2003-10-07 18:57:18 +02:00
|
|
|
|
2002-09-23 21:16:00 +02:00
|
|
|
'tor' is an implementation of The Onion Routing system, as
|
|
|
|
described in a bit more detail at http://www.onion-router.net/. You
|
|
|
|
can read list archives, and subscribe to the mailing list, at
|
|
|
|
http://archives.seul.org/or/dev/.
|
|
|
|
|
2002-11-23 07:49:01 +01:00
|
|
|
Is your question in the FAQ? Should it be?
|
|
|
|
|
2003-07-14 19:54:56 +02:00
|
|
|
**************************************************************************
|
2003-10-07 23:27:33 +02:00
|
|
|
See the INSTALL file for a quickstart. That is all you will probably need.
|
2003-10-07 18:57:18 +02:00
|
|
|
**************************************************************************
|
2002-09-23 21:16:00 +02:00
|
|
|
|
2003-10-05 07:54:12 +02:00
|
|
|
**************************************************************************
|
2003-10-07 18:57:18 +02:00
|
|
|
You only need to look beyond this point if the quickstart in the INSTALL
|
|
|
|
doesn't work for you.
|
2003-07-14 19:54:56 +02:00
|
|
|
**************************************************************************
|
2002-07-16 18:18:16 +02:00
|
|
|
|
2003-10-05 07:54:12 +02:00
|
|
|
Do you want to run a tor server?
|
|
|
|
|
|
|
|
First, set up a config file for your node (start with sample-orrc and
|
|
|
|
edit the top portion). Then run the node (as above, but with the new
|
|
|
|
config file) to generate keys. One of the generated files is your
|
|
|
|
'fingerprint' file. Mail it to arma@mit.edu. Remember that you won't
|
|
|
|
be able to authenticate to the other tor nodes until I've added you
|
|
|
|
to the directory.
|
2002-07-19 10:13:42 +02:00
|
|
|
|
2003-10-07 18:57:18 +02:00
|
|
|
Command-line web browsing:
|
2002-09-22 13:09:07 +02:00
|
|
|
|
2003-10-12 00:38:44 +02:00
|
|
|
(First, install and configure Privoxy as described in INSTALL.)
|
2002-09-22 13:09:07 +02:00
|
|
|
For more convenient command-line use, I recommend making a ~/.wgetrc
|
|
|
|
with the line
|
2003-02-14 05:09:56 +01:00
|
|
|
http_proxy=http://localhost:8118
|
2002-07-19 10:13:42 +02:00
|
|
|
Then you can do things like "wget seul.org" and watch as it downloads
|
|
|
|
from the onion routing network.
|
|
|
|
|
|
|
|
For fun, you can wget a very large file (a megabyte or more), and
|
|
|
|
then ^z the wget a little bit in. The onion routers will continue
|
|
|
|
talking for a while, queueing around 500k in the kernel-level buffers.
|
|
|
|
When the kernel buffers are full, and the outbuf for the AP connection
|
2002-07-22 06:07:34 +02:00
|
|
|
also fills, the internal congestion control will kick in and the exit
|
|
|
|
connection will stop reading from the webserver. The circuit will
|
|
|
|
wait until you fg the wget -- and other circuits will work just fine
|
|
|
|
throughout. Then try ^z'ing the onion routers, and watch how well it
|
|
|
|
recovers. Then try ^z'ing several of them at once. :)
|
2002-07-16 18:18:16 +02:00
|
|
|
|
2003-03-16 05:55:19 +01:00
|
|
|
How to use it for ssh:
|
|
|
|
|
|
|
|
Download tsocks (tsocks.sourceforge.net) and configure it to talk to
|
|
|
|
localhost:9050 as a socks4 server. My /etc/tsocks.conf simply has:
|
|
|
|
server_port = 9050
|
|
|
|
server = 127.0.0.1
|
2003-07-14 19:54:56 +02:00
|
|
|
(I had to "cd /usr/lib; ln -s /lib/libtsocks.so" to get the tsocks
|
|
|
|
library working after install, since my libpath didn't include /lib.)
|
2003-10-12 00:38:44 +02:00
|
|
|
Then you can do "tsocks ssh arma@moria.mit.edu". But note that if
|
2003-03-16 05:55:19 +01:00
|
|
|
ssh is suid root, you either need to do this as root, or cp a local
|
|
|
|
version of ssh that isn't suid.
|
|
|
|
|