view/vuln/search-results?query=bash&search_type=all&cves=on">decrease security patching time</a> compared to <a href="https://web.nvd.nist.gov/view/vuln/search-results?query=tcsh&search_type=all&cves=on">tcsh</a> or even
<a href="https://web.nvd.nist.gov/view/vuln/search-results?query=ksh&search_type=all&cves=on">ancient, pre-OpenBSD versions of ksh</a>.</p>
<p>The BSD install processes vary, but after a few tries, it’s hardly a
difficult task. For the BSDs, there is no assumption that graphical
installers are “easier” than non-graphical ones.</p>
<p>Installing a package isn’t difficult either. To install the rsync
package on FreeBSD, for instance, the user just has to type “pkg
install rsync.” For OpenBSD, it’s just “pkg_add rsync.” NetBSD’s
<a href="http://www.netbsd.org/docs/pkgsrc/">pkgsrc</a> also maintains simple
syntax and is portable to a variety of other operating systems.</p>
<p>The important principle is to minimize the operating system footprint,
including daemons listening, applications installed, etc. If it’s a
Tor relay, it should not be multi-user system, and not a file server,
web server, etc. Use the default shell, use the base utilities as
opposed to third-party applications, keep the attack surface
minimized. On that final point, virtualization tends to <strong>increase</strong> that attack
surface, not decrease it.</p>
<p>With a little time and patience, running a BSD relay shouldn’t be an
insurmoutable task for any Linux user beyond those brand-new to
computing. For someone comfortable in the shell, editing files, and so
on, it is simple enough.</p>
<h2 id="whydidtorbrowserbundleworkstartwithopenbsdonthedesktopatleastisntfreebsdmorepopular">“Why did Tor Browser Bundle work start with OpenBSD? On the desktop at least, isn’t FreeBSD more popular?”</h2>
<p>FreeBSD may very well be more widely used, but operating system usage
statistics are wildly untrustworthy.</p>
<p>While all the BSDs aim to be standards compliant, OpenBSD is the most
orthodox in this respect. Therefore, if software runs on OpenBSD and
is accepted into their base or ports trees, porting that software to
another POSIX-compliant operating system is easier. There are
popular examples to mention, such as OpenSSH, arc4random, OpenNTPD and
for those who only read Slashdot.org over the past year, LibreSSL is
quickly gaining momentum as another piece of easily portable code from
the OpenBSD project.</p>
<p>With a production-quality OpenBSD Tor Browser, porting to other
BSDs or any other POSIX-based systems should be relatively trivial
task.</p>
<h2 id="canyoupleasebuildtorbrowsernotonlyfor-currentbutalsoforstableversionslike5.7and5.8onopenbsd"><a href="https://lists.torproject.org/pipermail/tor-dev/2015-October/009810.html">"Can you please build Tor Browser not only for -current but also for stable versions like 5.7 and 5.8</a> on OpenBSD?</h2>
<p>New OpenBSD ports are <a href="http://www.openbsd.org/faq/ports/testing.html">developed against OpenBSD -current</a>. To maintain versions for anything outside of -current at this point is beyond our resources, unfortunately.</p>
<h2 id="areyouassociatedwiththetorproject">“Are you associated with the Tor Project?”</h2>
<p><strong>TDP</strong> is <strong>not</strong> an official project of Tor. We are merely long-time Tor users and relay operators whose preferred platform is BSD Unix. We do maintain regular contact with Tor Project staff.</p>
<h2 id="whatdoyouhopetoaccomplishwithportingthetorbrowserbundletoopenbsd">“What do you hope to accomplish with porting the Tor Browser Bundle to OpenBSD?”</h2>
<p>First, some definitions. There are several different but related
software packages that are often confused or called by the same name:</p>
<dl>
<dt><strong>Tor</strong></dt>
<dd>This is the daemon that speaks the Tor protocols and connects your
computer to the Tor anonymity network. It has no user interface other
than the command-line and is configured using a plain old text file as per
Unix custom. It can be configured to run in a variety of modes and
can be used to run a relay, a bridge, an exit node, hidden services
or all of the above. Naive users might come to the conclusion that
all you need to be private on the Internet is to fire up the Tor daemon
and configure your normal web browser to proxy traffic via tor -
this is <strong>incorrect</strong> and in fact can make it easy for an attacker to
deanonymize your traffic (and, implicitly, you).</dd>
<dt><strong>Tor Browser</strong></dt>
<dd>A fork of the <a href="https://www.mozilla.org/en-US/firefox/organizations/">Firefox Extended Support Release (ESR)</a>: ESR is “… intended for groups who deploy and maintain the desktop environment in large organizations such as universities and other schools, county or city governments and businesses.” The Tor Project based their browser on ESR, but it is heavily modified, including over <a href="http://bits.haqistan.net/~attila/mozilla-esr31.4.0-torbrowser-4.5_patches/">500 patches</a> to the ESR base. These patches close holes and fix problems in Firefox ESR that can lead to anonymity leaks and privacy breaches, among other things. Note that by itself the Tor Browser will also not necessarily protect your privacy or
anonymity even if you build it and configure it to proxy all traffic over Tor.</dd>
<dt><strong>Tor Browser Bundle (TBB)</strong></dt>
<dd>An operating-system-specific “bundle” which packages up Tor, the Tor Browser, several Firefox add-ons crucial to the proper operation of the Tor Browser that are not included in it, other third-party Firefox add-ons that are also used outside of Tor which are bundled together because of the additional protections they provide and many external programs and configuration files used by both these add-ons and the Pluggable Transports components (which, itself, includes at least on additional Firefox add-on). The bundle is intended to be installed under an individual user’s directory and does not use or rely e.g. any other version of the Tor server software or Firefox installed on the computer.</dd>
</dl>
<p>Users with no deep technical knowledge might refer to the TBB as
“Tor”, since from their point of view it is: if you install the TBB on
a supported operating system and double click on the resulting icon
you are “using Tor” in some generic sense.</p>
<p>Nonetheless this is not exactly accurate. If you are using the TBB
you are not only using their fork of Firefox ESR (as opposed to
whatever other version of Firefox you might have installed), you are
also using the version of the tor daemon that comes with the TBB (as
opposed to whatever other version you might have installed), the
firefox add-ons that ensure your web traffic is proxied via Tor
correctly (which come with TBB, not Tor Browser), other add-ons that
are recommended to ensure safe browsing over Tor (as opposed to
e.g. whatever version of the <code>noscript</code> Firefox add-on you might have
installed otherwise) and, potentially, many other small programs that
implement the different facets of the Pluggable Transports concept.</p>
<p>All of these things go together, although not all of them are used by
all TBB users. Many users never touch Pluggable Transports although
for some Tor would be completely unusable without it. For instance,
the <code>meek</code> Pluggable Transport components allow potential Tor users
behind the Great Firewall of China and other, similar systems to get
around governmental blocks to using Tor.</p>
<p>The TDP is porting the entire TBB to OpenBSD, not just Tor Browser.
Our goal is to provide users of OpenBSD (for starters) with a complete
set of components equivalent to TBB that provides all of the anonymity
and privacy under OpenBSD that TBB gives users under Linux, OSX and
Windows. This means not only the Tor Browser, but all of the add-ons
that are required for it to function as designed and all of the
external components that make up Pluggable Transports.</p>
<h2 id="whatarethehurdlestoportingthetorbrowserbundletoopenbsd">“What are the hurdles to porting the Tor Browser Bundle to OpenBSD?”</h2>
<p><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser/">This blog post</a>
by one of the TDP project members summarized many of the issues
and problems presented by the TBB in the context of OpenBSD, but
for the sake of completeness we will summarize here.</p>
<p>At the risk of putting words in other peoples’ mouths, we can say with
some authority that many current trends in software packaging and
development leave a bad taste in the mouths of BSD users. Most of us
would prefer that third-party installed on our machines used OpenBSD’s
native packaging system to produce signed packages with proper
dependency meta-data in them for all of the components of any
multi-component system. The trend towards software that phones home
to check for updates or, worse, which automatically updates itself is
also viewed with some alarm: such software certainly won’t be using
the native OpenBSD mechanisms to do this phoning home or updating,
since that’s not how things are done in OpenBSD ports.</p>
<p>Instead we would prefer to update our software by installing packages
based on ports created by OpenBSD ports maintainers after they’ve
properly vetted things, sorted out issues with dependencies,
etc… Philosophically the idea is that the standard set of packaged
3rd party software available is something that organically belongs
with the operating system, and that the release cycle of the OS
naturally drives forward subsequent releases of the packaged
software. When there are critical bug fixes or security patches then,
again, the mechanism native to the OS for dealing with them should be
used. This is in line with the broader BSD philosophy that the
operating system, C runtime library, compilers and toolchain used to
produce them and third-party packages based on all of the above form
an organic whole, not a pile of disconnected components. The core of
any of the BSDs is not released or developed piece-meal.</p>
<p>All of the BSDs have settled on a model where third-party packages can
be posed as “ports”. Although the ports systems on the various BSDs
differ substantially, they have a common ancestor (FreeBSD’s original
ports system) and a common goal: create a sane, well-documented
mechanism that (nearly) any user can use to produce a native port of a
piece of open-source software.</p>
<h2 id="willthetorbrowserbundlebeintheopenbsdportstreeandavailableasapackage">“Will the Tor Browser Bundle be in the OpenBSD ports tree and available as a package?”</h2>
<p>This is the end-goal of the TBB work.</p>
<h2 id="whatisthestatusofthetorbrowserbundletbbportingeffort">“What is the status of the Tor Browser Bundle (TBB) Porting Effort?”</h2>
<p><strong>18 MAY 2015</strong>: The only component of the TBB that is not finished
is <a href="https://www.torproject.org/docs/pluggable-transports.html">Pluggable Transports</a>, which comprises several subcomponents and presents a few
packaging challenges.</p>
<p>As for the rest our status is more or less still as described
<a href="https://trac.haqistan.net/blog/tor-browser-ports-progress/">in this blog post</a>:
the OpenBSD ports are for version 4.0.8 of the TBB and include the Tor
Browser itself, the torbutton and tor-launcher add-ons that are
required for proper functioning of Tor Browser and the NoScript and
HTTPS-Everywhere add-ons that are also used outside of Tor Browser but
which are packaged with TBB. The exact NoScript configuration tweaks
present in the TBB release are still not reflected in our ports.</p>
<p>We are working on moving to the latest release (4.5.1 as of this
writing). Beyond that, the Pluggable Transport components must be
finished and then we’ll have a complete set of TBB ports. We are not
committing to dates for any of these milestones just yet but most of
the hard work for everything but PT has already been done.</p>
<h2 id="beyondportingthetorbrowserbundletoopenbsdandtherelayguideswhatotheractivitiesdoestdplooktoconduct">“Beyond porting the Tor Browser Bundle to OpenBSD and the relay guides, what other activities does <strong>TDP</strong> look to conduct?”</h2>
<p>We have a long list of potential projects, some of which commenced years ago. This is a list in flux, and we only consider it a loose guide.</p>
<p><strong>A Presence at BSD Events</strong> There are a number of BSD conferences that take place around the globe, such as <a href="http://www.bsdcan.org/">BSDCan in Ottawa, Canada</a>, <a href="http://www.asiabsdcon.org/">AsiaBSDCon in Tokyo, Japan</a>, <a href="http://www.eurobsdcon.org/">EuroBSDCon</a>, <a href="http://www.meetbsd.com/">MeetBSD in California</a> and which alternates with <a href="http://www.meetbsd.org/">MeetBSD in Polska</a> and finally <a href="http://www.nycbsdcon.org/">NYCBSDCon in New York City</a>. These are opportune places to interact face-to-face with the broader BSD community with presentations and birds-of-a-feather sessions (BoFs). To date, BoFs has been conducted at vBSDCon in the fall of 2013 and NYCBSDCon in February 2014. A very successful <a href="https://www.bsdcan.org/2015/schedule/track/BOF/624.en.html">BoF was conducted at</a> BSDCan in June 2014. There were around 50 people in the room during this lunchtime session, and many were running Tor relays. Considering just under 300 people registered for BSDCan, this was a huge accomplishment.</p>
<p><strong>BSD Relay Configuration Video Tutorials</strong> Written tutorials are a useful medium for assistance in configuring BSD relays. For some, especially groups of people, professionally produced video tutorials are more appropriate.</p>
<p><strong>Relay Guide Translations</strong> While English remains the de facto language of technical documentation, it is hardly the only language. We are looking to keep current translations of the ‘production’ versions of our relay configuration guides online and available. This could also increase the geographical diversity of the Tor network beyond its concentrations in the US, Canada and Europe.</p>
<p><strong>High-Bandwidth BSD Relays</strong> An immediate way to diversify available Tor relay bandwidth is to operate several high-bandwidth relays. At a certain moment in May 2015, only two of the top thirty relays, in terms of bandwidth, are <strong>not</strong> running GNU/Linux. Both are running FreeBSD. Building and maintaining at least two high-bandwidth “bare metal” relays, one running OpenBSD and the other FreeBSD, with a minimum bandwidth of 20Mbps, would change this situation in the short-term. But we don’t aim to individually act as a band-aid to the diversity problem. These relays would allow further testing and optimizing of high-bandwidth Tor relays running BSDs, and ideally become a model for others.</p>
<p><strong>Corporate Tor Relays</strong> While volunteer relays represent the majority of Tor nodes, we are approaching BSD-using firms to ask about them running high-bandwidth Tor relays on a BSD. Mozilla nows runs several relays as of December 2014. Firms have the staff, hardware and bandwidth to significantly contribute to the Tor network. Additionally, such firms further legitimize Tor and anonymous communications.</p>
<p><strong>A FreeBSD Port of the Tor Browser Bundle</strong> After the OpenBSD Tor Browser port is completed, the next client software target would likely be be FreeBSD. Note that PC-BSD’s Kris Moore has <a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/">created a “Tor-Mode”</a> for their desktop’s browser. </p>
<p>We have additional ideas in consideration for <strong>TDP</strong>, and will regularly assess and reassess both old and new ones. Ultimately, <strong>TDP</strong> needs broader BSD community involvement of both users and developers to have the impact we are aiming for.</p>
<p><hr></p>
<p><em>Copyright © 2018 by The Tor BSD Diversity Project (TDP). All Rights Reserved.</em></p>
<p><code>last updated: Tue Jun 13 19:25:38 2017 UTC</code></p>
</body>
</html>