[Malvern] Onion Routing

Andy Dixon andy at andydixon.com
Tue Jul 4 22:10:16 BST 2006


As mentioned this evening, Tor (The Onion Router) works as a SOCKS proxy
which bounces all your TCP traffic through several nodes around the
world and exits somewhere.

This system contains no information about the source IP so is nearly
untraceable.

I'm considering building a distro which will incorporate this as a
transparent proxy server- ie any outbound traffic will be passed through
Tor, making your internet connection anonymous.

More information can be found at http://tor.eff.org

In short:

Debian Testing:
$apt-get install tor privoxy
install the plugin for firefox found at
https://addons.mozilla.org/firefox/2275/

You will need to configure Privoxy to use Tor. Open Privoxy's "config"
file (look in /etc/privoxy/ or /usr/local/etc/) and add the line 
forward-socks4a / localhost:9050 .
to the top of the config file. Don't forget to add the dot at the end. 
Privoxy keeps a log file of everything passed through it. In order to
stop this you will need to comment out two lines by inserting a # before
the line. The two lines are:
logfile logfile
and the line 
jarfile jarfile
You'll need to restart Privoxy for the changes to take effect with
/etc/init.d privoxy restart

Phil - for fedora, not sure. There is redhat at
http://tor.eff.org/download.html.en which may work...

Andy








More information about the Malvern mailing list