[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Trouble with 2.2.33-3 - Dirty workaround to avoid user local-tor in Linux



> 
> > : Hope that Debian packages with separated tor-daemon itself, Tor-browser and
> > : Tor-browser-plugins will be created sometime
> > 
> > This is unlikely unless someone else does the work.
> 

Dirty workaround recipe:

1. Leave your transparency torifying iptables-firewall rules as is.
2. Run start-tor-browser scripts.
3. Vidalia runs local tor.
4. Local tor slowly builds circuits throw torifying connections:
 double torifying, double circuits length, slow connection.
5. Vidalia starts TBB-FF.
6. kill -9 Vidalia, and user-tor (not system-tor!)
7. Change in the T-button random socks-port to your system tor-port:
select "Use custom proxy settings" "127.0.0.1" "9050"

Now you work through system-tor, started from /etc/init.d/tor, 
secured with low privilegy group debian-tor, integrated with SELinux, etc.

You can use 'sudo killall -SIGHUP tor' as newnym command or tune control ports.

If you make an error in any point (instead of first - firewalling) then 
your connection will not be working,
or will be slow because doubling overhead.
But none of thats mistakes cannot make plain traffic leakages.

May be developers just give TBB-Linux users non-default config options: "Use system Tor".

Please, don't enforce to use TBB with local Tor for advanced users!

Don't ruin a flexibility of transparency tor-firewalling and 
security of using /etc/init.d/tor !
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk