You think you can hide your ip?

Wilson cwilson352 at cogeco.ca
Wed Jan 18 00:11:16 UTC 2006


Thanks for the info M, but I am running windows ..... what you described 
looked like it was for linux or something........Very interesting though :)

M wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>> How the heck can you route all trafiic through Tor? I am wondering 
>> because
>> I would like to do that myself.......
>
>
>
> You can do this by using a router box, iptables and some other software.
>
>
> Found this from my sent emails (This isn't meant to be step-by-step 
> howto,
> just some pointers):
>
> - --------------------------------------------------
> I assume that you're familiar compiling stuff from source and so on...
>
> First you must download and compile Dante, transocks needs some libraries
> from it:
> ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
> (the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
> and INSTALL, "./configure && make && make install")
>
> I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't 
> work
> (transocks.c failed to compile against dante-1.1.15).
>
> Download and compile transocks. I attached a simple patch by me to
> transocks.c, it adds verbose option and some help, you can apply it by
> "patch -p1 < transocks.patch" and when it asks a file to patch just type
> path to transocks.c.
> http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
>
> Compile transocks by typing "make" and copy freshly compiled transocks to
> /usr/local/sbin/.
>
> Install iptables if you already dont have it.
>
> Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit 
> your
> needs.
>
> Edit /etc/socks.conf to look like following:
>
> route {
>       from: 0.0.0.0/0   to: 0.0.0.0/0   via: 192.168.10.1 port = 9050
>       proxyprotocol: socks_v4
>       method: none
>       protocol: tcp
> }
>
> Edit /etc/tor/torrc, change
>
> SocksBindAddress 127.0.0.1
> to
> SocksBindAddress routers_local_ip
>
> where routers_local_ip is your routers nics local address (LAN), example
> 192.168.1.1.
>
> Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and 
> test if
> it works... I assume that you have working Tor installation.
>
> If everything goes right I recommend that you install Privoxy and 
> Squid for
> http connections. I have following setup: for traffic going out to 
> port 80
> client -> squid -> privoxy -> tor, other ports are directed straight 
> to Tor,
> everything else is dropped. Privoxy filters out some bad javascript and
> stuff that could break your privacy.
> - ------------------------------------------------------
>
> M
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
> Comment: GnuPT 2.7.2
>
> iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
> y+wCBH991arTI+QoflFj8rs=
> =lowO
> -----END PGP SIGNATURE-----




More information about the tor-talk mailing list