nusenu commited on 2018-04-02 19:01:41
Zeige 1 geänderte Dateien mit 78 Einfügungen und 78 Löschungen.
the following two questions have been moved from the relay to the "Advanced Tor usage" section as they are more client related: I want to run my Tor client on a different computer than my applications. Can I install Tor on a central server, and have my clients connect to it?
... | ... |
@@ -132,6 +132,10 @@ country) |
132 | 132 |
worry?</a></li> |
133 | 133 |
<li><a href="#SocksAndDNS">How do I check if my application that uses |
134 | 134 |
SOCKS is leaking DNS requests?</a></li> |
135 |
+ <li><a href="#TorClientOnADifferentComputerThanMyApplications">I want to run my Tor client on a |
|
136 |
+ different computer than my applications.</a></li> |
|
137 |
+ <li><a href="#ServerClient">Can I install Tor on a central server, and |
|
138 |
+ have my clients connect to it?</a></li> |
|
135 | 139 |
</ul> |
136 | 140 |
|
137 | 141 |
<a id="relay"></a> |
... | ... |
@@ -167,10 +171,6 @@ be?</a></li> |
167 | 171 |
Why did that happen?</a></li> |
168 | 172 |
<li><a href="#MyRelayRecentlyGotTheGuardFlagAndTrafficDroppedByHalf">My |
169 | 173 |
relay recently got the Guard flag and traffic dropped by half.</a></li> |
170 |
- <li><a href="#TorClientOnADifferentComputerThanMyApplications">I want to run my Tor client on a |
|
171 |
- different computer than my applications.</a></li> |
|
172 |
- <li><a href="#ServerClient">Can I install Tor on a central server, and |
|
173 |
- have my clients connect to it?</a></li> |
|
174 | 174 |
<li><a href="#JoinTheNetwork">So I can just configure a nickname and |
175 | 175 |
ORPort and join the network?</a></li> |
176 | 176 |
<li><a href="#RelayOrBridge">Should I be a normal relay or bridge |
... | ... |
@@ -2027,6 +2027,80 @@ from the source code release tor-0.2.4.16-rc is: |
2027 | 2027 |
|
2028 | 2028 |
<hr> |
2029 | 2029 |
|
2030 |
+ <a id="TorClientOnADifferentComputerThanMyApplications"></a> |
|
2031 |
+ <h3><a class="anchor" href="#TorClientOnADifferentComputerThanMyApplications">I |
|
2032 |
+ want to run my Tor client on a different computer than my applications. |
|
2033 |
+ </a></h3> |
|
2034 |
+ <p> |
|
2035 |
+ By default, your Tor client only listens for applications that |
|
2036 |
+ connect from localhost. Connections from other computers are |
|
2037 |
+ refused. If you want to torify applications on different computers |
|
2038 |
+ than the Tor client, you should edit your torrc to define |
|
2039 |
+ SocksListenAddress 0.0.0.0 and then restart (or hup) Tor. If you |
|
2040 |
+ want to get more advanced, you can configure your Tor client on a |
|
2041 |
+ firewall to bind to your internal IP but not your external IP. |
|
2042 |
+ </p> |
|
2043 |
+ |
|
2044 |
+ <hr> |
|
2045 |
+ |
|
2046 |
+ <a id="ServerClient"></a> |
|
2047 |
+ <h3><a class="anchor" href="#ServerClient">Can I install Tor on a |
|
2048 |
+ central server, and have my clients connect to it?</a></h3> |
|
2049 |
+ <p> |
|
2050 |
+ Yes. Tor can be configured as a client or a relay on another |
|
2051 |
+ machine, and allow other machines to be able to connect to it |
|
2052 |
+ for anonymity. This is most useful in an environment where many |
|
2053 |
+ computers want a gateway of anonymity to the rest of the world. |
|
2054 |
+ However, be forwarned that with this configuration, anyone within |
|
2055 |
+ your private network (existing between you and the Tor |
|
2056 |
+ client/relay) can see what traffic you are sending in clear text. |
|
2057 |
+ The anonymity doesn't start until you get to the Tor relay. |
|
2058 |
+ Because of this, if you are the controller of your domain and you |
|
2059 |
+ know everything's locked down, you will be OK, but this configuration |
|
2060 |
+ may not be suitable for large private networks where security is |
|
2061 |
+ key all around. |
|
2062 |
+ </p> |
|
2063 |
+ <p> |
|
2064 |
+Configuration is simple, editing your torrc file's SocksListenAddress |
|
2065 |
+according to the following examples: |
|
2066 |
+ </p> |
|
2067 |
+ <pre> |
|
2068 |
+ |
|
2069 |
+ #This provides local interface access only, |
|
2070 |
+ #needs SocksPort to be greater than 0 |
|
2071 |
+ SocksListenAddress 127.0.0.1 |
|
2072 |
+ |
|
2073 |
+ #This provides access to Tor on a specified interface |
|
2074 |
+ SocksListenAddress 192.168.x.x:9100 |
|
2075 |
+ |
|
2076 |
+ #Accept from all interfaces |
|
2077 |
+ SocksListenAddress 0.0.0.0:9100 |
|
2078 |
+ </pre> |
|
2079 |
+ <p> |
|
2080 |
+You can state multiple listen addresses, in the case that you are |
|
2081 |
+part of several networks or subnets. |
|
2082 |
+ </p> |
|
2083 |
+ <pre> |
|
2084 |
+ SocksListenAddress 192.168.x.x:9100 #eth0 |
|
2085 |
+ SocksListenAddress 10.x.x.x:9100 #eth1 |
|
2086 |
+ </pre> |
|
2087 |
+ <p> |
|
2088 |
+After this, your clients on their respective networks/subnets would specify |
|
2089 |
+a socks proxy with the address and port you specified SocksListenAddress |
|
2090 |
+to be. |
|
2091 |
+ </p> |
|
2092 |
+ <p> |
|
2093 |
+Please note that the SocksPort configuration option gives the port ONLY for |
|
2094 |
+localhost (127.0.0.1). When setting up your SocksListenAddress(es), you need |
|
2095 |
+to give the port with the address, as shown above. |
|
2096 |
+ <p> |
|
2097 |
+If you are interested in forcing all outgoing data through the central Tor |
|
2098 |
+client/relay, instead of the server only being an optional proxy, you may find |
|
2099 |
+the program iptables (for *nix) useful. |
|
2100 |
+ </p> |
|
2101 |
+ |
|
2102 |
+ <hr> |
|
2103 |
+ |
|
2030 | 2104 |
<a id="RunningATorRelay"></a> |
2031 | 2105 |
<h2><a class="anchor" href="#RunningATorRelay">Running a Tor relay:</a></h2> |
2032 | 2106 |
|
... | ... |
@@ -2476,80 +2550,6 @@ users |
2476 | 2550 |
|
2477 | 2551 |
<hr> |
2478 | 2552 |
|
2479 |
- <a id="TorClientOnADifferentComputerThanMyApplications"></a> |
|
2480 |
- <h3><a class="anchor" href="#TorClientOnADifferentComputerThanMyApplications">I |
|
2481 |
- want to run my Tor client on a different computer than my applications. |
|
2482 |
- </a></h3> |
|
2483 |
- <p> |
|
2484 |
- By default, your Tor client only listens for applications that |
|
2485 |
- connect from localhost. Connections from other computers are |
|
2486 |
- refused. If you want to torify applications on different computers |
|
2487 |
- than the Tor client, you should edit your torrc to define |
|
2488 |
- SocksListenAddress 0.0.0.0 and then restart (or hup) Tor. If you |
|
2489 |
- want to get more advanced, you can configure your Tor client on a |
|
2490 |
- firewall to bind to your internal IP but not your external IP. |
|
2491 |
- </p> |
|
2492 |
- |
|
2493 |
- <hr> |
|
2494 |
- |
|
2495 |
- <a id="ServerClient"></a> |
|
2496 |
- <h3><a class="anchor" href="#ServerClient">Can I install Tor on a |
|
2497 |
- central server, and have my clients connect to it?</a></h3> |
|
2498 |
- <p> |
|
2499 |
- Yes. Tor can be configured as a client or a relay on another |
|
2500 |
- machine, and allow other machines to be able to connect to it |
|
2501 |
- for anonymity. This is most useful in an environment where many |
|
2502 |
- computers want a gateway of anonymity to the rest of the world. |
|
2503 |
- However, be forwarned that with this configuration, anyone within |
|
2504 |
- your private network (existing between you and the Tor |
|
2505 |
- client/relay) can see what traffic you are sending in clear text. |
|
2506 |
- The anonymity doesn't start until you get to the Tor relay. |
|
2507 |
- Because of this, if you are the controller of your domain and you |
|
2508 |
- know everything's locked down, you will be OK, but this configuration |
|
2509 |
- may not be suitable for large private networks where security is |
|
2510 |
- key all around. |
|
2511 |
- </p> |
|
2512 |
- <p> |
|
2513 |
-Configuration is simple, editing your torrc file's SocksListenAddress |
|
2514 |
-according to the following examples: |
|
2515 |
- </p> |
|
2516 |
- <pre> |
|
2517 |
- |
|
2518 |
- #This provides local interface access only, |
|
2519 |
- #needs SocksPort to be greater than 0 |
|
2520 |
- SocksListenAddress 127.0.0.1 |
|
2521 |
- |
|
2522 |
- #This provides access to Tor on a specified interface |
|
2523 |
- SocksListenAddress 192.168.x.x:9100 |
|
2524 |
- |
|
2525 |
- #Accept from all interfaces |
|
2526 |
- SocksListenAddress 0.0.0.0:9100 |
|
2527 |
- </pre> |
|
2528 |
- <p> |
|
2529 |
-You can state multiple listen addresses, in the case that you are |
|
2530 |
-part of several networks or subnets. |
|
2531 |
- </p> |
|
2532 |
- <pre> |
|
2533 |
- SocksListenAddress 192.168.x.x:9100 #eth0 |
|
2534 |
- SocksListenAddress 10.x.x.x:9100 #eth1 |
|
2535 |
- </pre> |
|
2536 |
- <p> |
|
2537 |
-After this, your clients on their respective networks/subnets would specify |
|
2538 |
-a socks proxy with the address and port you specified SocksListenAddress |
|
2539 |
-to be. |
|
2540 |
- </p> |
|
2541 |
- <p> |
|
2542 |
-Please note that the SocksPort configuration option gives the port ONLY for |
|
2543 |
-localhost (127.0.0.1). When setting up your SocksListenAddress(es), you need |
|
2544 |
-to give the port with the address, as shown above. |
|
2545 |
- <p> |
|
2546 |
-If you are interested in forcing all outgoing data through the central Tor |
|
2547 |
-client/relay, instead of the server only being an optional proxy, you may find |
|
2548 |
-the program iptables (for *nix) useful. |
|
2549 |
- </p> |
|
2550 |
- |
|
2551 |
- <hr> |
|
2552 |
- |
|
2553 | 2553 |
<a id="RelayOrBridge"></a> |
2554 | 2554 |
<h3><a class="anchor" href="#RelayOrBridge">Should I be a normal |
2555 | 2555 |
relay or bridge relay?</a></h3> |
2556 | 2556 |