You think you can hide your ip?

M maillist at piirakka.com
Wed Jan 18 11:10:03 UTC 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, you need one computer which has Linux installed that acts as router and
firewall. Workstation with Windows is connected to internet through router
box that routes traffic transparently through Tor.

M



- ----- Original Message -----
From: "Wilson" <cwilson352 at cogeco.ca>
To: <or-talk at freehaven.net>
Sent: Wednesday, January 18, 2006 2:11 AM
Subject: Re: You think you can hide your ip?


> Thanks for the info M, but I am running windows ..... what you described
> looked like it was for linux or something........Very interesting though
> :)
>
> M wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>>> How the heck can you route all trafiic through Tor? I am wondering
>>> because
>>> I would like to do that myself.......
>>
>>
>>
>> You can do this by using a router box, iptables and some other software.
>>
>>
>> Found this from my sent emails (This isn't meant to be step-by-step
>> howto,
>> just some pointers):
>>
>> - --------------------------------------------------
>> I assume that you're familiar compiling stuff from source and so on...
>>
>> First you must download and compile Dante, transocks needs some libraries
>> from it:
>> ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
>> (the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
>> and INSTALL, "./configure && make && make install")
>>
>> I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't
>> work
>> (transocks.c failed to compile against dante-1.1.15).
>>
>> Download and compile transocks. I attached a simple patch by me to
>> transocks.c, it adds verbose option and some help, you can apply it by
>> "patch -p1 < transocks.patch" and when it asks a file to patch just type
>> path to transocks.c.
>> http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
>>
>> Compile transocks by typing "make" and copy freshly compiled transocks to
>> /usr/local/sbin/.
>>
>> Install iptables if you already dont have it.
>>
>> Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit
>> your
>> needs.
>>
>> Edit /etc/socks.conf to look like following:
>>
>> route {
>>       from: 0.0.0.0/0   to: 0.0.0.0/0   via: 192.168.10.1 port = 9050
>>       proxyprotocol: socks_v4
>>       method: none
>>       protocol: tcp
>> }
>>
>> Edit /etc/tor/torrc, change
>>
>> SocksBindAddress 127.0.0.1
>> to
>> SocksBindAddress routers_local_ip
>>
>> where routers_local_ip is your routers nics local address (LAN), example
>> 192.168.1.1.
>>
>> Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test
>> if
>> it works... I assume that you have working Tor installation.
>>
>> If everything goes right I recommend that you install Privoxy and Squid
>> for
>> http connections. I have following setup: for traffic going out to port
>> 80
>> client -> squid -> privoxy -> tor, other ports are directed straight to
>> Tor,
>> everything else is dropped. Privoxy filters out some bad javascript and
>> stuff that could break your privacy.
>> - ------------------------------------------------------
>>
>> M
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
>> Comment: GnuPT 2.7.2
>>
>> iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
>> y+wCBH991arTI+QoflFj8rs=
>> =lowO
>> -----END PGP SIGNATURE-----
>
>
>
>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2

iD8DBQFDziIM6fSN8IKlpYoRAlz2AJ4onMBno72nTgkS4TtP2snZ2Y/8KgCfbU7d
BFwK9jD/MdHpJL3uST6kVd0=
=xU7h
-----END PGP SIGNATURE-----



More information about the tor-talk mailing list