Roger Dingledine commited on 2006-03-15 20:55:52
Zeige 5 geänderte Dateien mit 0 Einfügungen und 1089 Löschungen.
... | ... |
@@ -1,235 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor Mac OS X Install Instructions" |
|
5 |
- |
|
6 |
-<div class="center"> |
|
7 |
- |
|
8 |
-<div class="main-column"> |
|
9 |
- |
|
10 |
-<h1>Running the <a href="<page index>">Tor</a> client on Mac OS X</h1> |
|
11 |
-<br /> |
|
12 |
- |
|
13 |
-<p> |
|
14 |
-<b>Note that these are the installation instructions for running a Tor client on |
|
15 |
- Mac OS X. If you want to relay traffic for others to help the network |
|
16 |
- grow (please do), read the <a |
|
17 |
- href="<page tor-doc-server>">Configuring a server</a> guide.</b> |
|
18 |
-</p> |
|
19 |
- |
|
20 |
-<hr /> |
|
21 |
-<a id="installing"></a> |
|
22 |
-<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
23 |
-<br /> |
|
24 |
- |
|
25 |
-<p> |
|
26 |
-The latest stable and experimental releases of Tor for Macintosh |
|
27 |
-OS X bundle <a href="<page index>">Tor</a> and <a |
|
28 |
-href="http://www.privoxy.org">Privoxy</a> (a filtering web proxy) |
|
29 |
-into one package, with Privoxy pre-configured to proxy through Tor. |
|
30 |
-<a href="<page download>">Download one from the download |
|
31 |
-page</a>. |
|
32 |
-</p> |
|
33 |
- |
|
34 |
-<p>Our Tor installer should make everything pretty simple. Below is a |
|
35 |
-screenshot of the setup page: |
|
36 |
-</p> |
|
37 |
- |
|
38 |
-<img alt="tor installer splash page" |
|
39 |
-src="http://tor.eff.org/img/screenshot-osx-installer-splash.png" |
|
40 |
-border="1"> |
|
41 |
- |
|
42 |
-<p> |
|
43 |
-By default, Tor is configured to run at startup. If you do not want Tor to |
|
44 |
-run on startup, you can disable this by selecting "Customize" in the |
|
45 |
-Installer, and then un-checking the "Tor Startup Script" box. Be sure to |
|
46 |
-leave the other boxes checked. |
|
47 |
-</p> |
|
48 |
- |
|
49 |
-<p>Once the installer is finished and your computer restarts, Tor will |
|
50 |
-start automatically. Tor comes configured as a client by default. It |
|
51 |
-uses a built-in default configuration file in <tt>/Library/Tor/torrc</tt>, |
|
52 |
-but most people won't need to change any of the settings. Tor is now |
|
53 |
-installed.</p> |
|
54 |
- |
|
55 |
-<p>Privoxy is installed as part of the Tor bundle package |
|
56 |
-installer. Privoxy is a filtering web proxy that integrates well with |
|
57 |
-Tor. Once it's installed, it will start automatically when your computer |
|
58 |
-is restarted. |
|
59 |
-</p> |
|
60 |
- |
|
61 |
-<p>You do not need to configure Privoxy to use Tor. A custom Privoxy |
|
62 |
-configuration for Tor has been installed as part of the installer package. |
|
63 |
-</p> |
|
64 |
- |
|
65 |
-<hr /> |
|
66 |
-<a id="using"></a> |
|
67 |
-<h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
|
68 |
-<br /> |
|
69 |
- |
|
70 |
-<p>After installing Tor and Privoxy, you need to configure your |
|
71 |
-applications to use them. The first step is to set up web browsing.</p> |
|
72 |
- |
|
73 |
-<p>If you're using Firefox (we recommend it), check out our <a |
|
74 |
-href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
75 |
-a plugin that makes it easy to switch between using Tor and using a |
|
76 |
-direct connection.</p> |
|
77 |
- |
|
78 |
-<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
79 |
-at localhost port 8118. |
|
80 |
-(That's where Privoxy listens.) |
|
81 |
-In Mozilla, this is in Mozilla|Preferences|Advanced|Proxies. |
|
82 |
-You should set both your Web Proxy (HTTP) and your Secure Web Proxy |
|
83 |
-(HTTPS or SSL) to localhost port 8118, to hide your SSL traffic too. |
|
84 |
-You should consider configuring your "FTP Proxy" too; see <a |
|
85 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
86 |
-note</a> about Tor and ftp proxies. |
|
87 |
-</p> |
|
88 |
- |
|
89 |
-<p>If you want to use Tor with Safari, you need to change your |
|
90 |
-Network Settings. Select your Network Preferences from the Apple | |
|
91 |
-Location menu:</p> |
|
92 |
- |
|
93 |
-<img alt="Network settings" |
|
94 |
-src="http://tor.eff.org/img/screenshot-osx-choose-network.png" |
|
95 |
-border="1"> |
|
96 |
- |
|
97 |
-<p>Select the Network Interface on which you want to enable Tor. If you use |
|
98 |
-more than one Interface you must change the proxy settings for each |
|
99 |
-individually.</p> |
|
100 |
- |
|
101 |
-<img alt="Network preferences" |
|
102 |
-src="http://tor.eff.org/img/screenshot-osx-choose-interface.png" |
|
103 |
-border="1"> |
|
104 |
-<p> |
|
105 |
- |
|
106 |
-<p>Select and enter 127.0.0.1 and port 8118 for both |
|
107 |
-Web Proxy (HTTP) and your Secure Web Proxy (HTTPS). |
|
108 |
-You should also do this for "FTP Proxy" and "Gopher Proxy"; see <a |
|
109 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
110 |
-note</a> about Tor and ftp proxies. Leave your Use Passive FTP Mode |
|
111 |
-(PASV) setting as is.</p> |
|
112 |
- |
|
113 |
-<img alt="Proxy settings" |
|
114 |
-src="http://tor.eff.org/img/screenshot-osx-proxy-settings.png" |
|
115 |
-border="1"> |
|
116 |
- |
|
117 |
-<p>Using privoxy is <strong>necessary</strong> because <a |
|
118 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
119 |
-leak your |
|
120 |
-DNS requests when they use a SOCKS proxy directly</a>, which is bad for |
|
121 |
-your anonymity. Privoxy also removes certain dangerous headers from your |
|
122 |
-web requests, and blocks obnoxious ad sites like Doubleclick.</p> |
|
123 |
- |
|
124 |
-<p>To Torify other applications that support HTTP proxies, just |
|
125 |
-point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
126 |
-directly (for instant messaging, Jabber, IRC, etc), you can point |
|
127 |
-your application directly at Tor (localhost port 9050), but see <a |
|
128 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
129 |
-FAQ entry</a> for why this may be dangerous. For applications |
|
130 |
-that support neither SOCKS nor HTTP, take a look at <a |
|
131 |
-href="http://www.taiyo.co.jp/~gotoh/ssh/connect.html">connect</a> or |
|
132 |
-<a href="http://www.dest-unreach.org/socat/">socat</a>.</p> |
|
133 |
- |
|
134 |
-<p>For information on how to Torify other applications, check out the |
|
135 |
-<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
136 |
-HOWTO</a>. |
|
137 |
-</p> |
|
138 |
- |
|
139 |
-<hr /> |
|
140 |
-<a id="verify"></a> |
|
141 |
-<h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
142 |
-<br /> |
|
143 |
- |
|
144 |
-<p> |
|
145 |
-Next, you should try using your browser with Tor and make |
|
146 |
-sure that your IP address is being anonymized. Click on the <a |
|
147 |
-href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
148 |
-detector</a> and see whether it thinks you're using Tor or not. |
|
149 |
-(If that site is down, see <a |
|
150 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
151 |
-FAQ entry</a> for more suggestions on how to test your Tor.) |
|
152 |
-</p> |
|
153 |
- |
|
154 |
-<p>If you have a personal firewall that limits your computer's |
|
155 |
-ability to connect to itself, be sure to allow connections from |
|
156 |
-your local applications to local port 8118 and port 9050. If |
|
157 |
-your firewall blocks outgoing connections, punch a hole so |
|
158 |
-it can connect to at least TCP ports 80 and 443, and then see <a |
|
159 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
160 |
-FAQ entry</a>. |
|
161 |
-</p> |
|
162 |
- |
|
163 |
-<p>If it's still not working, look at <a |
|
164 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
165 |
-FAQ entry</a> for hints.</p> |
|
166 |
- |
|
167 |
-<hr /> |
|
168 |
-<a id="server"></a> |
|
169 |
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
170 |
-<br /> |
|
171 |
- |
|
172 |
-<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
173 |
-people who run servers, the faster the Tor network will be. If you have |
|
174 |
-at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
175 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
176 |
-and convenient, including rate limiting for bandwidth, exit policies so |
|
177 |
-you can limit your exposure to abuse complaints, and support for dynamic |
|
178 |
-IP addresses.</p> |
|
179 |
- |
|
180 |
-<p>Having servers in many different places on the Internet is what |
|
181 |
-makes Tor users secure. <a |
|
182 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
183 |
-may also get stronger anonymity yourself</a>, |
|
184 |
-since remote sites can't know whether connections originated at your |
|
185 |
-computer or were relayed from others.</p> |
|
186 |
- |
|
187 |
-<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
188 |
-guide.</p> |
|
189 |
- |
|
190 |
-<hr /> |
|
191 |
-<a id="uninstall"></a> |
|
192 |
-<h2><a class="anchor" href="#uninstall">How To Uninstall Tor and Privoxy</a></h2> |
|
193 |
-<br /> |
|
194 |
- |
|
195 |
-<p>The Tor 0.1.0.x series does not come with an uninstaller; this feature |
|
196 |
- will be added in the 0.1.1.x series. If you want to remove Tor on OSX, |
|
197 |
- here's how:</p> |
|
198 |
- |
|
199 |
-<p>Change your application proxy settings back to their original values. |
|
200 |
- If you just want to stop using Tor, you can end at this point.</p> |
|
201 |
- |
|
202 |
-<p>To stop Tor and Privoxy from running on startup</b>, remove the |
|
203 |
- /Library/StartupItems/Tor and /Library/StartupItems/Privoxy directories |
|
204 |
- respectively. If you just want to stop Tor from running, you can end at this |
|
205 |
- point.</p> |
|
206 |
- |
|
207 |
-<p>To erase all remaining Tor and Privoxy files from your computer, delete |
|
208 |
- the following: |
|
209 |
- <ul> |
|
210 |
- <li>/Library/Tor</li> |
|
211 |
- <li>/Library/Privoxy</li> |
|
212 |
- <li>/usr/bin/tor</li> |
|
213 |
- <li>/usr/bin/tor_resolve</li> |
|
214 |
- <li>/var/log/tor</li> |
|
215 |
- <li>/usr/share/man/man1/tor.1</li> |
|
216 |
- <li>/usr/share/man/man1/tor-resolve.1</li> |
|
217 |
- <li>/usr/share/man/man1/torify.1</li> |
|
218 |
- <li>/Library/Receipts/Privoxy.pkg/</li> |
|
219 |
- <li>/Library/Receipts/privoxyconf.pkg/</li> |
|
220 |
- <li>/Library/Receipts/Tor.pkg/</li> |
|
221 |
- <li>/Library/Receipts/torstartup.pkg/</li> |
|
222 |
- </ul> |
|
223 |
-</p> |
|
224 |
- |
|
225 |
-<hr /> |
|
226 |
- |
|
227 |
-<p>If you have suggestions for improving this document, please post |
|
228 |
-them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
229 |
-website category. Thanks!</p> |
|
230 |
- |
|
231 |
- </div><!-- #main --> |
|
232 |
-</div> |
|
233 |
- |
|
234 |
-#include <foot.wmi> |
|
235 |
- |
... | ... |
@@ -1,314 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor Server Configuration Instructions" |
|
5 |
- |
|
6 |
-<div class="center"> |
|
7 |
- |
|
8 |
-<div class="main-column"> |
|
9 |
- |
|
10 |
-<h1>Configuring a <a href="<page index>">Tor</a> server</h1> |
|
11 |
-<br /> |
|
12 |
- |
|
13 |
-<p> |
|
14 |
-The Tor network relies on volunteers to donate bandwidth. The more |
|
15 |
-people who run servers, the faster the Tor network will be. If you have |
|
16 |
-at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
17 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
18 |
-and convenient, including rate limiting for bandwidth, exit policies so |
|
19 |
-you can limit your exposure to abuse complaints, and support for dynamic |
|
20 |
-IP addresses.</p> |
|
21 |
- |
|
22 |
-<p>Having servers in many different places on the Internet is what |
|
23 |
-makes Tor users secure. <a |
|
24 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
25 |
-may also get stronger anonymity yourself</a>, |
|
26 |
-since remote sites can't know whether connections originated at your |
|
27 |
-computer or were relayed from others.</p> |
|
28 |
- |
|
29 |
-<p>Setting up a Tor server is easy and convenient: |
|
30 |
-<ul> |
|
31 |
-<li>Tor has built-in support for <a |
|
32 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
33 |
-limiting</a>. Further, if you have a fast link |
|
34 |
-but want to limit the number of bytes per day |
|
35 |
-(or week or month) that you donate, check out the <a |
|
36 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#Hibernation">hibernation |
|
37 |
-feature</a>. |
|
38 |
-</li> |
|
39 |
-<li>Each Tor server has an <a |
|
40 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#RunAServerBut">exit |
|
41 |
-policy</a> that specifies what sort of outbound connections are allowed |
|
42 |
-or refused from that server. If you are uncomfortable allowing people |
|
43 |
-to exit from your server, you can set it up to only allow connections |
|
44 |
-to other Tor servers. |
|
45 |
-</li> |
|
46 |
-<li>It's fine if the server goes offline sometimes. The directories |
|
47 |
-notice this quickly and stop advertising the server. Just try to make |
|
48 |
-sure it's not too often, since connections using the server when it |
|
49 |
-disconnects will break. |
|
50 |
-</li> |
|
51 |
-<li>We can handle servers with dynamic IPs just fine, as long as the |
|
52 |
-server itself knows its IP. Have a look at this |
|
53 |
-<a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#DynamicIP"> |
|
54 |
-entry in the FAQ</a>. |
|
55 |
-</li> |
|
56 |
-<li>If your server is behind a NAT and it doesn't know its public |
|
57 |
-IP (e.g. it has an IP of 192.168.x.y), you'll need to set up port |
|
58 |
-forwarding. Forwarding TCP connections is system dependent but <a |
|
59 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledCli |
|
60 |
-ents">this FAQ entry</a> offers some examples on how to do this. |
|
61 |
-</li> |
|
62 |
-<li>Your server will passively estimate and advertise its recent |
|
63 |
-bandwidth capacity, so high-bandwidth servers will attract more users than |
|
64 |
-low-bandwidth ones. Therefore having low-bandwidth servers is useful too. |
|
65 |
-</li> |
|
66 |
-</ul> |
|
67 |
- |
|
68 |
-<p>You can run a Tor server on |
|
69 |
-pretty much any operating system, but see <a |
|
70 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerOS">this |
|
71 |
-FAQ entry</a> for advice about which ones work best and other problems |
|
72 |
-you might encounter.</p> |
|
73 |
- |
|
74 |
-<hr /> |
|
75 |
-<a id="zero"></a> |
|
76 |
-<h2><a class="anchor" href="#zero">Step Zero: Download and Install Tor</a></h2> |
|
77 |
-<br /> |
|
78 |
- |
|
79 |
-<p>Before you start, you need to make sure that Tor is up and running. |
|
80 |
-</p> |
|
81 |
- |
|
82 |
-<p>For Windows users, this means at least <a |
|
83 |
-href="<page tor-doc-win32>#installing">step one</a> |
|
84 |
-of the Windows Tor installation howto. Mac OS X users need to do at least |
|
85 |
-<a href="<page tor-doc-osx>#installing">step one</a> |
|
86 |
-of OS X Tor installation howto. Linux/BSD/Unix users should do at least |
|
87 |
-<a href="<page tor-doc-unix>#installing">step one</a> |
|
88 |
-of the Unix Tor installation howto. |
|
89 |
-</p> |
|
90 |
- |
|
91 |
-<p>If it's convenient, you might also want to use it as a client for a |
|
92 |
-while to make sure it's actually working.</p> |
|
93 |
- |
|
94 |
-<hr /> |
|
95 |
-<a id="one"></a> |
|
96 |
-<h2><a class="anchor" href="#one">Step One: Set it up as a server</a></h2> |
|
97 |
-<br /> |
|
98 |
- |
|
99 |
-<p> |
|
100 |
-1. Verify that your clock is set correctly. If possible, synchronize |
|
101 |
-your clock with public time servers. |
|
102 |
-</p> |
|
103 |
- |
|
104 |
-<p> |
|
105 |
-2. Make sure name resolution works (that is, your computer can resolve addresses correctly). |
|
106 |
-</p> |
|
107 |
- |
|
108 |
-<p> |
|
109 |
-3. Edit the bottom part of your torrc. (See <a |
|
110 |
-href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#torrc">this |
|
111 |
-FAQ entry</a> for help.) |
|
112 |
-Make sure to define at least Nickname and ORPort. Create the DataDirectory |
|
113 |
-if necessary, and make sure it's owned by the user that will be running |
|
114 |
-tor. <em>If you want to run more than one server that's great, but |
|
115 |
-please set <a href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#MultipleServers">the |
|
116 |
-MyFamily option</a> in all your servers' configuration files.</em> |
|
117 |
-</p> |
|
118 |
- |
|
119 |
-<p> |
|
120 |
-4. If you are using a firewall, open a hole in your firewall so |
|
121 |
-incoming connections can reach the ports you configured (ORPort, plus |
|
122 |
-DirPort if you enabled it). Make sure you allow all outgoing connections, |
|
123 |
-so your server can reach the other Tor servers. |
|
124 |
-</p> |
|
125 |
- |
|
126 |
-<p> |
|
127 |
-5. Start your server: if you installed from source you can just |
|
128 |
-run <tt>tor</tt>, whereas packages typically launch Tor from their |
|
129 |
-initscripts or startup scripts. If it logs any warnings, address them. (By |
|
130 |
-default Tor logs to stdout, but some packages log to <tt>/var/log/tor/</tt> |
|
131 |
-instead. You can edit your torrc to configure log locations.) |
|
132 |
-</p> |
|
133 |
- |
|
134 |
-<p> |
|
135 |
-6. Subscribe to the <a |
|
136 |
-href="http://archives.seul.org/or/announce/">or-announce</a> |
|
137 |
-mailing list. It is very low volume, and it will keep you informed |
|
138 |
-of new stable releases. You might also consider subscribing to <a |
|
139 |
-href="http://archives.seul.org/or/talk/">or-talk</a> (higher volume), |
|
140 |
-where new development releases are announced. |
|
141 |
-</p> |
|
142 |
- |
|
143 |
-<p> |
|
144 |
-7. Have a look at the manual. |
|
145 |
-The <a href="<page tor-manual>">manual</a> for the |
|
146 |
-latest stable version provides detailed instructions for how to install |
|
147 |
-and use Tor, including configuration of client and server options. |
|
148 |
-If you are running the CVS version the manual is available |
|
149 |
-<a href="<page tor-manual-cvs>">here</a>. |
|
150 |
-</p> |
|
151 |
- |
|
152 |
-<p> |
|
153 |
-8. Read |
|
154 |
-<a href="http://wiki.noreply.org/noreply/TheOnionRouter/OperationalSecurity">this document</a> |
|
155 |
-to get ideas how you can increase the security of your server. |
|
156 |
-<hr /> |
|
157 |
-<a id="two"></a> |
|
158 |
-<h2><a class="anchor" href="#two">Step Two: Make sure it's working</a></h2> |
|
159 |
-<br /> |
|
160 |
- |
|
161 |
-<p>As soon as your server manages to connect to the network, it will |
|
162 |
-try to determine whether the ports you configured are reachable from |
|
163 |
-the outside. This may take up to 20 minutes. Look for a log entry like |
|
164 |
-<tt>Self-testing indicates your ORPort is reachable from the outside. Excellent.</tt> |
|
165 |
-If you don't see this message, it means that your server is not reachable |
|
166 |
-from the outside — you should re-check your firewalls, check that it's |
|
167 |
-testing the IP and port you think it should be testing, etc. |
|
168 |
-</p> |
|
169 |
- |
|
170 |
-<p>When it decides that it's reachable, it will upload a "server |
|
171 |
-descriptor" to the directories. This will let clients know |
|
172 |
-what address, ports, keys, etc your server is using. You can <a |
|
173 |
-href="http://belegost.seul.org/">load the directory manually</a> and |
|
174 |
-look through it to find the nickname you configured, to make sure it's |
|
175 |
-there. You may need to wait a few seconds to give enough time for it to |
|
176 |
-make a fresh directory.</p> |
|
177 |
- |
|
178 |
-<hr /> |
|
179 |
-<a id="three"></a> |
|
180 |
-<h2><a class="anchor" href="#three">Step Three: Register your nickname</a></h2> |
|
181 |
-<br /> |
|
182 |
- |
|
183 |
-<p> |
|
184 |
-Once you are convinced it's working (after a day or two maybe), you should |
|
185 |
-register your server. |
|
186 |
-This reserves your nickname so nobody else can take it, and lets us |
|
187 |
-contact you if you need to upgrade or something goes wrong. |
|
188 |
-</p> |
|
189 |
- |
|
190 |
-<p> |
|
191 |
-Send mail to <a |
|
192 |
-href="mailto:tor-ops@freehaven.net">tor-ops@freehaven.net</a> with a |
|
193 |
-subject of '[New Server] <your server's nickname>' and |
|
194 |
-include the following information in the message: |
|
195 |
-</p> |
|
196 |
-<ul> |
|
197 |
-<li>Your server's nickname</li> |
|
198 |
-<li>The fingerprint for your server's key (the contents of the |
|
199 |
-"fingerprint" file in your DataDirectory — on Windows, look in |
|
200 |
-\<i>username</i>\Application Data\tor\ or \Application Data\tor\; |
|
201 |
-on OS X, look in /Library/Tor/var/lib/tor/; and on Linux/BSD/Unix, |
|
202 |
-look in /var/lib/tor or ~/.tor) |
|
203 |
-</li> |
|
204 |
-<li>Who you are, so we know whom to contact if a problem arises</li> |
|
205 |
-<li>What kind of connectivity the new server will have</li> |
|
206 |
-</ul> |
|
207 |
- |
|
208 |
-<hr /> |
|
209 |
-<a id="four"></a> |
|
210 |
-<h2><a class="anchor" href="#four">Step Four: Once it's working</a></h2> |
|
211 |
-<br /> |
|
212 |
- |
|
213 |
-<p> |
|
214 |
-We recommend the following steps as well: |
|
215 |
-</p> |
|
216 |
- |
|
217 |
-<p> |
|
218 |
-6. Decide what exit policy you want. By default your server allows |
|
219 |
-access to many popular services, but we restrict some (such as port 25) |
|
220 |
-due to abuse potential. You might want an exit policy that is |
|
221 |
-less restrictive or more restrictive; edit your torrc appropriately. |
|
222 |
-Read the FAQ entry on <a |
|
223 |
-href="<page faq-abuse>#TypicalAbuses">issues you might |
|
224 |
-encounter if you use the default exit policy</a>. |
|
225 |
-If you choose a particularly open exit policy, you should make |
|
226 |
-sure your ISP is ok with that choice. |
|
227 |
-</p> |
|
228 |
- |
|
229 |
-<p> |
|
230 |
-7. Decide about rate limiting. Cable modem, DSL, and other users |
|
231 |
-who have asymmetric bandwidth (e.g. more down than up) should |
|
232 |
-rate limit to their slower bandwidth, to avoid congestion. See the <a |
|
233 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth">rate |
|
234 |
-limiting FAQ entry</a> for details. |
|
235 |
-</p> |
|
236 |
- |
|
237 |
-<p> |
|
238 |
-8. If you control the name servers for your domain, consider setting |
|
239 |
-your hostname to 'anonymous' or 'proxy' or 'tor-proxy', so when other |
|
240 |
-people see the address in their web logs, they will more quickly |
|
241 |
-understand what's going on. |
|
242 |
-</p> |
|
243 |
- |
|
244 |
-<p> |
|
245 |
-9. If your computer isn't running a webserver, please consider |
|
246 |
-changing your ORPort to 443 and your DirPort to 80. Many Tor |
|
247 |
-users are stuck behind firewalls that only let them browse the |
|
248 |
-web, and this change will let them reach your Tor server. Win32 |
|
249 |
-servers can simply change their ORPort and DirPort directly |
|
250 |
-in their torrc and restart Tor. OS X or Unix servers can't bind |
|
251 |
-directly to these ports (since they don't run as root), so they will |
|
252 |
-need to set up some sort of <a |
|
253 |
-href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#ServerForFirewalledClients"> |
|
254 |
-port forwarding</a> so connections can reach their Tor server. If you are |
|
255 |
-using ports 80 and 443 already but still want to help out, other useful |
|
256 |
-ports are 22, 110, and 143. |
|
257 |
-</p> |
|
258 |
- |
|
259 |
-<p> |
|
260 |
-10. If your Tor server provides other services on the same IP address |
|
261 |
-— such as a public webserver — make sure that connections to the |
|
262 |
-webserver are allowed from the local host too. You need to allow these |
|
263 |
-connections because Tor clients will detect that your Tor server is the <a |
|
264 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ExitEavesdroppers">safest |
|
265 |
-way to reach that webserver</a>, and always build a circuit that ends |
|
266 |
-at your server. If you don't want to allow the connections, you must |
|
267 |
-explicitly reject them in your exit policy. |
|
268 |
-</p> |
|
269 |
- |
|
270 |
-<p> |
|
271 |
-11. (Unix only). Make a separate user to run the server. If you |
|
272 |
-installed the OS X package or the deb or the rpm, this is already |
|
273 |
-done. Otherwise, you can do it by hand. (The Tor server doesn't need to |
|
274 |
-be run as root, so it's good practice to not run it as root. Running |
|
275 |
-as a 'tor' user avoids issues with identd and other services that |
|
276 |
-detect user name. If you're the paranoid sort, feel free to <a |
|
277 |
-href="http://wiki.noreply.org/wiki/TheOnionRouter/TorInChroot">put Tor |
|
278 |
-into a chroot jail</a>.) |
|
279 |
-</p> |
|
280 |
- |
|
281 |
-<p> |
|
282 |
-12. (Unix only.) Your operating system probably limits the number |
|
283 |
-of open file descriptors per process to 1024 (or even less). If you |
|
284 |
-plan to be running a fast exit node, this is probably not enough. On |
|
285 |
-Linux, you should add a line like "toruser hard nofile 8192" to your |
|
286 |
-/etc/security/limits.conf file (where toruser is the user that runs the |
|
287 |
-Tor process), and then restart Tor if it's installed as a package (or log |
|
288 |
-out and log back in if you run it yourself). If that doesn't work, see <a |
|
289 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FileDescriptors">this |
|
290 |
-FAQ entry</a> for other suggested ways to run "ulimit -n 8192" before |
|
291 |
-you launch Tor. |
|
292 |
-</p> |
|
293 |
- |
|
294 |
-<p> |
|
295 |
-13. If you installed Tor via some package or installer, it probably starts |
|
296 |
-Tor for you automatically on boot. But if you installed from source, |
|
297 |
-you may find the initscripts in contrib/tor.sh or contrib/torctl useful. |
|
298 |
-</p> |
|
299 |
- |
|
300 |
-When you change your Tor configuration, be sure to restart Tor, and |
|
301 |
-remember to verify that your server still works correctly after the |
|
302 |
-change. |
|
303 |
- |
|
304 |
-<hr /> |
|
305 |
- |
|
306 |
-<p>If you have suggestions for improving this document, please post |
|
307 |
-them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
308 |
-website category. Thanks!</p> |
|
309 |
- |
|
310 |
- </div><!-- #main --> |
|
311 |
-</div> |
|
312 |
- |
|
313 |
-#include <foot.wmi> |
|
314 |
- |
... | ... |
@@ -1,191 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor Linux/BSD/Unix Install Instructions" |
|
5 |
- |
|
6 |
-<div class="center"> |
|
7 |
- |
|
8 |
-<div class="main-column"> |
|
9 |
- |
|
10 |
-<h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
|
11 |
-<br /> |
|
12 |
- |
|
13 |
-<p> |
|
14 |
-<b>Note that these are the installation instructions for running a Tor |
|
15 |
-client. If you want to relay traffic for others to help the network grow |
|
16 |
-(please do), read the <a |
|
17 |
-href="<page tor-doc-server>">Configuring a server</a> guide.</b> |
|
18 |
-</p> |
|
19 |
- |
|
20 |
-<hr /> |
|
21 |
-<a id="installing"></a> |
|
22 |
-<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
23 |
-<br /> |
|
24 |
- |
|
25 |
-<p> |
|
26 |
-The latest release of Tor can be found on the <a |
|
27 |
-href="<page download>">download</a> page. We have packages for Debian, |
|
28 |
-Red Hat, Gentoo, *BSD, etc there too. |
|
29 |
-</p> |
|
30 |
- |
|
31 |
-<p>If you're building from source, first install <a |
|
32 |
-href="http://www.monkey.org/~provos/libevent/">libevent</a>, and |
|
33 |
-make sure you have openssl and zlib (including the -devel packages if |
|
34 |
-applicable). Then Run <tt>tar xzf tor-0.1.0.15.tar.gz; |
|
35 |
-cd tor-0.1.0.15</tt>. Then <tt>./configure && make</tt>. Now you |
|
36 |
-can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt> |
|
37 |
-(as root if necessary) to install it into /usr/local/, and then you can |
|
38 |
-start it just by running <tt>tor</tt>. |
|
39 |
-</p> |
|
40 |
- |
|
41 |
-<p>Tor comes configured as a client by default. It uses a built-in |
|
42 |
-default configuration file, and most people won't need to change any of |
|
43 |
-the settings. Tor is now installed. |
|
44 |
-</p> |
|
45 |
- |
|
46 |
-<hr /> |
|
47 |
-<a id="privoxy"></a> |
|
48 |
-<h2><a class="anchor" href="#privoxy">Step Two: Install Privoxy for Web Browsing</a></h2> |
|
49 |
-<br /> |
|
50 |
- |
|
51 |
-<p>After installing Tor, you need to configure your applications to use it. |
|
52 |
-</p> |
|
53 |
- |
|
54 |
-<p> |
|
55 |
-The first step is to set up web browsing. Start by installing <a |
|
56 |
-href="http://www.privoxy.org/">Privoxy</a>: click on 'recent releases' |
|
57 |
-and pick your favorite package or install from source. Privoxy is a |
|
58 |
-filtering web proxy that integrates well with Tor. |
|
59 |
-</p> |
|
60 |
- |
|
61 |
-<p>You need to configure Privoxy to use Tor. |
|
62 |
-Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/) |
|
63 |
-and add the line <br> |
|
64 |
-<tt>forward-socks4a / localhost:9050 .</tt><br> |
|
65 |
-to the top of the config file. Don't forget to add the dot at the end. |
|
66 |
-</p> |
|
67 |
- |
|
68 |
-<p>Privoxy keeps a log file of everything passed through it. In |
|
69 |
-order to stop this you will need to comment out two lines by inserting a |
|
70 |
-# before the line. The two lines are:<br> |
|
71 |
-<tt>logfile logfile</tt><br> |
|
72 |
-and the line <br> |
|
73 |
-<tt>jarfile jarfile</tt><br> |
|
74 |
-</p> |
|
75 |
- |
|
76 |
-<p>You'll need to restart Privoxy for the changes to take effect.</p> |
|
77 |
- |
|
78 |
-<hr /> |
|
79 |
-<a id="using"></a> |
|
80 |
-<h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2> |
|
81 |
-<br /> |
|
82 |
- |
|
83 |
-<p>After installing Tor and Privoxy, you need to configure your |
|
84 |
-applications to use them. The first step is to set up web browsing.</p> |
|
85 |
- |
|
86 |
-<p>If you're using Firefox (we recommend it), check out our <a |
|
87 |
-href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
88 |
-a plugin that makes it easy to switch between using Tor and using a |
|
89 |
-direct connection.</p> |
|
90 |
- |
|
91 |
-<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
92 |
-at localhost port 8118. |
|
93 |
-(That's where Privoxy listens.) |
|
94 |
-In Mozilla, this is in Edit|Preferences|Advanced|Proxies. |
|
95 |
-In Opera 7.5x it's Tools|Preferences|Network|Proxy servers. |
|
96 |
-You should click the "use the same proxy server for all protocols" |
|
97 |
-button; but see <a |
|
98 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
99 |
-note</a> about Tor and ftp proxies. |
|
100 |
- |
|
101 |
-<p>Using privoxy is <strong>necessary</strong> because <a |
|
102 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
103 |
-leak your DNS requests when they use a SOCKS proxy directly</a>, which |
|
104 |
-is bad for your anonymity. Privoxy also removes certain dangerous |
|
105 |
-headers from your web requests, and blocks obnoxious ad sites like |
|
106 |
-Doubleclick.</p> |
|
107 |
- |
|
108 |
-<p>To Torify other applications that support HTTP proxies, just |
|
109 |
-point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
110 |
-directly (for instant messaging, Jabber, IRC, etc), you can point |
|
111 |
-your application directly at Tor (localhost port 9050), but see <a |
|
112 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
113 |
-FAQ entry</a> for why this may be dangerous. For applications |
|
114 |
-that support neither SOCKS nor HTTP, take a look at <a |
|
115 |
-href="http://tsocks.sourceforge.net/">tsocks</a> or <a |
|
116 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
117 |
-</p> |
|
118 |
- |
|
119 |
-<p>For information on how to Torify other applications, check out the |
|
120 |
-<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
121 |
-HOWTO</a>. |
|
122 |
-</p> |
|
123 |
- |
|
124 |
-<hr /> |
|
125 |
-<a id="verify"></a> |
|
126 |
-<h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2> |
|
127 |
-<br /> |
|
128 |
- |
|
129 |
-<p> |
|
130 |
-Next, you should try using your browser with Tor and make |
|
131 |
-sure that your IP address is being anonymized. Click on the <a |
|
132 |
-href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
133 |
-detector</a> and see whether it thinks you're using Tor or not. |
|
134 |
-(If that site is down, see <a |
|
135 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
136 |
-FAQ entry</a> for more suggestions on how to test your Tor.) |
|
137 |
-</p> |
|
138 |
- |
|
139 |
-<p>If you have a personal firewall that limits your computer's |
|
140 |
-ability to connect to itself (this includes something like SELinux on |
|
141 |
-Fedora Core 4), be sure to allow connections from |
|
142 |
-your local applications to Privoxy (local port 8118) and Tor (local port |
|
143 |
-9050). If |
|
144 |
-your firewall blocks outgoing connections, punch a hole so |
|
145 |
-it can connect to at least TCP ports 80 and 443, and then see <a |
|
146 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
147 |
-FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to |
|
148 |
-run correctly, create a file named booleans.local in the directory |
|
149 |
-/etc/selinux/targeted. Edit this file in your favorite text editor and |
|
150 |
-insert "allow_ypbind=1". Restart your machine for this change to take |
|
151 |
-effect. |
|
152 |
-</p> |
|
153 |
- |
|
154 |
-<p>If it's still not working, look at <a |
|
155 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
156 |
-FAQ entry</a> for hints.</p> |
|
157 |
- |
|
158 |
-<hr /> |
|
159 |
-<a id="server"></a> |
|
160 |
-<h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2> |
|
161 |
-<br /> |
|
162 |
- |
|
163 |
-<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
164 |
-people who run servers, the faster the Tor network will be. If you have |
|
165 |
-at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
166 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
167 |
-and convenient, including rate limiting for bandwidth, exit policies so |
|
168 |
-you can limit your exposure to abuse complaints, and support for dynamic |
|
169 |
-IP addresses.</p> |
|
170 |
- |
|
171 |
-<p>Having servers in many different places on the Internet is what |
|
172 |
-makes Tor users secure. <a |
|
173 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
174 |
-may also get stronger anonymity yourself</a>, |
|
175 |
-since remote sites can't know whether connections originated at your |
|
176 |
-computer or were relayed from others.</p> |
|
177 |
- |
|
178 |
-<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
179 |
-guide.</p> |
|
180 |
- |
|
181 |
-<hr /> |
|
182 |
- |
|
183 |
-<p>If you have suggestions for improving this document, please post |
|
184 |
-them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
185 |
-website category. Thanks!</p> |
|
186 |
- |
|
187 |
- </div><!-- #main --> |
|
188 |
-</div> |
|
189 |
- |
|
190 |
-#include <foot.wmi> |
|
191 |
- |
... | ... |
@@ -1,191 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor MS Windows Install Instructions" |
|
5 |
- |
|
6 |
-<div class="center"> |
|
7 |
- |
|
8 |
-<div class="main-column"> |
|
9 |
- |
|
10 |
-<h1>Running the <a href="<page index>">Tor</a> client on MS Windows</h1> |
|
11 |
-<br /> |
|
12 |
- |
|
13 |
-<p> |
|
14 |
-<b>Note that these are the installation instructions for running a Tor |
|
15 |
-client on MS Windows (98, 98SE, NT4, 2000, XP, Server). |
|
16 |
-If you want to relay traffic for others to help the network grow (please |
|
17 |
-do), read the <a href="<page tor-doc-server>">Configuring a server</a> |
|
18 |
-guide.</b> |
|
19 |
-</p> |
|
20 |
- |
|
21 |
-<hr /> |
|
22 |
-<a id="installing"></a> |
|
23 |
-<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
24 |
-<br /> |
|
25 |
- |
|
26 |
-<p> |
|
27 |
-The install for MS Windows bundles <a href="<page index>">Tor</a>, |
|
28 |
-<a href="http://www.freehaven.net/~edmanm/torcp/">TorCP</a> |
|
29 |
-(a Tor controller that lets you monitor and control Tor), and <a |
|
30 |
-href="http://www.privoxy.org">Privoxy</a> (a filtering web proxy) into |
|
31 |
-one package, with the three applications pre-configured to work together. |
|
32 |
-<a href="<page download>">Download either the stable or |
|
33 |
-the experimental version from the download page</a>. |
|
34 |
-</p> |
|
35 |
- |
|
36 |
-<p> |
|
37 |
-<b>If you want to configure yourself to be a Tor server via TorCP, |
|
38 |
-you will need the experimental version of the bundle.</b> |
|
39 |
-</p> |
|
40 |
- |
|
41 |
-<p>If the bundles don't work for you, you can download Tor by itself |
|
42 |
-from the <a href="<page download>">download page</a>, and then <a |
|
43 |
-href="<page tor-doc-unix>#privoxy">install |
|
44 |
-and configure Privoxy on your own</a>. |
|
45 |
-</p> |
|
46 |
- |
|
47 |
-<img alt="tor installer splash page" |
|
48 |
-src="http://tor.eff.org/img/screenshot-win32-installer-splash.png" /> |
|
49 |
- |
|
50 |
-<p>If you have previously installed Tor, TorCP, or Privoxy |
|
51 |
-you can deselect whichever components you do not need to install |
|
52 |
-in the dialog shown below. |
|
53 |
-</p> |
|
54 |
- |
|
55 |
-<img alt="select components to install" |
|
56 |
-src="http://tor.eff.org/img/screenshot-win32-installer-components.png" /> |
|
57 |
- |
|
58 |
-<p>After you have completed the installer, the components |
|
59 |
-you selected will automatically be started for you. |
|
60 |
-</p> |
|
61 |
- |
|
62 |
-<!-- |
|
63 |
-<p>Tor comes configured as a client by default. It uses a built-in |
|
64 |
-default configuration file, and most people won't need to change any of |
|
65 |
-the settings. Tor is now installed. |
|
66 |
-</p> |
|
67 |
---> |
|
68 |
- |
|
69 |
-<hr /> |
|
70 |
-<a id="using"></a> |
|
71 |
-<h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
|
72 |
-<br /> |
|
73 |
- |
|
74 |
-<p>After installing Tor and Privoxy, you need to configure your |
|
75 |
-applications to use them. The first step is to set up web browsing.</p> |
|
76 |
- |
|
77 |
-<p>If you're using Firefox (we recommend it), check out our <a |
|
78 |
-href="<page tor-switchproxy>">Tor SwitchProxy howto</a> to set up |
|
79 |
-a plugin that makes it easy to switch between using Tor and using a |
|
80 |
-direct connection.</p> |
|
81 |
- |
|
82 |
-<p>Otherwise, you need to manually configure your browser to HTTP proxy |
|
83 |
-at localhost port 8118. |
|
84 |
-(That's where Privoxy listens.) |
|
85 |
-In Mozilla, this is in Edit|Preferences|Advanced|Proxies. |
|
86 |
-In Opera 7.5x it's Tools|Preferences|Network|Proxy servers. |
|
87 |
-In IE, it's Tools|Internet Options|Connections|LAN Settings|Advanced. |
|
88 |
-You should click the "use the same proxy server for all protocols" |
|
89 |
-button; but see <a |
|
90 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this |
|
91 |
-note</a> about Tor and ftp proxies. |
|
92 |
-In IE, this looks something like:</p> |
|
93 |
- |
|
94 |
-<img alt="Proxy settings in IE" |
|
95 |
-src="http://tor.eff.org/img/screenshot-win32-ie-proxies.jpg" /> |
|
96 |
- |
|
97 |
-<p>Using Privoxy is <strong>necessary</strong> because <a |
|
98 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers |
|
99 |
-leak your DNS requests when they use a SOCKS proxy directly</a>, which |
|
100 |
-is bad for your anonymity. Privoxy also removes certain dangerous |
|
101 |
-headers from your web requests, and blocks obnoxious ad sites like |
|
102 |
-Doubleclick.</p> |
|
103 |
- |
|
104 |
-<p>To Torify other applications that support HTTP proxies, just |
|
105 |
-point them at Privoxy (that is, localhost port 8118). To use SOCKS |
|
106 |
-directly (for instant messaging, Jabber, IRC, etc), you can point |
|
107 |
-your application directly at Tor (localhost port 9050), but see <a |
|
108 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
109 |
-FAQ entry</a> for why this may be dangerous. For applications |
|
110 |
-that support neither SOCKS nor HTTP, take a look at <a |
|
111 |
-href="http://www.socks.permeo.com/Download/SocksCapDownload/index.asp">SocksCap</a> or |
|
112 |
-<a href="http://www.freecap.ru/eng/">FreeCap</a>. |
|
113 |
-(FreeCap is free software; SocksCap is proprietary.)</p> |
|
114 |
- |
|
115 |
-<p>For information on how to Torify other applications, check out the |
|
116 |
-<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify |
|
117 |
-HOWTO</a>. |
|
118 |
-</p> |
|
119 |
- |
|
120 |
-<hr /> |
|
121 |
-<a id="verify"></a> |
|
122 |
-<h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
123 |
-<br /> |
|
124 |
- |
|
125 |
-<p> |
|
126 |
-Check to see that Privoxy and TorCP are running and that TorCP has |
|
127 |
-successfully started Tor. Privoxy's icon is a green or blue circle with a "P" |
|
128 |
-in it, and TorCP uses a fat grey onion with a green checkmark in your |
|
129 |
-system notification area, as shown below: |
|
130 |
-</p> |
|
131 |
- |
|
132 |
-<img alt="TorCP Tray Icon" |
|
133 |
-src="http://tor.eff.org/img/screenshot-win32-torcp.png"> |
|
134 |
- |
|
135 |
-<p> |
|
136 |
-Next, you should try using your browser with Tor and make |
|
137 |
-sure that your IP address is being anonymized. Click on the <a |
|
138 |
-href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor |
|
139 |
-detector</a> and see whether it thinks you're using Tor or not. |
|
140 |
-(If that site is down, see <a |
|
141 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
142 |
-FAQ entry</a> for more suggestions on how to test your Tor.) |
|
143 |
-</p> |
|
144 |
- |
|
145 |
-<p>If you have a personal firewall that limits your computer's |
|
146 |
-ability to connect to itself, be sure to allow connections from |
|
147 |
-your local applications to local port 8118 and port 9050. If |
|
148 |
-your firewall blocks outgoing connections, punch a hole so |
|
149 |
-it can connect to at least TCP ports 80 and 443, and then see <a |
|
150 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
151 |
-FAQ entry</a>. |
|
152 |
-</p> |
|
153 |
- |
|
154 |
-<p>If it's still not working, look at <a |
|
155 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
156 |
-FAQ entry</a> for hints.</p> |
|
157 |
- |
|
158 |
-<hr /> |
|
159 |
-<a id="server"></a> |
|
160 |
-<h2><a class="anchor" href="#server">Step Four: Configure it as a server</a></h2> |
|
161 |
-<br /> |
|
162 |
- |
|
163 |
-<p>The Tor network relies on volunteers to donate bandwidth. The more |
|
164 |
-people who run servers, the faster the Tor network will be. If you have |
|
165 |
-at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
166 |
-Tor to be a server too. We have many features that make Tor servers easy |
|
167 |
-and convenient, including rate limiting for bandwidth, exit policies so |
|
168 |
-you can limit your exposure to abuse complaints, and support for dynamic |
|
169 |
-IP addresses.</p> |
|
170 |
- |
|
171 |
-<p>Having servers in many different places on the Internet is what |
|
172 |
-makes Tor users secure. <a |
|
173 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You |
|
174 |
-may also get stronger anonymity yourself</a>, |
|
175 |
-since remote sites can't know whether connections originated at your |
|
176 |
-computer or were relayed from others.</p> |
|
177 |
- |
|
178 |
-<p>Read more at our <a href="<page tor-doc-server>">Configuring a server</a> |
|
179 |
-guide.</p> |
|
180 |
- |
|
181 |
-<hr /> |
|
182 |
- |
|
183 |
-<p>If you have suggestions for improving this document, please post |
|
184 |
-them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the |
|
185 |
-website category. Thanks!</p> |
|
186 |
- |
|
187 |
- </div><!-- #main --> |
|
188 |
-</div> |
|
189 |
- |
|
190 |
-#include <foot.wmi> |
|
191 |
- |
... | ... |
@@ -1,158 +0,0 @@ |
1 |
-## translation metadata |
|
2 |
-# Revision: $Revision$ |
|
3 |
- |
|
4 |
-#include "head.wmi" TITLE="Tor SwitchProxy Install Instructions" |
|
5 |
- |
|
6 |
-<div class="center"> |
|
7 |
- |
|
8 |
-<div class="main-column"> |
|
9 |
- |
|
10 |
-<h1>Installing SwitchProxy for <a href="<page index>">Tor</a></h1> |
|
11 |
-<hr /> |
|
12 |
- |
|
13 |
-<p> |
|
14 |
-SwitchProxy is a Firefox plugin that makes it easy for you to switch |
|
15 |
-between using a proxy and connecting to websites directly.</p> |
|
16 |
- |
|
17 |
-<p>In this howto, you'll set up SwitchProxy to let you change |
|
18 |
-between using Tor and a direct connection. We assume you already |
|
19 |
-have Firefox installed and working.</p> |
|
20 |
- |
|
21 |
-<p>The screenshots here are oriented towards Windows users, but |
|
22 |
-SwitchProxy works anywhere Firefox works. Hopefully everybody else can |
|
23 |
-follow along just fine.</p> |
|
24 |
- |
|
25 |
-<hr /> |
|
26 |
-<a id="zero"></a> |
|
27 |
-<h2><a class="anchor" href="#zero">Step Zero: Download and Install Tor and Privoxy</a></h2> |
|
28 |
-<br /> |
|
29 |
- |
|
30 |
-<p>Before you start, you need to make sure 1) Tor is up and running, |
|
31 |
-2) Privoxy is up and running, and 3) Privoxy is configured to point |
|
32 |
-to Tor.</p> |
|
33 |
- |
|
34 |
-<p>Windows users need to do <a |
|
35 |
-href="<page tor-doc-win32>#installing">step one</a> |
|
36 |
-of the Windows Tor installation howto, and Mac OS X users need to do <a |
|
37 |
-href="<page tor-doc-osx>#installing">step one</a> |
|
38 |
-of OS X Tor installation howto, since our Win32 and OS X packages include |
|
39 |
-Privoxy and configure it already. Linux/BSD/Unix users should do <a |
|
40 |
-href="<page tor-doc-unix>#installing">step one</a> |
|
41 |
-and <a href="<page tor-doc-unix>#privoxy">step |
|
42 |
-two</a> of the Unix Tor installation howto. |
|
43 |
-</p> |
|
44 |
- |
|
45 |
-<hr /> |
|
46 |
-<a id="one"></a> |
|
47 |
-<h2><a class="anchor" href="#one">Step One: Download and Install SwitchProxy</a></h2> |
|
48 |
-<br /> |
|
49 |
- |
|
50 |
-<p>SwitchProxy is a Firefox plugin, so you need to go through |
|
51 |
-the process of installing a new plugin. First, go to the <a |
|
52 |
-href="https://addons.mozilla.org/extensions/moreinfo.php?application=firefox&id=125"> |
|
53 |
-SwitchProxy</a> web page. If you're using Firefox 1.5, you might need to |
|
54 |
-download SwitchProxy <a href="http://www.roundtwo.com/product/switchproxy">from |
|
55 |
-here</a> instead. |
|
56 |
-Turn on JavaScript for now and click "Install Now":</p> |
|
57 |
- |
|
58 |
-<img alt="switchproxy web page" |
|
59 |
-src="http://tor.eff.org/img/screenshot-switchproxy-webpage.jpg" /> |
|
60 |
- |
|
61 |
-<p>It will pop up a window asking for permission to install the plugin. |
|
62 |
-Click on the "Install Now" button: |
|
63 |
-</p> |
|
64 |
- |
|
65 |
-<img alt="firefox plugin warning" |
|
66 |
-src="http://tor.eff.org/img/screenshot-switchproxy-plugin-starting.jpg" /> |
|
67 |
- |
|
68 |
-<p>Once the installer is finished, you should close all of your Firefox |
|
69 |
-windows and restart Firefox.</p> |
|
70 |
- |
|
71 |
-<img alt="firefox plugin finished" |
|
72 |
-src="http://tor.eff.org/img/screenshot-switchproxy-plugin-finished.jpg" /> |
|
73 |
- |
|
74 |
-<hr /> |
|
75 |
-<a id="two"></a> |
|
76 |
-<h2><a class="anchor" href="#two">Step Two: Configure SwitchProxy</a></h2> |
|
77 |
-<br /> |
|
78 |
- |
|
79 |
-<p>When you restart Firefox, you'll notice there's a new toolbar |
|
80 |
-that lets you control your proxies. Now we're going to set up a proxy |
|
81 |
-configuration for Tor. Click on "Add" in the new Proxy toolbar:</p> |
|
82 |
- |
|
83 |
-<img alt="new toolbar" |
|
84 |
-src="http://tor.eff.org/img/screenshot-switchproxy-toolbar.jpg" /> |
|
85 |
- |
|
86 |
-<p>It will ask you to select a proxy type. Choose |
|
87 |
-"Standard." (There's also an "anonymous" proxy type that |
|
88 |
-uses an ad hoc set of anonymous proxies out there. You |
|
89 |
-don't want this, because those other "anonymous" proxies <a |
|
90 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ComparisonProxyAggregators">give |
|
91 |
-you much weaker security than Tor</a>.) |
|
92 |
-</p> |
|
93 |
- |
|
94 |
-<img alt="standard proxy" |
|
95 |
-src="http://tor.eff.org/img/screenshot-switchproxy-proxytype.jpg" /> |
|
96 |
- |
|
97 |
-<p>Now it will show you the standard proxy config window for Firefox. |
|
98 |
-Give this configuration a proxy label of "tor". Then fill in "localhost" |
|
99 |
-and "8118" for all four entries, as shown here. (Even |
|
100 |
-though Privoxy doesn't support FTP and Gopher, <a |
|
101 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">you |
|
102 |
-should set them up anyway</a>.) Then click "OK":</p> |
|
103 |
- |
|
104 |
-<img alt="proxy config" |
|
105 |
-src="http://tor.eff.org/img/screenshot-switchproxy-proxyconfig.jpg" /> |
|
106 |
- |
|
107 |
-<p>Now you've created the "tor" proxy label, but you're not using it yet. |
|
108 |
-Click on the pull-down list and select tor, as shown here:</p> |
|
109 |
- |
|
110 |
-<img alt="switch to tor" |
|
111 |
-src="http://tor.eff.org/img/screenshot-switchproxy-switch.jpg" /> |
|
112 |
- |
|
113 |
-<p>Almost done. Click "Apply" to make your change take effect:</p> |
|
114 |
- |
|
115 |
-<img alt="apply" |
|
116 |
-src="http://tor.eff.org/img/screenshot-switchproxy-apply.jpg" /> |
|
117 |
- |
|
118 |
-<p>Done! Firefox will reload your current page. In |
|
119 |
-this example screenshot, it reloaded the page and <a |
|
120 |
-href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#GoogleLanguage">happened |
|
121 |
-to get a German exit node</a>:</p> |
|
122 |
- |
|
123 |
-<img alt="german google" |
|
124 |
-src="http://tor.eff.org/img/screenshot-switchproxy-german.jpg" /> |
|
125 |
- |
|
126 |
-<hr /> |
|
127 |
-<a id="three"></a> |
|
128 |
-<h2><a class="anchor" href="#three">Step Step Three: Check if it works</a></h2> |
|
129 |
-<br /> |
|
130 |
- |
|
131 |
-<p>Now Firefox is using Privoxy as an HTTP proxy, Privoxy is using Tor as |
|
132 |
-a socks4a proxy, and Tor is making your connections to the Internet.</p> |
|
133 |
- |
|
134 |
-<p>In the above example, it was clear that it worked because the web |
|
135 |
-page showed up in a different language. In other cases, though, |
|
136 |
-you'll want to verify that your setup is working. Do |
|
137 |
-<a href="<page tor-doc-win32>#verify">step three</a> |
|
138 |
-of the Windows Tor installation howto, or |
|
139 |
-<a href="<page tor-doc-osx>#verify">step three</a> |
|
140 |
-of the OS X Tor installation howto.</p> |
|
141 |
- |
|
142 |
-<p>You should be aware of one anonymity gotcha: when you switch from |
|
143 |
-using Tor to a direct connection (or vice versa), by default the page |
|
144 |
-that's currently active will be reloaded through the new proxy setting. |
|
145 |
-So make sure you're on a page that isn't sensitive, before switching. |
|
146 |
-(You can also change this behavior in SwitchProxy's "Options | |
|
147 |
-Preferences" menu.)</p> |
|
148 |
- |
|
149 |
-<hr /> |
|
150 |
- |
|
151 |
-<p>If you have suggestions for improving this document, please <a |
|
152 |
-href="/contact">send them to us</a>. Thanks!</p> |
|
153 |
- |
|
154 |
- </div><!-- #main --> |
|
155 |
-</div> |
|
156 |
- |
|
157 |
-#include <foot.wmi> |
|
158 |
- |
|
159 | 0 |