[Malvern] Onion Routing
Andy Dixon
andy at andydixon.com
Tue Jul 4 22:10:16 BST 2006
As mentioned this evening, Tor (The Onion Router) works as a SOCKS proxy
which bounces all your TCP traffic through several nodes around the
world and exits somewhere.
This system contains no information about the source IP so is nearly
untraceable.
I'm considering building a distro which will incorporate this as a
transparent proxy server- ie any outbound traffic will be passed through
Tor, making your internet connection anonymous.
More information can be found at http://tor.eff.org
In short:
Debian Testing:
$apt-get install tor privoxy
install the plugin for firefox found at
https://addons.mozilla.org/firefox/2275/
You will need to configure Privoxy to use Tor. Open Privoxy's "config"
file (look in /etc/privoxy/ or /usr/local/etc/) and add the line
forward-socks4a / localhost:9050 .
to the top of the config file. Don't forget to add the dot at the end.
Privoxy keeps a log file of everything passed through it. In order to
stop this you will need to comment out two lines by inserting a # before
the line. The two lines are:
logfile logfile
and the line
jarfile jarfile
You'll need to restart Privoxy for the changes to take effect with
/etc/init.d privoxy restart
Phil - for fedora, not sure. There is redhat at
http://tor.eff.org/download.html.en which may work...
Andy
More information about the Malvern
mailing list