tor/doc/tor-doc-win32.html

139 lines
5.2 KiB
HTML
Raw Normal View History

<html>
<head>
2004-12-19 08:36:05 +01:00
<title>Tor Win32 Install Instructions</title>
<meta name="Author" content="Roger Dingledine">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Style-Type" content="text/css">
<link rel="stylesheet" type="text/css" href="tor-doc.css">
</head>
<body>
2005-01-05 01:06:51 +01:00
<h1>Running <a href="http://tor.eff.org/">Tor</a> on Win32</h1>
<a name="installing"></a>
<h2>Step One: Download and Install Tor</h2>
<p>
2004-12-19 07:31:24 +01:00
The latest stable release of Tor for Windows 32 is <a
2005-01-05 01:06:51 +01:00
href="http://tor.eff.org/dist/win32/tor-0.0.9.1-win32.exe">0.0.9.1</a>.
Download it by clicking the link. You may be able to find experimental versions
2005-01-05 01:06:51 +01:00
<a href="http://tor.eff.org/dist/win32/">here</a>, if you're looking for
new features and new bugs.
</p>
2004-12-19 07:31:24 +01:00
<p>Our Tor installer should make everything pretty simple. Below is a
screenshot of the setup page:
</p>
<img alt="tor installer splash page"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-installer-splash.jpg" />
<p>
By default, Tor is not configured to run at startup.
<!--We highly recommend that you enable that feature, however. -->
You can enable this by checking the "Run at startup" box as shown below.
Be sure to leave the other boxes checked.
</p>
<img alt="select components to install"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-installer-components.jpg" />
2004-12-19 07:31:24 +01:00
<p>Once the installer is finished, it will run Tor in a DOS window so
you can see its logs and errors. (You can minimize this window, but do
not close it.)
</p>
<img alt="tor window screenshot"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-dos-window.jpg" />
<p>Tor comes configured as a client by default. It uses a built-in
default configuration file, and most people won't need to change any of
the settings. Tor is now installed.</p>
<a name="privoxy"></a>
<h2>Step Two: Install Privoxy for Web Browsing</h2>
2004-12-19 08:36:05 +01:00
<p>After installing Tor, you need to configure your applications to use it.
The first step is to set up web browsing. Start by installing <a
href="http://www.privoxy.org/">Privoxy</a> (click on 'recent releases',
then scroll down to the Win32 installer packages). Privoxy is a filtering
web proxy that integrates well with Tor. Once it's installed, it should
2004-12-19 08:36:05 +01:00
appear in your system tray as a "P" in a circle, as pictured below:
</p>
<img alt="privoxy icon in the system tray"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-privoxy-icon.jpg" />
<p>You need to configure Privoxy to use Tor.
Open Privoxy's main config file by selecting it from Start Menu|All
Programs:
</p>
<img border="1" alt="editing privoxy config"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-privoxy-config.jpg" />
<p>Add the line <br>
<tt>forward-socks4a / localhost:9050 .</tt><br>
to Privoxy's config file. Don't forget to add the dot at the end.
The easiest way is to select the above line and copy/paste it into
the file. Be sure to save.
</p>
<img border="1" alt="privoxy points to tor"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-privoxy-edit.jpg" />
<a name="using"></a>
<h2>Step Three: Configure your applications to use Tor</h2>
<p>Then change your browser to HTTP proxy at localhost port 8118.
(That's where Privoxy listens.)
In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's
Tools|Internet Options|Connections|LAN Settings|Advanced.
You should also set your SSL proxy (IE calls it "Secure") to the same
thing, to hide your SSL traffic. In IE, this looks something like:</p>
<img alt="LAN settings in IE"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-ie-lan.jpg" />
<img alt="Proxy settings in IE"
2005-01-05 01:06:51 +01:00
src="http://tor.eff.org/img/screenshot-ie-proxies.jpg" />
<p>Using privoxy is <strong>necessary</strong> because <a
2005-01-05 01:06:51 +01:00
href="http://tor.eff.org/cvs/tor/doc/CLIENTS">browsers leak your
DNS requests when they use a SOCKS proxy directly</a>, which is bad for
your anonymity. Privoxy also removes certain dangerous headers from your
2004-12-19 07:31:24 +01:00
web requests, and blocks obnoxious ad sites like Doubleclick.</p>
<p>To test if it's working, go to <a
href="http://peertech.org/privacy-knoppix/">this site</a> and see
what IP it says you're coming from. (If it's down, you can try the
<a href="http://www.junkbusters.com/cgi-bin/privacy">junkbusters</a>
site instead.)</p>
<p>
If you have a personal firewall, be sure to allow local connections to
port 8118 and port 9050. If your firewall blocks outgoing connections,
punch a hole so it can connect to TCP ports 80, 443, and 9001-9033.
For more troubleshooting suggestions, see <a
href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ</a>.
</p>
<p>To Torify another application that supports HTTP, just point it at Privoxy
(that is, localhost port 8118). To use SOCKS directly (for example, for
2004-12-19 08:36:05 +01:00
instant messaging, Jabber, IRC, etc), point your application directly at
Tor (localhost port 9050). For applications that support neither SOCKS
nor HTTP, take a look at <a
href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a>,
<a href="http://www.freecap.ru/eng/">FreeCap</a>,
or the <a
href="http://www.hummingbird.com/products/nc/socks/index.html?cks=y">Hummingbird</a>
SOCKS client. (FreeCap is free software; the others are proprietary.)
Let us know if you get them working so we can add better
instructions here.</p>
<p>If you have suggestions for improving this document, please <a
2004-12-19 07:31:24 +01:00
href="mailto:tor-bugs@freehaven.net">send them to us</a>. Thanks!</p>
</body>
</html>