Roger Dingledine commited on 2006-03-15 02:27:48
Zeige 5 geänderte Dateien mit 1089 Einfügungen und 0 Löschungen.
| ... | ... |
@@ -0,0 +1,235 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+ |
|
| 4 |
+#include "head.wmi" TITLE="Tor Mac OS X Install Instructions" |
|
| 5 |
+ |
|
| 6 |
+<div class="center"> |
|
| 7 |
+ |
|
| 8 |
+<div class="main-column"> |
|
| 9 |
+ |
|
| 10 |
+<h1>Running the <a href="<page index>">Tor</a> client on Mac OS X</h1> |
|
| 11 |
+<br /> |
|
| 12 |
+ |
|
| 13 |
+<p> |
|
| 14 |
+<b>Note that these are the installation instructions for running a Tor client on |
|
| 15 |
+ Mac OS X. If you want to relay traffic for others to help the network |
|
| 16 |
+ grow (please do), read the <a |
|
| 17 |
+ href="<page tor-doc-server>">Configuring a server</a> guide.</b> |
|
| 18 |
+</p> |
|
| 19 |
+ |
|
| 20 |
+<hr /> |
|
| 21 |
+<a id="installing"></a> |
|
| 22 |
+<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
| 23 |
+<br /> |
|
| 24 |
+ |
|
| 25 |
+<p> |
|
| 26 |
+The latest stable and experimental releases of Tor for Macintosh |
|
| 27 |
+OS X bundle <a href="<page index>">Tor</a> and <a |
|
| 28 |
+href="http://www.privoxy.org">Privoxy</a> (a filtering web proxy) |
|
| 29 |
+into one package, with Privoxy pre-configured to proxy through Tor. |
|
| 30 |
+<a href="<page download>">Download one from the download |
|
| 31 |
+page</a>. |
|
| 32 |
+</p> |
|
| 33 |
+ |
|
| 34 |
+<p>Our Tor installer should make everything pretty simple. Below is a |
|
| 35 |
+screenshot of the setup page: |
|
| 36 |
+</p> |
|
| 37 |
+ |
|
| 38 |
+<img alt="tor installer splash page" |
|
| 39 |
+src="http://tor.eff.org/img/screenshot-osx-installer-splash.png" |
|
| 40 |
+border="1"> |
|
| 41 |
+ |
|
| 42 |
+<p> |
|
| 43 |
+By default, Tor is configured to run at startup. If you do not want Tor to |
|
| 44 |
+run on startup, you can disable this by selecting "Customize" in the |
|
| 45 |
+Installer, and then un-checking the "Tor Startup Script" box. Be sure to |
|
| 46 |
+leave the other boxes checked. |
|
| 47 |
+</p> |
|
| 48 |
+ |
|
| 49 |
+<p>Once the installer is finished and your computer restarts, Tor will |
|
| 50 |
+start automatically. Tor comes configured as a client by default. It |
|
| 51 |
+uses a built-in default configuration file in <tt>/Library/Tor/torrc</tt>, |
|
| 52 |
+but most people won't need to change any of the settings. Tor is now |
|
| 53 |
+installed.</p> |
|
| 54 |
+ |
|
| 55 |
+<p>Privoxy is installed as part of the Tor bundle package |
|
| 56 |
+installer. Privoxy is a filtering web proxy that integrates well with |
|
| 57 |
+Tor. Once it's installed, it will start automatically when your computer |
|
| 58 |
+is restarted. |
|
| 59 |
+</p> |
|
| 60 |
+ |
|
| 61 |
+<p>You do not need to configure Privoxy to use Tor. A custom Privoxy |
|
| 62 |
+configuration for Tor has been installed as part of the installer package. |
|
| 63 |
+</p> |
|
| 64 |
+ |
|
| 65 |
+<hr /> |
|
| 66 |
+<a id="using"></a> |
|
| 67 |
+<h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
|
| 68 |
+<br /> |
|
| 69 |
+ |
|
| 70 |
+<p>After installing Tor and Privoxy, you need to configure your |
|
| 71 |
+applications to use them. The first step is to set up web browsing.</p> |
|
| 72 |
+ |
|
| 73 |
+<p>If you're using Firefox (we recommend it), check out our <a |
|
| 74 |
+href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
| 75 |
+a plugin that makes it easy to switch between using Tor and using a |
|
| 76 |
+direct connection.</p> |
|
| 77 |
+ |
|
| 78 |
+<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
| 79 |
+at localhost port 8118. |
|
| 80 |
+(That's where Privoxy listens.) |
|
| 81 |
+In Mozilla, this is in Mozilla|Preferences|Advanced|Proxies. |
|
| 82 |
+You should set both your Web Proxy (HTTP) and your Secure Web Proxy |
|
| 83 |
+(HTTPS or SSL) to localhost port 8118, to hide your SSL traffic too. |
|
| 84 |
+You should consider configuring your "FTP Proxy" too; see <a |
|
| 85 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
| 86 |
+note</a> about Tor and ftp proxies. |
|
| 87 |
+</p> |
|
| 88 |
+ |
|
| 89 |
+<p>If you want to use Tor with Safari, you need to change your |
|
| 90 |
+Network Settings. Select your Network Preferences from the Apple | |
|
| 91 |
+Location menu:</p> |
|
| 92 |
+ |
|
| 93 |
+<img alt="Network settings" |
|
| 94 |
+src="http://tor.eff.org/img/screenshot-osx-choose-network.png" |
|
| 95 |
+border="1"> |
|
| 96 |
+ |
|
| 97 |
+<p>Select the Network Interface on which you want to enable Tor. If you use |
|
| 98 |
+more than one Interface you must change the proxy settings for each |
|
| 99 |
+individually.</p> |
|
| 100 |
+ |
|
| 101 |
+<img alt="Network preferences" |
|
| 102 |
+src="http://tor.eff.org/img/screenshot-osx-choose-interface.png" |
|
| 103 |
+border="1"> |
|
| 104 |
+<p> |
|
| 105 |
+ |
|
| 106 |
+<p>Select and enter 127.0.0.1 and port 8118 for both |
|
| 107 |
+Web Proxy (HTTP) and your Secure Web Proxy (HTTPS). |
|
| 108 |
+You should also do this for "FTP Proxy" and "Gopher Proxy"; see <a |
|
| 109 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
| 110 |
+note</a> about Tor and ftp proxies. Leave your Use Passive FTP Mode |
|
| 111 |
+(PASV) setting as is.</p> |
|
| 112 |
+ |
|
| 113 |
+<img alt="Proxy settings" |
|
| 114 |
+src="http://tor.eff.org/img/screenshot-osx-proxy-settings.png" |
|
| 115 |
+border="1"> |
|
| 116 |
+ |
|
| 117 |
+<p>Using privoxy is <strong>necessary</strong> because <a |
|
| 118 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
| 119 |
+leak your |
|
| 120 |
+DNS requests when they use a SOCKS proxy directly</a>, which is bad for |
|
| 121 |
+your anonymity. Privoxy also removes certain dangerous headers from your |
|
| 122 |
+web requests, and blocks obnoxious ad sites like Doubleclick.</p> |
|
| 123 |
+ |
|
| 124 |
+<p>To Torify other applications that support HTTP proxies, just |
|
| 125 |
+point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
| 126 |
+directly (for instant messaging, Jabber, IRC, etc), you can point |
|
| 127 |
+your application directly at Tor (localhost port 9050), but see <a |
|
| 128 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
| 129 |
+FAQ entry</a> for why this may be dangerous. For applications |
|
| 130 |
+that support neither SOCKS nor HTTP, take a look at <a |
|
| 131 |
+href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> or |
|
| 132 |
+<a href="http://www.dest-unreach.org/socat/">socat</a>.</p> |
|
| 133 |
+ |
|
| 134 |
+<p>For information on how to Torify other applications, check out the |
|
| 135 |
+<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
| 136 |
+HOWTO</a>. |
|
| 137 |
+</p> |
|
| 138 |
+ |
|
| 139 |
+<hr /> |
|
| 140 |
+<a id="verify"></a> |
|
| 141 |
+<h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
| 142 |
+<br /> |
|
| 143 |
+ |
|
| 144 |
+<p> |
|
| 145 |
+Next, you should try using your browser with Tor and make |
|
| 146 |
+sure that your IP address is being anonymized. Click on the <a |
|
| 147 |
+href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
| 148 |
+detector</a> and see whether it thinks you're using Tor or not. |
|
| 149 |
+(If that site is down, see <a |
|
| 150 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
| 151 |
+FAQ entry</a> for more suggestions on how to test your Tor.) |
|
| 152 |
+</p> |
|
| 153 |
+ |
|
| 154 |
+<p>If you have a personal firewall that limits your computer's |
|
| 155 |
+ability to connect to itself, be sure to allow connections from |
|
| 156 |
+your local applications to local port 8118 and port 9050. If |
|
| 157 |
+your firewall blocks outgoing connections, punch a hole so |
|
| 158 |
+it can connect to at least TCP ports 80 and 443, and then see <a |
|
| 159 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
| 160 |
+FAQ entry</a>. |
|
| 161 |
+</p> |
|
| 162 |
+ |
|
| 163 |
+<p>If it's still not working, look at <a |
|
| 164 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
| 165 |
+FAQ entry</a> for hints.</p> |
|
| 166 |
+ |
|
| 167 |
+<hr /> |
|
| 168 |
+<a id="server"></a> |
|
| 169 |
+<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
| 170 |
+<br /> |
|
| 171 |
+ |
|
| 172 |
+<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
| 173 |
+people who run servers, the faster the Tor network will be. If you have |
|
| 174 |
+at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
| 175 |
+Tor to be a server too. We have many features that make Tor servers easy |
|
| 176 |
+and convenient, including rate limiting for bandwidth, exit policies so |
|
| 177 |
+you can limit your exposure to abuse complaints, and support for dynamic |
|
| 178 |
+IP addresses.</p> |
|
| 179 |
+ |
|
| 180 |
+<p>Having servers in many different places on the Internet is what |
|
| 181 |
+makes Tor users secure. <a |
|
| 182 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
| 183 |
+may also get stronger anonymity yourself</a>, |
|
| 184 |
+since remote sites can't know whether connections originated at your |
|
| 185 |
+computer or were relayed from others.</p> |
|
| 186 |
+ |
|
| 187 |
+<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
| 188 |
+guide.</p> |
|
| 189 |
+ |
|
| 190 |
+<hr /> |
|
| 191 |
+<a id="uninstall"></a> |
|
| 192 |
+<h2><a class="anchor" href="#uninstall">How To Uninstall Tor and Privoxy</a></h2> |
|
| 193 |
+<br /> |
|
| 194 |
+ |
|
| 195 |
+<p>The Tor 0.1.0.x series does not come with an uninstaller; this feature |
|
| 196 |
+ will be added in the 0.1.1.x series. If you want to remove Tor on OSX, |
|
| 197 |
+ here's how:</p> |
|
| 198 |
+ |
|
| 199 |
+<p>Change your application proxy settings back to their original values. |
|
| 200 |
+ If you just want to stop using Tor, you can end at this point.</p> |
|
| 201 |
+ |
|
| 202 |
+<p>To stop Tor and Privoxy from running on startup</b>, remove the |
|
| 203 |
+ /Library/StartupItems/Tor and /Library/StartupItems/Privoxy directories |
|
| 204 |
+ respectively. If you just want to stop Tor from running, you can end at this |
|
| 205 |
+ point.</p> |
|
| 206 |
+ |
|
| 207 |
+<p>To erase all remaining Tor and Privoxy files from your computer, delete |
|
| 208 |
+ the following: |
|
| 209 |
+ <ul> |
|
| 210 |
+ <li>/Library/Tor</li> |
|
| 211 |
+ <li>/Library/Privoxy</li> |
|
| 212 |
+ <li>/usr/bin/tor</li> |
|
| 213 |
+ <li>/usr/bin/tor_resolve</li> |
|
| 214 |
+ <li>/var/log/tor</li> |
|
| 215 |
+ <li>/usr/share/man/man1/tor.1</li> |
|
| 216 |
+ <li>/usr/share/man/man1/tor-resolve.1</li> |
|
| 217 |
+ <li>/usr/share/man/man1/torify.1</li> |
|
| 218 |
+ <li>/Library/Receipts/Privoxy.pkg/</li> |
|
| 219 |
+ <li>/Library/Receipts/privoxyconf.pkg/</li> |
|
| 220 |
+ <li>/Library/Receipts/Tor.pkg/</li> |
|
| 221 |
+ <li>/Library/Receipts/torstartup.pkg/</li> |
|
| 222 |
+ </ul> |
|
| 223 |
+</p> |
|
| 224 |
+ |
|
| 225 |
+<hr /> |
|
| 226 |
+ |
|
| 227 |
+<p>If you have suggestions for improving this document, please post |
|
| 228 |
+them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
| 229 |
+website category. Thanks!</p> |
|
| 230 |
+ |
|
| 231 |
+ </div><!-- #main --> |
|
| 232 |
+</div> |
|
| 233 |
+ |
|
| 234 |
+#include <foot.wmi> |
|
| 235 |
+ |
| ... | ... |
@@ -0,0 +1,314 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+ |
|
| 4 |
+#include "head.wmi" TITLE="Tor Server Configuration Instructions" |
|
| 5 |
+ |
|
| 6 |
+<div class="center"> |
|
| 7 |
+ |
|
| 8 |
+<div class="main-column"> |
|
| 9 |
+ |
|
| 10 |
+<h1>Configuring a <a href="<page index>">Tor</a> server</h1> |
|
| 11 |
+<br /> |
|
| 12 |
+ |
|
| 13 |
+<p> |
|
| 14 |
+The Tor network relies on volunteers to donate bandwidth. The more |
|
| 15 |
+people who run servers, the faster the Tor network will be. If you have |
|
| 16 |
+at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
| 17 |
+Tor to be a server too. We have many features that make Tor servers easy |
|
| 18 |
+and convenient, including rate limiting for bandwidth, exit policies so |
|
| 19 |
+you can limit your exposure to abuse complaints, and support for dynamic |
|
| 20 |
+IP addresses.</p> |
|
| 21 |
+ |
|
| 22 |
+<p>Having servers in many different places on the Internet is what |
|
| 23 |
+makes Tor users secure. <a |
|
| 24 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
| 25 |
+may also get stronger anonymity yourself</a>, |
|
| 26 |
+since remote sites can't know whether connections originated at your |
|
| 27 |
+computer or were relayed from others.</p> |
|
| 28 |
+ |
|
| 29 |
+<p>Setting up a Tor server is easy and convenient: |
|
| 30 |
+<ul> |
|
| 31 |
+<li>Tor has built-in support for <a |
|
| 32 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
| 33 |
+limiting</a>. Further, if you have a fast link |
|
| 34 |
+but want to limit the number of bytes per day |
|
| 35 |
+(or week or month) that you donate, check out the <a |
|
| 36 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Hibernation">hibernation |
|
| 37 |
+feature</a>. |
|
| 38 |
+</li> |
|
| 39 |
+<li>Each Tor server has an <a |
|
| 40 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RunAServerBut">exit |
|
| 41 |
+policy</a> that specifies what sort of outbound connections are allowed |
|
| 42 |
+or refused from that server. If you are uncomfortable allowing people |
|
| 43 |
+to exit from your server, you can set it up to only allow connections |
|
| 44 |
+to other Tor servers. |
|
| 45 |
+</li> |
|
| 46 |
+<li>It's fine if the server goes offline sometimes. The directories |
|
| 47 |
+notice this quickly and stop advertising the server. Just try to make |
|
| 48 |
+sure it's not too often, since connections using the server when it |
|
| 49 |
+disconnects will break. |
|
| 50 |
+</li> |
|
| 51 |
+<li>We can handle servers with dynamic IPs just fine, as long as the |
|
| 52 |
+server itself knows its IP. Have a look at this |
|
| 53 |
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#DynamicIP"> |
|
| 54 |
+entry in the FAQ</a>. |
|
| 55 |
+</li> |
|
| 56 |
+<li>If your server is behind a NAT and it doesn't know its public |
|
| 57 |
+IP (e.g. it has an IP of 192.168.x.y), you'll need to set up port |
|
| 58 |
+forwarding. Forwarding TCP connections is system dependent but <a |
|
| 59 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledCli |
|
| 60 |
+ents">this FAQ entry</a> offers some examples on how to do this. |
|
| 61 |
+</li> |
|
| 62 |
+<li>Your server will passively estimate and advertise its recent |
|
| 63 |
+bandwidth capacity, so high-bandwidth servers will attract more users than |
|
| 64 |
+low-bandwidth ones. Therefore having low-bandwidth servers is useful too. |
|
| 65 |
+</li> |
|
| 66 |
+</ul> |
|
| 67 |
+ |
|
| 68 |
+<p>You can run a Tor server on |
|
| 69 |
+pretty much any operating system, but see <a |
|
| 70 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerOS">this |
|
| 71 |
+FAQ entry</a> for advice about which ones work best and other problems |
|
| 72 |
+you might encounter.</p> |
|
| 73 |
+ |
|
| 74 |
+<hr /> |
|
| 75 |
+<a id="zero"></a> |
|
| 76 |
+<h2><a class="anchor" href="#zero">Step Zero: Download and Install Tor</a></h2> |
|
| 77 |
+<br /> |
|
| 78 |
+ |
|
| 79 |
+<p>Before you start, you need to make sure that Tor is up and running. |
|
| 80 |
+</p> |
|
| 81 |
+ |
|
| 82 |
+<p>For Windows users, this means at least <a |
|
| 83 |
+href="<page tor-doc-win32>#installing">step one</a> |
|
| 84 |
+of the Windows Tor installation howto. Mac OS X users need to do at least |
|
| 85 |
+<a href="<page tor-doc-osx>#installing">step one</a> |
|
| 86 |
+of OS X Tor installation howto. Linux/BSD/Unix users should do at least |
|
| 87 |
+<a href="<page tor-doc-unix>#installing">step one</a> |
|
| 88 |
+of the Unix Tor installation howto. |
|
| 89 |
+</p> |
|
| 90 |
+ |
|
| 91 |
+<p>If it's convenient, you might also want to use it as a client for a |
|
| 92 |
+while to make sure it's actually working.</p> |
|
| 93 |
+ |
|
| 94 |
+<hr /> |
|
| 95 |
+<a id="one"></a> |
|
| 96 |
+<h2><a class="anchor" href="#one">Step One: Set it up as a server</a></h2> |
|
| 97 |
+<br /> |
|
| 98 |
+ |
|
| 99 |
+<p> |
|
| 100 |
+1. Verify that your clock is set correctly. If possible, synchronize |
|
| 101 |
+your clock with public time servers. |
|
| 102 |
+</p> |
|
| 103 |
+ |
|
| 104 |
+<p> |
|
| 105 |
+2. Make sure name resolution works (that is, your computer can resolve addresses correctly). |
|
| 106 |
+</p> |
|
| 107 |
+ |
|
| 108 |
+<p> |
|
| 109 |
+3. Edit the bottom part of your torrc. (See <a |
|
| 110 |
+href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#torrc">this |
|
| 111 |
+FAQ entry</a> for help.) |
|
| 112 |
+Make sure to define at least Nickname and ORPort. Create the DataDirectory |
|
| 113 |
+if necessary, and make sure it's owned by the user that will be running |
|
| 114 |
+tor. <em>If you want to run more than one server that's great, but |
|
| 115 |
+please set <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#MultipleServers">the |
|
| 116 |
+MyFamily option</a> in all your servers' configuration files.</em> |
|
| 117 |
+</p> |
|
| 118 |
+ |
|
| 119 |
+<p> |
|
| 120 |
+4. If you are using a firewall, open a hole in your firewall so |
|
| 121 |
+incoming connections can reach the ports you configured (ORPort, plus |
|
| 122 |
+DirPort if you enabled it). Make sure you allow all outgoing connections, |
|
| 123 |
+so your server can reach the other Tor servers. |
|
| 124 |
+</p> |
|
| 125 |
+ |
|
| 126 |
+<p> |
|
| 127 |
+5. Start your server: if you installed from source you can just |
|
| 128 |
+run <tt>tor</tt>, whereas packages typically launch Tor from their |
|
| 129 |
+initscripts or startup scripts. If it logs any warnings, address them. (By |
|
| 130 |
+default Tor logs to stdout, but some packages log to <tt>/var/log/tor/</tt> |
|
| 131 |
+instead. You can edit your torrc to configure log locations.) |
|
| 132 |
+</p> |
|
| 133 |
+ |
|
| 134 |
+<p> |
|
| 135 |
+6. Subscribe to the <a |
|
| 136 |
+href="http://archives.seul.org/or/announce/">or-announce</a> |
|
| 137 |
+mailing list. It is very low volume, and it will keep you informed |
|
| 138 |
+of new stable releases. You might also consider subscribing to <a |
|
| 139 |
+href="http://archives.seul.org/or/talk/">or-talk</a> (higher volume), |
|
| 140 |
+where new development releases are announced. |
|
| 141 |
+</p> |
|
| 142 |
+ |
|
| 143 |
+<p> |
|
| 144 |
+7. Have a look at the manual. |
|
| 145 |
+The <a href="<page tor-manual>">manual</a> for the |
|
| 146 |
+latest stable version provides detailed instructions for how to install |
|
| 147 |
+and use Tor, including configuration of client and server options. |
|
| 148 |
+If you are running the CVS version the manual is available |
|
| 149 |
+<a href="<page tor-manual-cvs>">here</a>. |
|
| 150 |
+</p> |
|
| 151 |
+ |
|
| 152 |
+<p> |
|
| 153 |
+8. Read |
|
| 154 |
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/OperationalSecurity">this document</a> |
|
| 155 |
+to get ideas how you can increase the security of your server. |
|
| 156 |
+<hr /> |
|
| 157 |
+<a id="two"></a> |
|
| 158 |
+<h2><a class="anchor" href="#two">Step Two: Make sure it's working</a></h2> |
|
| 159 |
+<br /> |
|
| 160 |
+ |
|
| 161 |
+<p>As soon as your server manages to connect to the network, it will |
|
| 162 |
+try to determine whether the ports you configured are reachable from |
|
| 163 |
+the outside. This may take up to 20 minutes. Look for a log entry like |
|
| 164 |
+<tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt> |
|
| 165 |
+If you don't see this message, it means that your server is not reachable |
|
| 166 |
+from the outside — you should re-check your firewalls, check that it's |
|
| 167 |
+testing the IP and port you think it should be testing, etc. |
|
| 168 |
+</p> |
|
| 169 |
+ |
|
| 170 |
+<p>When it decides that it's reachable, it will upload a "server |
|
| 171 |
+descriptor" to the directories. This will let clients know |
|
| 172 |
+what address, ports, keys, etc your server is using. You can <a |
|
| 173 |
+href="http://belegost.seul.org/">load the directory manually</a> and |
|
| 174 |
+look through it to find the nickname you configured, to make sure it's |
|
| 175 |
+there. You may need to wait a few seconds to give enough time for it to |
|
| 176 |
+make a fresh directory.</p> |
|
| 177 |
+ |
|
| 178 |
+<hr /> |
|
| 179 |
+<a id="three"></a> |
|
| 180 |
+<h2><a class="anchor" href="#three">Step Three: Register your nickname</a></h2> |
|
| 181 |
+<br /> |
|
| 182 |
+ |
|
| 183 |
+<p> |
|
| 184 |
+Once you are convinced it's working (after a day or two maybe), you should |
|
| 185 |
+register your server. |
|
| 186 |
+This reserves your nickname so nobody else can take it, and lets us |
|
| 187 |
+contact you if you need to upgrade or something goes wrong. |
|
| 188 |
+</p> |
|
| 189 |
+ |
|
| 190 |
+<p> |
|
| 191 |
+Send mail to <a |
|
| 192 |
+href="mailto:tor-ops@freehaven.net">tor-ops@freehaven.net</a> with a |
|
| 193 |
+subject of '[New Server] <your server's nickname>' and |
|
| 194 |
+include the following information in the message: |
|
| 195 |
+</p> |
|
| 196 |
+<ul> |
|
| 197 |
+<li>Your server's nickname</li> |
|
| 198 |
+<li>The fingerprint for your server's key (the contents of the |
|
| 199 |
+"fingerprint" file in your DataDirectory — on Windows, look in |
|
| 200 |
+\<i>username</i>\Application Data\tor\ or \Application Data\tor\; |
|
| 201 |
+on OS X, look in /Library/Tor/var/lib/tor/; and on Linux/BSD/Unix, |
|
| 202 |
+look in /var/lib/tor or ~/.tor) |
|
| 203 |
+</li> |
|
| 204 |
+<li>Who you are, so we know whom to contact if a problem arises</li> |
|
| 205 |
+<li>What kind of connectivity the new server will have</li> |
|
| 206 |
+</ul> |
|
| 207 |
+ |
|
| 208 |
+<hr /> |
|
| 209 |
+<a id="four"></a> |
|
| 210 |
+<h2><a class="anchor" href="#four">Step Four: Once it's working</a></h2> |
|
| 211 |
+<br /> |
|
| 212 |
+ |
|
| 213 |
+<p> |
|
| 214 |
+We recommend the following steps as well: |
|
| 215 |
+</p> |
|
| 216 |
+ |
|
| 217 |
+<p> |
|
| 218 |
+6. Decide what exit policy you want. By default your server allows |
|
| 219 |
+access to many popular services, but we restrict some (such as port 25) |
|
| 220 |
+due to abuse potential. You might want an exit policy that is |
|
| 221 |
+less restrictive or more restrictive; edit your torrc appropriately. |
|
| 222 |
+Read the FAQ entry on <a |
|
| 223 |
+href="<page faq-abuse>#TypicalAbuses">issues you might |
|
| 224 |
+encounter if you use the default exit policy</a>. |
|
| 225 |
+If you choose a particularly open exit policy, you should make |
|
| 226 |
+sure your ISP is ok with that choice. |
|
| 227 |
+</p> |
|
| 228 |
+ |
|
| 229 |
+<p> |
|
| 230 |
+7. Decide about rate limiting. Cable modem, DSL, and other users |
|
| 231 |
+who have asymmetric bandwidth (e.g. more down than up) should |
|
| 232 |
+rate limit to their slower bandwidth, to avoid congestion. See the <a |
|
| 233 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
| 234 |
+limiting FAQ entry</a> for details. |
|
| 235 |
+</p> |
|
| 236 |
+ |
|
| 237 |
+<p> |
|
| 238 |
+8. If you control the name servers for your domain, consider setting |
|
| 239 |
+your hostname to 'anonymous' or 'proxy' or 'tor-proxy', so when other |
|
| 240 |
+people see the address in their web logs, they will more quickly |
|
| 241 |
+understand what's going on. |
|
| 242 |
+</p> |
|
| 243 |
+ |
|
| 244 |
+<p> |
|
| 245 |
+9. If your computer isn't running a webserver, please consider |
|
| 246 |
+changing your ORPort to 443 and your DirPort to 80. Many Tor |
|
| 247 |
+users are stuck behind firewalls that only let them browse the |
|
| 248 |
+web, and this change will let them reach your Tor server. Win32 |
|
| 249 |
+servers can simply change their ORPort and DirPort directly |
|
| 250 |
+in their torrc and restart Tor. OS X or Unix servers can't bind |
|
| 251 |
+directly to these ports (since they don't run as root), so they will |
|
| 252 |
+need to set up some sort of <a |
|
| 253 |
+href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#ServerForFirewalledClients"> |
|
| 254 |
+port forwarding</a> so connections can reach their Tor server. If you are |
|
| 255 |
+using ports 80 and 443 already but still want to help out, other useful |
|
| 256 |
+ports are 22, 110, and 143. |
|
| 257 |
+</p> |
|
| 258 |
+ |
|
| 259 |
+<p> |
|
| 260 |
+10. If your Tor server provides other services on the same IP address |
|
| 261 |
+— such as a public webserver — make sure that connections to the |
|
| 262 |
+webserver are allowed from the local host too. You need to allow these |
|
| 263 |
+connections because Tor clients will detect that your Tor server is the <a |
|
| 264 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest |
|
| 265 |
+way to reach that webserver</a>, and always build a circuit that ends |
|
| 266 |
+at your server. If you don't want to allow the connections, you must |
|
| 267 |
+explicitly reject them in your exit policy. |
|
| 268 |
+</p> |
|
| 269 |
+ |
|
| 270 |
+<p> |
|
| 271 |
+11. (Unix only). Make a separate user to run the server. If you |
|
| 272 |
+installed the OS X package or the deb or the rpm, this is already |
|
| 273 |
+done. Otherwise, you can do it by hand. (The Tor server doesn't need to |
|
| 274 |
+be run as root, so it's good practice to not run it as root. Running |
|
| 275 |
+as a 'tor' user avoids issues with identd and other services that |
|
| 276 |
+detect user name. If you're the paranoid sort, feel free to <a |
|
| 277 |
+href="http://wiki.noreply.org/wiki/TheOnionRouter/TorInChroot">put Tor |
|
| 278 |
+into a chroot jail</a>.) |
|
| 279 |
+</p> |
|
| 280 |
+ |
|
| 281 |
+<p> |
|
| 282 |
+12. (Unix only.) Your operating system probably limits the number |
|
| 283 |
+of open file descriptors per process to 1024 (or even less). If you |
|
| 284 |
+plan to be running a fast exit node, this is probably not enough. On |
|
| 285 |
+Linux, you should add a line like "toruser hard nofile 8192" to your |
|
| 286 |
+/etc/security/limits.conf file (where toruser is the user that runs the |
|
| 287 |
+Tor process), and then restart Tor if it's installed as a package (or log |
|
| 288 |
+out and log back in if you run it yourself). If that doesn't work, see <a |
|
| 289 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FileDescriptors">this |
|
| 290 |
+FAQ entry</a> for other suggested ways to run "ulimit -n 8192" before |
|
| 291 |
+you launch Tor. |
|
| 292 |
+</p> |
|
| 293 |
+ |
|
| 294 |
+<p> |
|
| 295 |
+13. If you installed Tor via some package or installer, it probably starts |
|
| 296 |
+Tor for you automatically on boot. But if you installed from source, |
|
| 297 |
+you may find the initscripts in contrib/tor.sh or contrib/torctl useful. |
|
| 298 |
+</p> |
|
| 299 |
+ |
|
| 300 |
+When you change your Tor configuration, be sure to restart Tor, and |
|
| 301 |
+remember to verify that your server still works correctly after the |
|
| 302 |
+change. |
|
| 303 |
+ |
|
| 304 |
+<hr /> |
|
| 305 |
+ |
|
| 306 |
+<p>If you have suggestions for improving this document, please post |
|
| 307 |
+them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
| 308 |
+website category. Thanks!</p> |
|
| 309 |
+ |
|
| 310 |
+ </div><!-- #main --> |
|
| 311 |
+</div> |
|
| 312 |
+ |
|
| 313 |
+#include <foot.wmi> |
|
| 314 |
+ |
| ... | ... |
@@ -0,0 +1,191 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+ |
|
| 4 |
+#include "head.wmi" TITLE="Tor Linux/BSD/Unix Install Instructions" |
|
| 5 |
+ |
|
| 6 |
+<div class="center"> |
|
| 7 |
+ |
|
| 8 |
+<div class="main-column"> |
|
| 9 |
+ |
|
| 10 |
+<h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
|
| 11 |
+<br /> |
|
| 12 |
+ |
|
| 13 |
+<p> |
|
| 14 |
+<b>Note that these are the installation instructions for running a Tor |
|
| 15 |
+client. If you want to relay traffic for others to help the network grow |
|
| 16 |
+(please do), read the <a |
|
| 17 |
+href="<page tor-doc-server>">Configuring a server</a> guide.</b> |
|
| 18 |
+</p> |
|
| 19 |
+ |
|
| 20 |
+<hr /> |
|
| 21 |
+<a id="installing"></a> |
|
| 22 |
+<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
| 23 |
+<br /> |
|
| 24 |
+ |
|
| 25 |
+<p> |
|
| 26 |
+The latest release of Tor can be found on the <a |
|
| 27 |
+href="<page download>">download</a> page. We have packages for Debian, |
|
| 28 |
+Red Hat, Gentoo, *BSD, etc there too. |
|
| 29 |
+</p> |
|
| 30 |
+ |
|
| 31 |
+<p>If you're building from source, first install <a |
|
| 32 |
+href="http://www.monkey.org/~provos/libevent/">libevent</a>, and |
|
| 33 |
+make sure you have openssl and zlib (including the -devel packages if |
|
| 34 |
+applicable). Then Run <tt>tar xzf tor-0.1.0.15.tar.gz; |
|
| 35 |
+cd tor-0.1.0.15</tt>. Then <tt>./configure && make</tt>. Now you |
|
| 36 |
+can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt> |
|
| 37 |
+(as root if necessary) to install it into /usr/local/, and then you can |
|
| 38 |
+start it just by running <tt>tor</tt>. |
|
| 39 |
+</p> |
|
| 40 |
+ |
|
| 41 |
+<p>Tor comes configured as a client by default. It uses a built-in |
|
| 42 |
+default configuration file, and most people won't need to change any of |
|
| 43 |
+the settings. Tor is now installed. |
|
| 44 |
+</p> |
|
| 45 |
+ |
|
| 46 |
+<hr /> |
|
| 47 |
+<a id="privoxy"></a> |
|
| 48 |
+<h2><a class="anchor" href="#privoxy">Step Two: Install Privoxy for Web Browsing</a></h2> |
|
| 49 |
+<br /> |
|
| 50 |
+ |
|
| 51 |
+<p>After installing Tor, you need to configure your applications to use it. |
|
| 52 |
+</p> |
|
| 53 |
+ |
|
| 54 |
+<p> |
|
| 55 |
+The first step is to set up web browsing. Start by installing <a |
|
| 56 |
+href="http://www.privoxy.org/">Privoxy</a>: click on 'recent releases' |
|
| 57 |
+and pick your favorite package or install from source. Privoxy is a |
|
| 58 |
+filtering web proxy that integrates well with Tor. |
|
| 59 |
+</p> |
|
| 60 |
+ |
|
| 61 |
+<p>You need to configure Privoxy to use Tor. |
|
| 62 |
+Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/) |
|
| 63 |
+and add the line <br> |
|
| 64 |
+<tt>forward-socks4a / localhost:9050 .</tt><br> |
|
| 65 |
+to the top of the config file. Don't forget to add the dot at the end. |
|
| 66 |
+</p> |
|
| 67 |
+ |
|
| 68 |
+<p>Privoxy keeps a log file of everything passed through it. In |
|
| 69 |
+order to stop this you will need to comment out two lines by inserting a |
|
| 70 |
+# before the line. The two lines are:<br> |
|
| 71 |
+<tt>logfile logfile</tt><br> |
|
| 72 |
+and the line <br> |
|
| 73 |
+<tt>jarfile jarfile</tt><br> |
|
| 74 |
+</p> |
|
| 75 |
+ |
|
| 76 |
+<p>You'll need to restart Privoxy for the changes to take effect.</p> |
|
| 77 |
+ |
|
| 78 |
+<hr /> |
|
| 79 |
+<a id="using"></a> |
|
| 80 |
+<h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2> |
|
| 81 |
+<br /> |
|
| 82 |
+ |
|
| 83 |
+<p>After installing Tor and Privoxy, you need to configure your |
|
| 84 |
+applications to use them. The first step is to set up web browsing.</p> |
|
| 85 |
+ |
|
| 86 |
+<p>If you're using Firefox (we recommend it), check out our <a |
|
| 87 |
+href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
| 88 |
+a plugin that makes it easy to switch between using Tor and using a |
|
| 89 |
+direct connection.</p> |
|
| 90 |
+ |
|
| 91 |
+<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
| 92 |
+at localhost port 8118. |
|
| 93 |
+(That's where Privoxy listens.) |
|
| 94 |
+In Mozilla, this is in Edit|Preferences|Advanced|Proxies. |
|
| 95 |
+In Opera 7.5x it's Tools|Preferences|Network|Proxy servers. |
|
| 96 |
+You should click the "use the same proxy server for all protocols" |
|
| 97 |
+button; but see <a |
|
| 98 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
| 99 |
+note</a> about Tor and ftp proxies. |
|
| 100 |
+ |
|
| 101 |
+<p>Using privoxy is <strong>necessary</strong> because <a |
|
| 102 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
| 103 |
+leak your DNS requests when they use a SOCKS proxy directly</a>, which |
|
| 104 |
+is bad for your anonymity. Privoxy also removes certain dangerous |
|
| 105 |
+headers from your web requests, and blocks obnoxious ad sites like |
|
| 106 |
+Doubleclick.</p> |
|
| 107 |
+ |
|
| 108 |
+<p>To Torify other applications that support HTTP proxies, just |
|
| 109 |
+point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
| 110 |
+directly (for instant messaging, Jabber, IRC, etc), you can point |
|
| 111 |
+your application directly at Tor (localhost port 9050), but see <a |
|
| 112 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
| 113 |
+FAQ entry</a> for why this may be dangerous. For applications |
|
| 114 |
+that support neither SOCKS nor HTTP, take a look at <a |
|
| 115 |
+href="http://tsocks.sourceforge.net/">tsocks</a> or <a |
|
| 116 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
| 117 |
+</p> |
|
| 118 |
+ |
|
| 119 |
+<p>For information on how to Torify other applications, check out the |
|
| 120 |
+<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
| 121 |
+HOWTO</a>. |
|
| 122 |
+</p> |
|
| 123 |
+ |
|
| 124 |
+<hr /> |
|
| 125 |
+<a id="verify"></a> |
|
| 126 |
+<h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2> |
|
| 127 |
+<br /> |
|
| 128 |
+ |
|
| 129 |
+<p> |
|
| 130 |
+Next, you should try using your browser with Tor and make |
|
| 131 |
+sure that your IP address is being anonymized. Click on the <a |
|
| 132 |
+href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
| 133 |
+detector</a> and see whether it thinks you're using Tor or not. |
|
| 134 |
+(If that site is down, see <a |
|
| 135 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
| 136 |
+FAQ entry</a> for more suggestions on how to test your Tor.) |
|
| 137 |
+</p> |
|
| 138 |
+ |
|
| 139 |
+<p>If you have a personal firewall that limits your computer's |
|
| 140 |
+ability to connect to itself (this includes something like SELinux on |
|
| 141 |
+Fedora Core 4), be sure to allow connections from |
|
| 142 |
+your local applications to Privoxy (local port 8118) and Tor (local port |
|
| 143 |
+9050). If |
|
| 144 |
+your firewall blocks outgoing connections, punch a hole so |
|
| 145 |
+it can connect to at least TCP ports 80 and 443, and then see <a |
|
| 146 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
| 147 |
+FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to |
|
| 148 |
+run correctly, create a file named booleans.local in the directory |
|
| 149 |
+/etc/selinux/targeted. Edit this file in your favorite text editor and |
|
| 150 |
+insert "allow_ypbind=1". Restart your machine for this change to take |
|
| 151 |
+effect. |
|
| 152 |
+</p> |
|
| 153 |
+ |
|
| 154 |
+<p>If it's still not working, look at <a |
|
| 155 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
| 156 |
+FAQ entry</a> for hints.</p> |
|
| 157 |
+ |
|
| 158 |
+<hr /> |
|
| 159 |
+<a id="server"></a> |
|
| 160 |
+<h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2> |
|
| 161 |
+<br /> |
|
| 162 |
+ |
|
| 163 |
+<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
| 164 |
+people who run servers, the faster the Tor network will be. If you have |
|
| 165 |
+at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
| 166 |
+Tor to be a server too. We have many features that make Tor servers easy |
|
| 167 |
+and convenient, including rate limiting for bandwidth, exit policies so |
|
| 168 |
+you can limit your exposure to abuse complaints, and support for dynamic |
|
| 169 |
+IP addresses.</p> |
|
| 170 |
+ |
|
| 171 |
+<p>Having servers in many different places on the Internet is what |
|
| 172 |
+makes Tor users secure. <a |
|
| 173 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
| 174 |
+may also get stronger anonymity yourself</a>, |
|
| 175 |
+since remote sites can't know whether connections originated at your |
|
| 176 |
+computer or were relayed from others.</p> |
|
| 177 |
+ |
|
| 178 |
+<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
| 179 |
+guide.</p> |
|
| 180 |
+ |
|
| 181 |
+<hr /> |
|
| 182 |
+ |
|
| 183 |
+<p>If you have suggestions for improving this document, please post |
|
| 184 |
+them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
| 185 |
+website category. Thanks!</p> |
|
| 186 |
+ |
|
| 187 |
+ </div><!-- #main --> |
|
| 188 |
+</div> |
|
| 189 |
+ |
|
| 190 |
+#include <foot.wmi> |
|
| 191 |
+ |
| ... | ... |
@@ -0,0 +1,191 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+ |
|
| 4 |
+#include "head.wmi" TITLE="Tor MS Windows Install Instructions" |
|
| 5 |
+ |
|
| 6 |
+<div class="center"> |
|
| 7 |
+ |
|
| 8 |
+<div class="main-column"> |
|
| 9 |
+ |
|
| 10 |
+<h1>Running the <a href="<page index>">Tor</a> client on MS Windows</h1> |
|
| 11 |
+<br /> |
|
| 12 |
+ |
|
| 13 |
+<p> |
|
| 14 |
+<b>Note that these are the installation instructions for running a Tor |
|
| 15 |
+client on MS Windows (98, 98SE, NT4, 2000, XP, Server). |
|
| 16 |
+If you want to relay traffic for others to help the network grow (please |
|
| 17 |
+do), read the <a href="<page tor-doc-server>">Configuring a server</a> |
|
| 18 |
+guide.</b> |
|
| 19 |
+</p> |
|
| 20 |
+ |
|
| 21 |
+<hr /> |
|
| 22 |
+<a id="installing"></a> |
|
| 23 |
+<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
| 24 |
+<br /> |
|
| 25 |
+ |
|
| 26 |
+<p> |
|
| 27 |
+The install for MS Windows bundles <a href="<page index>">Tor</a>, |
|
| 28 |
+<a href="http://www.freehaven.net/~edmanm/torcp/">TorCP</a> |
|
| 29 |
+(a Tor controller that lets you monitor and control Tor), and <a |
|
| 30 |
+href="http://www.privoxy.org">Privoxy</a> (a filtering web proxy) into |
|
| 31 |
+one package, with the three applications pre-configured to work together. |
|
| 32 |
+<a href="<page download>">Download either the stable or |
|
| 33 |
+the experimental version from the download page</a>. |
|
| 34 |
+</p> |
|
| 35 |
+ |
|
| 36 |
+<p> |
|
| 37 |
+<b>If you want to configure yourself to be a Tor server via TorCP, |
|
| 38 |
+you will need the experimental version of the bundle.</b> |
|
| 39 |
+</p> |
|
| 40 |
+ |
|
| 41 |
+<p>If the bundles don't work for you, you can download Tor by itself |
|
| 42 |
+from the <a href="<page download>">download page</a>, and then <a |
|
| 43 |
+href="<page tor-doc-unix>#privoxy">install |
|
| 44 |
+and configure Privoxy on your own</a>. |
|
| 45 |
+</p> |
|
| 46 |
+ |
|
| 47 |
+<img alt="tor installer splash page" |
|
| 48 |
+src="http://tor.eff.org/img/screenshot-win32-installer-splash.png" /> |
|
| 49 |
+ |
|
| 50 |
+<p>If you have previously installed Tor, TorCP, or Privoxy |
|
| 51 |
+you can deselect whichever components you do not need to install |
|
| 52 |
+in the dialog shown below. |
|
| 53 |
+</p> |
|
| 54 |
+ |
|
| 55 |
+<img alt="select components to install" |
|
| 56 |
+src="http://tor.eff.org/img/screenshot-win32-installer-components.png" /> |
|
| 57 |
+ |
|
| 58 |
+<p>After you have completed the installer, the components |
|
| 59 |
+you selected will automatically be started for you. |
|
| 60 |
+</p> |
|
| 61 |
+ |
|
| 62 |
+<!-- |
|
| 63 |
+<p>Tor comes configured as a client by default. It uses a built-in |
|
| 64 |
+default configuration file, and most people won't need to change any of |
|
| 65 |
+the settings. Tor is now installed. |
|
| 66 |
+</p> |
|
| 67 |
+--> |
|
| 68 |
+ |
|
| 69 |
+<hr /> |
|
| 70 |
+<a id="using"></a> |
|
| 71 |
+<h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
|
| 72 |
+<br /> |
|
| 73 |
+ |
|
| 74 |
+<p>After installing Tor and Privoxy, you need to configure your |
|
| 75 |
+applications to use them. The first step is to set up web browsing.</p> |
|
| 76 |
+ |
|
| 77 |
+<p>If you're using Firefox (we recommend it), check out our <a |
|
| 78 |
+href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
| 79 |
+a plugin that makes it easy to switch between using Tor and using a |
|
| 80 |
+direct connection.</p> |
|
| 81 |
+ |
|
| 82 |
+<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
| 83 |
+at localhost port 8118. |
|
| 84 |
+(That's where Privoxy listens.) |
|
| 85 |
+In Mozilla, this is in Edit|Preferences|Advanced|Proxies. |
|
| 86 |
+In Opera 7.5x it's Tools|Preferences|Network|Proxy servers. |
|
| 87 |
+In IE, it's Tools|Internet Options|Connections|LAN Settings|Advanced. |
|
| 88 |
+You should click the "use the same proxy server for all protocols" |
|
| 89 |
+button; but see <a |
|
| 90 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
| 91 |
+note</a> about Tor and ftp proxies. |
|
| 92 |
+In IE, this looks something like:</p> |
|
| 93 |
+ |
|
| 94 |
+<img alt="Proxy settings in IE" |
|
| 95 |
+src="http://tor.eff.org/img/screenshot-win32-ie-proxies.jpg" /> |
|
| 96 |
+ |
|
| 97 |
+<p>Using Privoxy is <strong>necessary</strong> because <a |
|
| 98 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
| 99 |
+leak your DNS requests when they use a SOCKS proxy directly</a>, which |
|
| 100 |
+is bad for your anonymity. Privoxy also removes certain dangerous |
|
| 101 |
+headers from your web requests, and blocks obnoxious ad sites like |
|
| 102 |
+Doubleclick.</p> |
|
| 103 |
+ |
|
| 104 |
+<p>To Torify other applications that support HTTP proxies, just |
|
| 105 |
+point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
| 106 |
+directly (for instant messaging, Jabber, IRC, etc), you can point |
|
| 107 |
+your application directly at Tor (localhost port 9050), but see <a |
|
| 108 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
| 109 |
+FAQ entry</a> for why this may be dangerous. For applications |
|
| 110 |
+that support neither SOCKS nor HTTP, take a look at <a |
|
| 111 |
+href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a> or |
|
| 112 |
+<a href="http://www.freecap.ru/eng/">FreeCap</a>. |
|
| 113 |
+(FreeCap is free software; SocksCap is proprietary.)</p> |
|
| 114 |
+ |
|
| 115 |
+<p>For information on how to Torify other applications, check out the |
|
| 116 |
+<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
| 117 |
+HOWTO</a>. |
|
| 118 |
+</p> |
|
| 119 |
+ |
|
| 120 |
+<hr /> |
|
| 121 |
+<a id="verify"></a> |
|
| 122 |
+<h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
| 123 |
+<br /> |
|
| 124 |
+ |
|
| 125 |
+<p> |
|
| 126 |
+Check to see that Privoxy and TorCP are running and that TorCP has |
|
| 127 |
+successfully started Tor. Privoxy's icon is a green or blue circle with a "P" |
|
| 128 |
+in it, and TorCP uses a fat grey onion with a green checkmark in your |
|
| 129 |
+system notification area, as shown below: |
|
| 130 |
+</p> |
|
| 131 |
+ |
|
| 132 |
+<img alt="TorCP Tray Icon" |
|
| 133 |
+src="http://tor.eff.org/img/screenshot-win32-torcp.png"> |
|
| 134 |
+ |
|
| 135 |
+<p> |
|
| 136 |
+Next, you should try using your browser with Tor and make |
|
| 137 |
+sure that your IP address is being anonymized. Click on the <a |
|
| 138 |
+href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
| 139 |
+detector</a> and see whether it thinks you're using Tor or not. |
|
| 140 |
+(If that site is down, see <a |
|
| 141 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
| 142 |
+FAQ entry</a> for more suggestions on how to test your Tor.) |
|
| 143 |
+</p> |
|
| 144 |
+ |
|
| 145 |
+<p>If you have a personal firewall that limits your computer's |
|
| 146 |
+ability to connect to itself, be sure to allow connections from |
|
| 147 |
+your local applications to local port 8118 and port 9050. If |
|
| 148 |
+your firewall blocks outgoing connections, punch a hole so |
|
| 149 |
+it can connect to at least TCP ports 80 and 443, and then see <a |
|
| 150 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
| 151 |
+FAQ entry</a>. |
|
| 152 |
+</p> |
|
| 153 |
+ |
|
| 154 |
+<p>If it's still not working, look at <a |
|
| 155 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
| 156 |
+FAQ entry</a> for hints.</p> |
|
| 157 |
+ |
|
| 158 |
+<hr /> |
|
| 159 |
+<a id="server"></a> |
|
| 160 |
+<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
| 161 |
+<br /> |
|
| 162 |
+ |
|
| 163 |
+<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
| 164 |
+people who run servers, the faster the Tor network will be. If you have |
|
| 165 |
+at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
| 166 |
+Tor to be a server too. We have many features that make Tor servers easy |
|
| 167 |
+and convenient, including rate limiting for bandwidth, exit policies so |
|
| 168 |
+you can limit your exposure to abuse complaints, and support for dynamic |
|
| 169 |
+IP addresses.</p> |
|
| 170 |
+ |
|
| 171 |
+<p>Having servers in many different places on the Internet is what |
|
| 172 |
+makes Tor users secure. <a |
|
| 173 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
| 174 |
+may also get stronger anonymity yourself</a>, |
|
| 175 |
+since remote sites can't know whether connections originated at your |
|
| 176 |
+computer or were relayed from others.</p> |
|
| 177 |
+ |
|
| 178 |
+<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
| 179 |
+guide.</p> |
|
| 180 |
+ |
|
| 181 |
+<hr /> |
|
| 182 |
+ |
|
| 183 |
+<p>If you have suggestions for improving this document, please post |
|
| 184 |
+them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
| 185 |
+website category. Thanks!</p> |
|
| 186 |
+ |
|
| 187 |
+ </div><!-- #main --> |
|
| 188 |
+</div> |
|
| 189 |
+ |
|
| 190 |
+#include <foot.wmi> |
|
| 191 |
+ |
| ... | ... |
@@ -0,0 +1,158 @@ |
| 1 |
+## translation metadata |
|
| 2 |
+# Revision: $Revision$ |
|
| 3 |
+ |
|
| 4 |
+#include "head.wmi" TITLE="Tor SwitchProxy Install Instructions" |
|
| 5 |
+ |
|
| 6 |
+<div class="center"> |
|
| 7 |
+ |
|
| 8 |
+<div class="main-column"> |
|
| 9 |
+ |
|
| 10 |
+<h1>Installing SwitchProxy for <a href="<page index>">Tor</a></h1> |
|
| 11 |
+<hr /> |
|
| 12 |
+ |
|
| 13 |
+<p> |
|
| 14 |
+SwitchProxy is a Firefox plugin that makes it easy for you to switch |
|
| 15 |
+between using a proxy and connecting to websites directly.</p> |
|
| 16 |
+ |
|
| 17 |
+<p>In this howto, you'll set up SwitchProxy to let you change |
|
| 18 |
+between using Tor and a direct connection. We assume you already |
|
| 19 |
+have Firefox installed and working.</p> |
|
| 20 |
+ |
|
| 21 |
+<p>The screenshots here are oriented towards Windows users, but |
|
| 22 |
+SwitchProxy works anywhere Firefox works. Hopefully everybody else can |
|
| 23 |
+follow along just fine.</p> |
|
| 24 |
+ |
|
| 25 |
+<hr /> |
|
| 26 |
+<a id="zero"></a> |
|
| 27 |
+<h2><a class="anchor" href="#zero">Step Zero: Download and Install Tor and Privoxy</a></h2> |
|
| 28 |
+<br /> |
|
| 29 |
+ |
|
| 30 |
+<p>Before you start, you need to make sure 1) Tor is up and running, |
|
| 31 |
+2) Privoxy is up and running, and 3) Privoxy is configured to point |
|
| 32 |
+to Tor.</p> |
|
| 33 |
+ |
|
| 34 |
+<p>Windows users need to do <a |
|
| 35 |
+href="<page tor-doc-win32>#installing">step one</a> |
|
| 36 |
+of the Windows Tor installation howto, and Mac OS X users need to do <a |
|
| 37 |
+href="<page tor-doc-osx>#installing">step one</a> |
|
| 38 |
+of OS X Tor installation howto, since our Win32 and OS X packages include |
|
| 39 |
+Privoxy and configure it already. Linux/BSD/Unix users should do <a |
|
| 40 |
+href="<page tor-doc-unix>#installing">step one</a> |
|
| 41 |
+and <a href="<page tor-doc-unix>#privoxy">step |
|
| 42 |
+two</a> of the Unix Tor installation howto. |
|
| 43 |
+</p> |
|
| 44 |
+ |
|
| 45 |
+<hr /> |
|
| 46 |
+<a id="one"></a> |
|
| 47 |
+<h2><a class="anchor" href="#one">Step One: Download and Install SwitchProxy</a></h2> |
|
| 48 |
+<br /> |
|
| 49 |
+ |
|
| 50 |
+<p>SwitchProxy is a Firefox plugin, so you need to go through |
|
| 51 |
+the process of installing a new plugin. First, go to the <a |
|
| 52 |
+href="https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&id=125"> |
|
| 53 |
+SwitchProxy</a> web page. If you're using Firefox 1.5, you might need to |
|
| 54 |
+download SwitchProxy <a href="http://www.roundtwo.com/product/switchproxy">from |
|
| 55 |
+here</a> instead. |
|
| 56 |
+Turn on JavaScript for now and click "Install Now":</p> |
|
| 57 |
+ |
|
| 58 |
+<img alt="switchproxy web page" |
|
| 59 |
+src="http://tor.eff.org/img/screenshot-switchproxy-webpage.jpg" /> |
|
| 60 |
+ |
|
| 61 |
+<p>It will pop up a window asking for permission to install the plugin. |
|
| 62 |
+Click on the "Install Now" button: |
|
| 63 |
+</p> |
|
| 64 |
+ |
|
| 65 |
+<img alt="firefox plugin warning" |
|
| 66 |
+src="http://tor.eff.org/img/screenshot-switchproxy-plugin-starting.jpg" /> |
|
| 67 |
+ |
|
| 68 |
+<p>Once the installer is finished, you should close all of your Firefox |
|
| 69 |
+windows and restart Firefox.</p> |
|
| 70 |
+ |
|
| 71 |
+<img alt="firefox plugin finished" |
|
| 72 |
+src="http://tor.eff.org/img/screenshot-switchproxy-plugin-finished.jpg" /> |
|
| 73 |
+ |
|
| 74 |
+<hr /> |
|
| 75 |
+<a id="two"></a> |
|
| 76 |
+<h2><a class="anchor" href="#two">Step Two: Configure SwitchProxy</a></h2> |
|
| 77 |
+<br /> |
|
| 78 |
+ |
|
| 79 |
+<p>When you restart Firefox, you'll notice there's a new toolbar |
|
| 80 |
+that lets you control your proxies. Now we're going to set up a proxy |
|
| 81 |
+configuration for Tor. Click on "Add" in the new Proxy toolbar:</p> |
|
| 82 |
+ |
|
| 83 |
+<img alt="new toolbar" |
|
| 84 |
+src="http://tor.eff.org/img/screenshot-switchproxy-toolbar.jpg" /> |
|
| 85 |
+ |
|
| 86 |
+<p>It will ask you to select a proxy type. Choose |
|
| 87 |
+"Standard." (There's also an "anonymous" proxy type that |
|
| 88 |
+uses an ad hoc set of anonymous proxies out there. You |
|
| 89 |
+don't want this, because those other "anonymous" proxies <a |
|
| 90 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ComparisonProxyAggregators">give |
|
| 91 |
+you much weaker security than Tor</a>.) |
|
| 92 |
+</p> |
|
| 93 |
+ |
|
| 94 |
+<img alt="standard proxy" |
|
| 95 |
+src="http://tor.eff.org/img/screenshot-switchproxy-proxytype.jpg" /> |
|
| 96 |
+ |
|
| 97 |
+<p>Now it will show you the standard proxy config window for Firefox. |
|
| 98 |
+Give this configuration a proxy label of "tor". Then fill in "localhost" |
|
| 99 |
+and "8118" for all four entries, as shown here. (Even |
|
| 100 |
+though Privoxy doesn't support FTP and Gopher, <a |
|
| 101 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">you |
|
| 102 |
+should set them up anyway</a>.) Then click "OK":</p> |
|
| 103 |
+ |
|
| 104 |
+<img alt="proxy config" |
|
| 105 |
+src="http://tor.eff.org/img/screenshot-switchproxy-proxyconfig.jpg" /> |
|
| 106 |
+ |
|
| 107 |
+<p>Now you've created the "tor" proxy label, but you're not using it yet. |
|
| 108 |
+Click on the pull-down list and select tor, as shown here:</p> |
|
| 109 |
+ |
|
| 110 |
+<img alt="switch to tor" |
|
| 111 |
+src="http://tor.eff.org/img/screenshot-switchproxy-switch.jpg" /> |
|
| 112 |
+ |
|
| 113 |
+<p>Almost done. Click "Apply" to make your change take effect:</p> |
|
| 114 |
+ |
|
| 115 |
+<img alt="apply" |
|
| 116 |
+src="http://tor.eff.org/img/screenshot-switchproxy-apply.jpg" /> |
|
| 117 |
+ |
|
| 118 |
+<p>Done! Firefox will reload your current page. In |
|
| 119 |
+this example screenshot, it reloaded the page and <a |
|
| 120 |
+href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#GoogleLanguage">happened |
|
| 121 |
+to get a German exit node</a>:</p> |
|
| 122 |
+ |
|
| 123 |
+<img alt="german google" |
|
| 124 |
+src="http://tor.eff.org/img/screenshot-switchproxy-german.jpg" /> |
|
| 125 |
+ |
|
| 126 |
+<hr /> |
|
| 127 |
+<a id="three"></a> |
|
| 128 |
+<h2><a class="anchor" href="#three">Step Step Three: Check if it works</a></h2> |
|
| 129 |
+<br /> |
|
| 130 |
+ |
|
| 131 |
+<p>Now Firefox is using Privoxy as an HTTP proxy, Privoxy is using Tor as |
|
| 132 |
+a socks4a proxy, and Tor is making your connections to the Internet.</p> |
|
| 133 |
+ |
|
| 134 |
+<p>In the above example, it was clear that it worked because the web |
|
| 135 |
+page showed up in a different language. In other cases, though, |
|
| 136 |
+you'll want to verify that your setup is working. Do |
|
| 137 |
+<a href="<page tor-doc-win32>#verify">step three</a> |
|
| 138 |
+of the Windows Tor installation howto, or |
|
| 139 |
+<a href="<page tor-doc-osx>#verify">step three</a> |
|
| 140 |
+of the OS X Tor installation howto.</p> |
|
| 141 |
+ |
|
| 142 |
+<p>You should be aware of one anonymity gotcha: when you switch from |
|
| 143 |
+using Tor to a direct connection (or vice versa), by default the page |
|
| 144 |
+that's currently active will be reloaded through the new proxy setting. |
|
| 145 |
+So make sure you're on a page that isn't sensitive, before switching. |
|
| 146 |
+(You can also change this behavior in SwitchProxy's "Options | |
|
| 147 |
+Preferences" menu.)</p> |
|
| 148 |
+ |
|
| 149 |
+<hr /> |
|
| 150 |
+ |
|
| 151 |
+<p>If you have suggestions for improving this document, please <a |
|
| 152 |
+href="/contact">send them to us</a>. Thanks!</p> |
|
| 153 |
+ |
|
| 154 |
+ </div><!-- #main --> |
|
| 155 |
+</div> |
|
| 156 |
+ |
|
| 157 |
+#include <foot.wmi> |
|
| 158 |
+ |
|
| 0 | 159 |