You think you can hide your ip?
M
maillist at piirakka.com
Tue Jan 17 18:28:38 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> How the heck can you route all trafiic through Tor? I am wondering because
> I would like to do that myself.......
You can do this by using a router box, iptables and some other software.
Found this from my sent emails (This isn't meant to be step-by-step howto,
just some pointers):
- --------------------------------------------------
I assume that you're familiar compiling stuff from source and so on...
First you must download and compile Dante, transocks needs some libraries
from it:
ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
(the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
and INSTALL, "./configure && make && make install")
I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't work
(transocks.c failed to compile against dante-1.1.15).
Download and compile transocks. I attached a simple patch by me to
transocks.c, it adds verbose option and some help, you can apply it by
"patch -p1 < transocks.patch" and when it asks a file to patch just type
path to transocks.c.
http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
Compile transocks by typing "make" and copy freshly compiled transocks to
/usr/local/sbin/.
Install iptables if you already dont have it.
Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit your
needs.
Edit /etc/socks.conf to look like following:
route {
from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.168.10.1 port = 9050
proxyprotocol: socks_v4
method: none
protocol: tcp
}
Edit /etc/tor/torrc, change
SocksBindAddress 127.0.0.1
to
SocksBindAddress routers_local_ip
where routers_local_ip is your routers nics local address (LAN), example
192.168.1.1.
Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test if
it works... I assume that you have working Tor installation.
If everything goes right I recommend that you install Privoxy and Squid for
http connections. I have following setup: for traffic going out to port 80
client -> squid -> privoxy -> tor, other ports are directed straight to Tor,
everything else is dropped. Privoxy filters out some bad javascript and
stuff that could break your privacy.
- ------------------------------------------------------
M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2
iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
y+wCBH991arTI+QoflFj8rs=
=lowO
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh
Type: application/octet-stream
Size: 920 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0001.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch
Type: application/octet-stream
Size: 1066 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0002.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0003.obj>
More information about the tor-talk
mailing list