You think you can hide your ip?

M maillist at piirakka.com
Tue Jan 17 18:28:38 UTC 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> How the heck can you route all trafiic through Tor? I am wondering because
> I would like to do that myself.......


You can do this by using a router box, iptables and some other software.


Found this from my sent emails (This isn't meant to be step-by-step howto,
just some pointers):

- --------------------------------------------------
I assume that you're familiar compiling stuff from source and so on...

First you must download and compile Dante, transocks needs some libraries
from it:
ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
(the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
and INSTALL, "./configure && make && make install")

I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't work
(transocks.c failed to compile against dante-1.1.15).

Download and compile transocks. I attached a simple patch by me to
transocks.c, it adds verbose option and some help, you can apply it by
"patch -p1 < transocks.patch" and when it asks a file to patch just type
path to transocks.c.
http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/

Compile transocks by typing "make" and copy freshly compiled transocks to
/usr/local/sbin/.

Install iptables if you already dont have it.

Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit your
needs.

Edit /etc/socks.conf to look like following:

route {
       from: 0.0.0.0/0   to: 0.0.0.0/0   via: 192.168.10.1 port = 9050
       proxyprotocol: socks_v4
       method: none
       protocol: tcp
}

Edit /etc/tor/torrc, change

SocksBindAddress 127.0.0.1
to
SocksBindAddress routers_local_ip

where routers_local_ip is your routers nics local address (LAN), example
192.168.1.1.

Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test if
it works... I assume that you have working Tor installation.

If everything goes right I recommend that you install Privoxy and Squid for
http connections. I have following setup: for traffic going out to port 80
client -> squid -> privoxy -> tor, other ports are directed straight to Tor,
everything else is dropped. Privoxy filters out some bad javascript and
stuff that could break your privacy.
- ------------------------------------------------------

M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2

iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
y+wCBH991arTI+QoflFj8rs=
=lowO
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh
Type: application/octet-stream
Size: 920 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0001.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch
Type: application/octet-stream
Size: 1066 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0002.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20060117/3db2fd04/attachment-0003.obj>


More information about the tor-talk mailing list