
                              GetTor specification
                                 Jacob Appelbaum

0. Preface

 This document describes GetTor and how to properly implementation GetTor.

1. Overview

 GetTor was created to resolve direct and indirect censorship of Tor's
 software.  In many countries and networks Tor's main website is blocked and
 would-be Tor users are unable to download even the source code to the Tor
 program. Other software hosted by the Tor Project is similarly censored. The
 filtering of the possible download sites is sometimes easy to bypass by using
 our TLS enabled website. In other cases the website and all of the mirrors are
 entirely blocked; this is a situation where a user seems to actually need Tor
 to fetch Tor. We discovered that it is feasible to use alternate transport
 methods such as SMTP between a non-trusted third party or with IRC and XDCC.

2. Implementation

 Any compliant GetTor implementation will implement at least a single transport
 to meet the needs of a certain class of users. It should be i18n and l10n
 compliant for all user facing interactions; users should be able to manually
 set their language and this should serve as their preference for localization
 of any software delivered. The implementation must be free software and it
 should be freely available by request from the implementation that they
 interface with to download any of the other software available from that
 GetTor instance.  Security and privacy considerations should be described on a
 per transport basis.

2.1 Reference implementation

 We have implemented[0] a compliant GetTor that supports SMTP as a transport.

3. SMTP transport

 The SMTP transport for GetTor should allow users to send any RFC822 compliant
 message in any known human language; GetTor should respond in whatever
 language is detected with supplementary translations in the same email.
 GetTor shall offer a list of all available software in the body of the email -
 it should offer the software as a list of packages and their subsequent
 descriptions.

3.1 SMTP transport security considerations

 Any GetTor instance that offers SMTP as a transport should optionally
 implement the checking of DKIM signatures to ensure that email is not forged.
 Optionally GetTor should take an OpenPGP key from the user and encrypt the
 response with a blinded message.

3.2 SMTP transport privacy considerations

 Any GetTor instance that offers SMTP as a transport must at least store the
 requester's address for the time that it takes to process a response. This
 should not be written to any permanent storage medium; GetTor should function
 without any long term storage excepting a cache of files that it will send to
 any user who requests it.

 GetTor may optionally collect anonymized usage statistics to better understand
 how GetTor[1] is in use. This must not include any personally identifying
 information about any of the requester beyond language selection.

4. Other transports

 At this time no other transports have been specified. IRC XDCC is a likely
 useful system as is XMPP/Jabber with the newest OTR file sharing transport.

5. Implementation suggestions

 It is suggested that any compliant GetTor instance should be written in a so
 called "safe" language such as Python.

[0] https://gitweb.torproject.org/gettor.git
[1] https://metrics.torproject.org/packages.html
