[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: You think you can hide your ip?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

How the heck can you route all trafiic through Tor? I am wondering because
I would like to do that myself.......


You can do this by using a router box, iptables and some other software.


Found this from my sent emails (This isn't meant to be step-by-step howto, just some pointers):

- --------------------------------------------------
I assume that you're familiar compiling stuff from source and so on...

First you must download and compile Dante, transocks needs some libraries
from it:
ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
(the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
and INSTALL, "./configure && make && make install")

I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't work
(transocks.c failed to compile against dante-1.1.15).

Download and compile transocks. I attached a simple patch by me to
transocks.c, it adds verbose option and some help, you can apply it by
"patch -p1 < transocks.patch" and when it asks a file to patch just type
path to transocks.c.
http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/

Compile transocks by typing "make" and copy freshly compiled transocks to
/usr/local/sbin/.

Install iptables if you already dont have it.

Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit your
needs.

Edit /etc/socks.conf to look like following:

route {
      from: 0.0.0.0/0   to: 0.0.0.0/0   via: 192.168.10.1 port = 9050
      proxyprotocol: socks_v4
      method: none
      protocol: tcp
}

Edit /etc/tor/torrc, change

SocksBindAddress 127.0.0.1
to
SocksBindAddress routers_local_ip

where routers_local_ip is your routers nics local address (LAN), example
192.168.1.1.

Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test if
it works... I assume that you have working Tor installation.

If everything goes right I recommend that you install Privoxy and Squid for
http connections. I have following setup: for traffic going out to port 80
client -> squid -> privoxy -> tor, other ports are directed straight to Tor,
everything else is dropped. Privoxy filters out some bad javascript and
stuff that could break your privacy.
- ------------------------------------------------------

M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2

iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
y+wCBH991arTI+QoflFj8rs=
=lowO
-----END PGP SIGNATURE-----

Attachment: transocksify.sh
Description: Binary data

Attachment: transocksify.sh.asc
Description: Binary data

Attachment: transocks.patch
Description: Binary data

Attachment: transocks.patch.asc
Description: Binary data