e45b9926b0497283309566499630e1d94c2f6694
Roger Dingledine and move them to cvs/websit...

Roger Dingledine authored 18 years ago

1) ## translation metadata
2) # Revision: $Revision$
3) 
4) #include "head.wmi" TITLE="Tor Linux/BSD/Unix Install Instructions"
5) 
6) <div class="center">
7) 
8) <div class="main-column">
9) 
10) <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1>
11) <br />
12) 
13) <p>
14) <b>Note that these are the installation instructions for running a Tor
15) client. If you want to relay traffic for others to help the network grow
16) (please do), read the <a
Roger Dingledine and get the relative links...

Roger Dingledine authored 18 years ago

17) href="<page docs/tor-doc-server>">Configuring a server</a> guide.</b>
Roger Dingledine and move them to cvs/websit...

Roger Dingledine authored 18 years ago

18) </p>
19) 
20) <hr />
21) <a id="installing"></a>
22) <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
23) <br />
24) 
25) <p>
26) The latest release of Tor can be found on the <a
27) href="<page download>">download</a> page. We have packages for Debian,
28) Red Hat, Gentoo, *BSD, etc there too.
29) </p>
30) 
31) <p>If you're building from source, first install <a
32) href="http://www.monkey.org/~provos/libevent/">libevent</a>, and
33) make sure you have openssl and zlib (including the -devel packages if
34) applicable). Then Run <tt>tar xzf tor-0.1.0.15.tar.gz;
35) cd tor-0.1.0.15</tt>. Then <tt>./configure &amp;&amp; make</tt>. Now you
36) can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>
37) (as root if necessary) to install it into /usr/local/, and then you can
38) start it just by running <tt>tor</tt>.
39) </p>
40) 
41) <p>Tor comes configured as a client by default. It uses a built-in
42) default configuration file, and most people won't need to change any of
43) the settings. Tor is now installed.
44) </p>
45) 
46) <hr />
47) <a id="privoxy"></a>
48) <h2><a class="anchor" href="#privoxy">Step Two: Install Privoxy for Web Browsing</a></h2>
49) <br />
50) 
51) <p>After installing Tor, you need to configure your applications to use it.
52) </p>
53) 
54) <p>
55) The first step is to set up web browsing. Start by installing <a
56) href="http://www.privoxy.org/">Privoxy</a>: click on 'recent releases'
57) and pick your favorite package or install from source. Privoxy is a
58) filtering web proxy that integrates well with Tor.
59) </p>
60) 
Roger Dingledine improve the tor-doc-unix pr...

Roger Dingledine authored 18 years ago

61) <p>Once you've installed Privoxy (either from package or from source),
62) <b>you will need to configure Privoxy to use Tor</b>.
Roger Dingledine and move them to cvs/websit...

Roger Dingledine authored 18 years ago

63) Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/)
64) and add the line <br>
65) <tt>forward-socks4a / localhost:9050 .</tt><br>
66) to the top of the config file. Don't forget to add the dot at the end.
67) </p>
68) 
69) <p>Privoxy keeps a log file of everything passed through it.  In
70) order to stop this you will need to comment out two lines by inserting a
Roger Dingledine improve the tor-doc-unix pr...

Roger Dingledine authored 18 years ago

71) \# before the line. The two lines are:<br>
Roger Dingledine and move them to cvs/websit...

Roger Dingledine authored 18 years ago

72) <tt>logfile logfile</tt><br>
73) and the line <br>
74) <tt>jarfile jarfile</tt><br>
75) </p>
76) 
77) <p>You'll need to restart Privoxy for the changes to take effect.</p>
78) 
79) <hr />
80) <a id="using"></a>
81) <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
82) <br />
83) 
84) <p>After installing Tor and Privoxy, you need to configure your
85) applications to use them. The first step is to set up web browsing.</p>
86) 
87) <p>If you're using Firefox (we recommend it), check out our <a
Roger Dingledine and get the relative links...

Roger Dingledine authored 18 years ago

88) href="<page docs/tor-switchproxy>">Tor SwitchProxy howto</a> to set up
Roger Dingledine and move them to cvs/websit...

Roger Dingledine authored 18 years ago

89) a plugin that makes it easy to switch between using Tor and using a
90) direct connection.</p>
91) 
92) <p>Otherwise, you need to manually configure your browser to HTTP proxy
93) at localhost port 8118.
94) (That's where Privoxy listens.)
95) In Mozilla, this is in Edit|Preferences|Advanced|Proxies.
96) In Opera 7.5x it's Tools|Preferences|Network|Proxy servers.
97) You should click the "use the same proxy server for all protocols"
98) button; but see <a
99) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this
100) note</a> about Tor and ftp proxies.
101) 
102) <p>Using privoxy is <strong>necessary</strong> because <a
103) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers
104) leak your DNS requests when they use a SOCKS proxy directly</a>, which
105) is bad for your anonymity. Privoxy also removes certain dangerous
106) headers from your web requests, and blocks obnoxious ad sites like
107) Doubleclick.</p>
108) 
109) <p>To Torify other applications that support HTTP proxies, just
110) point them at Privoxy (that is, localhost port 8118). To use SOCKS
111) directly (for instant messaging, Jabber, IRC, etc), you can point
112) your application directly at Tor (localhost port 9050), but see <a
113) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
114) FAQ entry</a> for why this may be dangerous. For applications
115) that support neither SOCKS nor HTTP, take a look at <a
116) href="http://tsocks.sourceforge.net/">tsocks</a> or <a
117) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
118) </p>
119) 
120) <p>For information on how to Torify other applications, check out the
121) <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify
122) HOWTO</a>.
123) </p>
124) 
125) <hr />
126) <a id="verify"></a>
127) <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2>
128) <br />
129) 
130) <p>
131) Next, you should try using your browser with Tor and make
132) sure that your IP address is being anonymized. Click on the <a
133) href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor
134) detector</a> and see whether it thinks you're using Tor or not.
135) (If that site is down, see <a
136) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
137) FAQ entry</a> for more suggestions on how to test your Tor.)
138) </p>
139) 
140) <p>If you have a personal firewall that limits your computer's
141) ability to connect to itself (this includes something like SELinux on
142) Fedora Core 4), be sure to allow connections from
143) your local applications to Privoxy (local port 8118) and Tor (local port
144) 9050). If
145) your firewall blocks outgoing connections, punch a hole so
146) it can connect to at least TCP ports 80 and 443, and then see <a
147) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
148) FAQ entry</a>.  If your SELinux config is not allowing tor or privoxy to
149) run correctly, create a file named booleans.local in the directory
150) /etc/selinux/targeted.  Edit this file in your favorite text editor and
151) insert "allow_ypbind=1".  Restart your machine for this change to take
152) effect.
153) </p>
154) 
155) <p>If it's still not working, look at <a
156) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
157) FAQ entry</a> for hints.</p>
158) 
159) <hr />
160) <a id="server"></a>
161) <h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2>
162) <br />
163) 
164) <p>The Tor network relies on volunteers to donate bandwidth. The more
165) people who run servers, the faster the Tor network will be. If you have
166) at least 20 kilobytes/s each way, please help out Tor by configuring your
167) Tor to be a server too. We have many features that make Tor servers easy
168) and convenient, including rate limiting for bandwidth, exit policies so
169) you can limit your exposure to abuse complaints, and support for dynamic
170) IP addresses.</p>
171) 
172) <p>Having servers in many different places on the Internet is what
173) makes Tor users secure. <a
174) href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
175) may also get stronger anonymity yourself</a>,
176) since remote sites can't know whether connections originated at your
177) computer or were relayed from others.</p>
178) 
Roger Dingledine and get the relative links...

Roger Dingledine authored 18 years ago

179) <p>Read more at our <a href="<page docs/tor-doc-server>">Configuring a server</a>