Difference between revisions of "Anonymity"

From YobiWiki
Jump to navigation Jump to search
Line 59: Line 59:
 
->Advanced->Address 127.0.0.1 9051, Authentication: none, Tor config file: /etc/tor/torrc
 
->Advanced->Address 127.0.0.1 9051, Authentication: none, Tor config file: /etc/tor/torrc
 
Do not stop/start Tor with the GUI! (well you can stop it but you need to launch the service again as root: /etc/init.d/tor start)
 
Do not stop/start Tor with the GUI! (well you can stop it but you need to launch the service again as root: /etc/init.d/tor start)
  +
  +
BTW you've to allow the client to connect to Tor (I didn't find how to set a passwd as vidalia seemed to be able to handle) by decommenting the following line in /etc/tor/torrc:
  +
ControlPort 9051

Revision as of 23:37, 23 March 2008

Installing Tor & Privoxy under Debian

Links

Installation

# apt-get install tor privoxy

Edit /etc/privoxy/config and uncomment the following line:

 forward-socks4a   /               127.0.0.1:9050 .

Then restart the service

# /etc/init.d/privoxy restart

Usage

HTTP proxy through privoxy & tor

http 127.0.0.1 port 8118

E.g. for wget:

$ export http_proxy=http://127.0.0.1:8118/

The extension torbutton provides an easy way to toggle the usage of Tor

To test privoxy, try to access the following page: http://p.p/

SOCKS 5 proxy through tor

socks5 127.0.0.1 port 9050

Or for applications without proxy configuration available, check torify which uses LD_PRELOAD, e.g.

$ torify irssi

The extension Foxyproxy for Firefox contains already a pre-configured "Tor" setting on which you can add URL matches or use it all the time, it can be tuned to use also Privoxy. See also the extension torbutton presented in the previous section.

To test Tor, try to access the following hidden service: http://duskgytldkxiuqc6.onion/

DNS resolution through tor

$ tor-resolve wiki.yobi.be
85.17.183.154
$ tor-resolve -x 85.17.183.154
www.yobi.be

SSH through tor

See the connect.c helper program to make it possible.
connect is available as a Debian package:

apt-get install connect-proxy

And in ~/.ssh/config, simply use this line for Socks v5 & remote DNS resolution:

ProxyCommand /usr/bin/connect -R remote -5 -S 127.0.0.1:9050 %h %p

Hidden services

Advanced usages

  • Using special addresses, cf /usr/share/doc/tor/spec/address-spec.txt
    • [hostname].[name-or-digest].exit to choose the exit Tor node
    • [digest].onion to connect to a hidden service
    • [string].noconnect to immediately close the connection without attaching it to any circuit

GUI

There is Vidalia
Under Debian, I downloaded the RPM, went through alien and installed the package.
This is intended to launch tor itself so I tricked a bit its configuration:

Settings->General->Tor executable: true
        ->Advanced->Address 127.0.0.1 9051, Authentication: none, Tor config file: /etc/tor/torrc

Do not stop/start Tor with the GUI! (well you can stop it but you need to launch the service again as root: /etc/init.d/tor start)

BTW you've to allow the client to connect to Tor (I didn't find how to set a passwd as vidalia seemed to be able to handle) by decommenting the following line in /etc/tor/torrc:

ControlPort 9051