... | ... |
@@ -2,15 +2,15 @@ |
2 | 2 |
# Revision: $Revision$ |
3 | 3 |
# Translation-Priority: 3-low |
4 | 4 |
|
5 |
-#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8" |
|
5 |
+#include "head.wmi" TITLE="Tor: Linux Install Instructions" CHARSET="UTF-8" |
|
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 | 8 |
<a href="<page index>">Home » </a> |
9 | 9 |
<a href="<page docs/documentation>">Documentation » </a> |
10 |
- <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a> |
|
10 |
+ <a href="<page docs/tor-doc-unix>">Linux Client</a> |
|
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 |
- <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
|
13 |
+ <h1>Running the <a href="<page index>">Tor</a> client on Linux</h1> |
|
14 | 14 |
<br> |
15 | 15 |
|
16 | 16 |
<h2>Note that these are the installation instructions for running a |
Thanks cypherpunks for the patch!
... | ... |
@@ -30,8 +30,6 @@ |
30 | 30 |
Red Hat, Gentoo, etc there too. If you're |
31 | 31 |
using Ubuntu, don't use the default packages: use <a |
32 | 32 |
href="<page docs/debian>#ubuntu">our deb repository</a> instead. |
33 |
- Similarly, CentOS / Fedora users should use <a href="<page |
|
34 |
- docs/rpms>">our rpm repository</a> instead. |
|
35 | 33 |
</p> |
36 | 34 |
|
37 | 35 |
<p>If you're building from source, first install <a |
... | ... |
@@ -61,7 +61,7 @@ |
61 | 61 |
readily configured Tor and a browser patched for better anonymity. |
62 | 62 |
To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you |
63 | 63 |
can point your application directly at Tor (localhost |
64 |
- port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq#TBBSocksPort">this FAQ |
|
64 |
+ port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq>#TBBSocksPort">this FAQ |
|
65 | 65 |
entry</a> for why this may be dangerous. For applications |
66 | 66 |
that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
67 | 67 |
or <a href="http://www.dest-unreach.org/socat/">socat</a>. |
... | ... |
@@ -56,9 +56,12 @@ |
56 | 56 |
<br> |
57 | 57 |
|
58 | 58 |
<p> |
59 |
- If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc), |
|
60 |
- you can point your application directly at Tor (localhost |
|
61 |
- port 9050), but see <a href="<page docs/faq#TBBSocksPort">this FAQ |
|
59 |
+ If you want to use Tor for anonymous web browsing, please use <a |
|
60 |
+ href="<page projects/torbrowser>">Tor Browser</a>. It comes with |
|
61 |
+ readily configured Tor and a browser patched for better anonymity. |
|
62 |
+ To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you |
|
63 |
+ can point your application directly at Tor (localhost |
|
64 |
+ port 9050, or port 9150 for Tor Browser), but see <a href="<page docs/faq#TBBSocksPort">this FAQ |
|
62 | 65 |
entry</a> for why this may be dangerous. For applications |
63 | 66 |
that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
64 | 67 |
or <a href="http://www.dest-unreach.org/socat/">socat</a>. |
... | ... |
@@ -58,7 +58,7 @@ |
58 | 58 |
<p> |
59 | 59 |
If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc), |
60 | 60 |
you can point your application directly at Tor (localhost |
61 |
- port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ |
|
61 |
+ port 9050), but see <a href="<page docs/faq#TBBSocksPort">this FAQ |
|
62 | 62 |
entry</a> for why this may be dangerous. For applications |
63 | 63 |
that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
64 | 64 |
or <a href="http://www.dest-unreach.org/socat/">socat</a>. |
... | ... |
@@ -27,7 +27,7 @@ |
27 | 27 |
<p> |
28 | 28 |
The latest release of Tor can be found on the <a |
29 | 29 |
href="<page download/download>">download</a> page. We have packages for Debian, |
30 |
- Red Hat, Gentoo, *BSD, etc there too. If you're |
|
30 |
+ Red Hat, Gentoo, etc there too. If you're |
|
31 | 31 |
using Ubuntu, don't use the default packages: use <a |
32 | 32 |
href="<page docs/debian>#ubuntu">our deb repository</a> instead. |
33 | 33 |
Similarly, CentOS / Fedora users should use <a href="<page |
... | ... |
@@ -91,23 +91,9 @@ |
91 | 91 |
<h2><a class="anchor" href="#relay">Step Three: Configure it as a relay</a></h2> |
92 | 92 |
<br> |
93 | 93 |
|
94 |
- <p>The Tor network relies on volunteers to donate bandwidth. The more |
|
95 |
- people who run relays, the faster the Tor network will be. If you have |
|
96 |
- at least 50 KiloBytes/s each way, please help out Tor by configuring your |
|
97 |
- Tor to be a relay too. We have many features that make Tor relays easy |
|
98 |
- and convenient, including rate limiting for bandwidth, exit policies so |
|
99 |
- you can limit your exposure to abuse complaints, and support for dynamic |
|
100 |
- IP addresses.</p> |
|
101 |
- |
|
102 |
- <p>Having relays in many different places on |
|
103 |
- the Internet is what makes Tor users secure. <a |
|
104 |
- href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">You may also |
|
105 |
- get stronger anonymity yourself</a>, since remote sites can't know |
|
106 |
- whether connections originated at your computer or were relayed |
|
107 |
- from others.</p> |
|
108 |
- |
|
109 |
- <p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
|
110 |
- guide.</p> |
|
94 |
+ <p>The Tor network relies on volunteers to donate bandwidth. If you |
|
95 |
+ want to help <strong>make the Tor network faster</strong>, please |
|
96 |
+ consider <a href="<page docs/tor-doc-relay>">running a relay</a>.</p> |
|
111 | 97 |
|
112 | 98 |
<hr> |
113 | 99 |
|
... | ... |
@@ -14,8 +14,8 @@ |
14 | 14 |
<br> |
15 | 15 |
|
16 | 16 |
<h2>Note that these are the installation instructions for running a |
17 |
- Tor client. The easiest way to do this is to simply download the <a |
|
18 |
- href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are |
|
17 |
+ Tor client. The easiest way to do this is to simply download <a |
|
18 |
+ href="<page projects/torbrowser>">Tor Browser</a> and you are |
|
19 | 19 |
done. |
20 | 20 |
</h2> |
21 | 21 |
|
... | ... |
@@ -56,7 +56,7 @@ |
56 | 56 |
<br> |
57 | 57 |
|
58 | 58 |
<p> |
59 |
- If you want to use Tor for anonymous web browsing, please use the <a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc), |
|
59 |
+ If you want to use Tor for anonymous web browsing, please use <a href="<page projects/torbrowser>">Tor Browser</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc), |
|
60 | 60 |
you can point your application directly at Tor (localhost |
61 | 61 |
port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ |
62 | 62 |
entry</a> for why this may be dangerous. For applications |
... | ... |
@@ -30,7 +30,7 @@ |
30 | 30 |
Red Hat, Gentoo, *BSD, etc there too. If you're |
31 | 31 |
using Ubuntu, don't use the default packages: use <a |
32 | 32 |
href="<page docs/debian>#ubuntu">our deb repository</a> instead. |
33 |
- Similarly, CentOS / Fedora / OpenSUSE users should use <a href="<page |
|
33 |
+ Similarly, CentOS / Fedora users should use <a href="<page |
|
34 | 34 |
docs/rpms>">our rpm repository</a> instead. |
35 | 35 |
</p> |
36 | 36 |
|
... | ... |
@@ -93,7 +93,7 @@ |
93 | 93 |
|
94 | 94 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
95 | 95 |
people who run relays, the faster the Tor network will be. If you have |
96 |
- at least 20 KiloBytes/s each way, please help out Tor by configuring your |
|
96 |
+ at least 50 KiloBytes/s each way, please help out Tor by configuring your |
|
97 | 97 |
Tor to be a relay too. We have many features that make Tor relays easy |
98 | 98 |
and convenient, including rate limiting for bandwidth, exit policies so |
99 | 99 |
you can limit your exposure to abuse complaints, and support for dynamic |
... | ... |
@@ -55,62 +55,26 @@ |
55 | 55 |
<h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
56 | 56 |
<br> |
57 | 57 |
|
58 |
- <p>After installing Tor, you need to configure your applications to |
|
59 |
- use them. The first step is to set up web browsing.</p> |
|
60 |
- |
|
61 |
- <p>You should use Tor with Firefox and Torbutton, for best safety. |
|
62 |
- Simply install the <a |
|
63 |
- href="<page torbutton/index>">Torbutton |
|
64 |
- plugin</a>, restart your Firefox, and you're all set: |
|
65 |
- </p> |
|
66 |
- |
|
67 |
- <img alt="Torbutton plugin for Firefox" |
|
68 |
- src="$(IMGROOT)/screenshot-torbutton.png" |
|
69 |
- > |
|
70 |
- |
|
71 |
- <br> |
|
72 |
- |
|
73 | 58 |
<p> |
74 |
- If you plan to run Firefox on a different computer than Tor, see the <a |
|
75 |
- href="<wikifaq>#SocksListenAddress"> |
|
76 |
- FAQ |
|
77 |
- entry for running Tor on a different computer</a>. |
|
78 |
- </p> |
|
79 |
- |
|
80 |
- <p>To Torify other applications that support SOCKS proxies, just |
|
81 |
- point them at Tor's SOCKS port (127.0.0.1 port 9050). See <a |
|
82 |
- href="<wikifaq>#SOCKSAndDNS">this FAQ entry</a> for why this may be |
|
83 |
- dangerous. For applications that support neither SOCKS nor HTTP, take |
|
84 |
- a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
|
85 |
- or <a href="<wiki>doc/TorifyHOWTO#socat">socat</a>. |
|
59 |
+ If you want to use Tor for anonymous web browsing, please use the <a href="<page projects/torbrowser>">Tor Browser Bundle</a>. It comes with readily configured Tor and a browser patched for better anonymity. To use SOCKS directly (for instant messaging, Jabber, IRC, etc), |
|
60 |
+ you can point your application directly at Tor (localhost |
|
61 |
+ port 9050), but see <a href="<wikifaq>#SOCKSAndDNS">this FAQ |
|
62 |
+ entry</a> for why this may be dangerous. For applications |
|
63 |
+ that support neither SOCKS nor HTTP, take a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
|
64 |
+ or <a href="http://www.dest-unreach.org/socat/">socat</a>. |
|
86 | 65 |
</p> |
87 | 66 |
|
88 | 67 |
<p>For information on how to Torify other applications, check out the |
89 | 68 |
<a href="<wiki>doc/TorifyHOWTO">Torify HOWTO</a>. |
90 | 69 |
</p> |
91 | 70 |
|
92 |
- <hr> |
|
93 |
- <a id="verify"></a> |
|
94 |
- <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
95 |
- <br> |
|
96 |
- |
|
97 |
- <p> |
|
98 |
- Next, you should try using your browser with Tor and make |
|
99 |
- sure that your IP address is being anonymized. Click on <a |
|
100 |
- href="https://check.torproject.org/">the Tor detector</a> |
|
101 |
- and see whether it thinks you're using Tor or not. |
|
102 |
- (If that site is down, see <a |
|
103 |
- href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more |
|
104 |
- suggestions on how to test your Tor.) |
|
105 |
- </p> |
|
106 |
- |
|
107 | 71 |
<p>If you have a personal firewall that limits your computer's ability |
108 | 72 |
to connect to itself (this includes something like SELinux on Fedora |
109 | 73 |
Core 4), be sure to allow connections from your local applications to |
110 | 74 |
Tor (local port 9050). If your firewall blocks outgoing connections, |
111 | 75 |
punch a hole so it can connect to at least TCP ports 80 and 443, and |
112 | 76 |
then see <a href="<wikifaq>#FirewalledClient">this FAQ entry</a>. |
113 |
- If your SELinux config is not allowing tor or privoxy to run |
|
77 |
+ If your SELinux config is not allowing tor to run |
|
114 | 78 |
correctly, create a file named booleans.local in the directory |
115 | 79 |
/etc/selinux/targeted. Edit this file in your favorite text editor |
116 | 80 |
and insert "allow_ypbind=1". Restart your machine for this change |
... | ... |
@@ -124,7 +88,7 @@ |
124 | 88 |
<hr> |
125 | 89 |
<a id="server"></a> |
126 | 90 |
<a id="relay"></a> |
127 |
- <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2> |
|
91 |
+ <h2><a class="anchor" href="#relay">Step Three: Configure it as a relay</a></h2> |
|
128 | 92 |
<br> |
129 | 93 |
|
130 | 94 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
... | ... |
@@ -135,10 +135,11 @@ |
135 | 135 |
you can limit your exposure to abuse complaints, and support for dynamic |
136 | 136 |
IP addresses.</p> |
137 | 137 |
|
138 |
- <p>Having relays in many different places on the Internet is what |
|
139 |
- makes Tor users secure. <a href="<wikifaq>#RelayAnonymity">You may |
|
140 |
- also get stronger anonymity yourself</a>, since remote sites can't |
|
141 |
- know whether connections originated at your computer or were relayed |
|
138 |
+ <p>Having relays in many different places on |
|
139 |
+ the Internet is what makes Tor users secure. <a |
|
140 |
+ href="<wikifaq>#DoIgetbetteranonymityifIrunarelay">You may also |
|
141 |
+ get stronger anonymity yourself</a>, since remote sites can't know |
|
142 |
+ whether connections originated at your computer or were relayed |
|
142 | 143 |
from others.</p> |
143 | 144 |
|
144 | 145 |
<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
... | ... |
@@ -13,12 +13,11 @@ |
13 | 13 |
<h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
14 | 14 |
<br> |
15 | 15 |
|
16 |
- <p> |
|
17 |
- <b>Note that these are the installation instructions for running a |
|
16 |
+ <h2>Note that these are the installation instructions for running a |
|
18 | 17 |
Tor client. The easiest way to do this is to simply download the <a |
19 | 18 |
href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are |
20 |
- done. </b> |
|
21 |
- </p> |
|
19 |
+ done. |
|
20 |
+ </h2> |
|
22 | 21 |
|
23 | 22 |
<hr> |
24 | 23 |
<a id="installing"></a> |
... | ... |
@@ -99,9 +99,8 @@ |
99 | 99 |
Next, you should try using your browser with Tor and make |
100 | 100 |
sure that your IP address is being anonymized. Click on <a |
101 | 101 |
href="https://check.torproject.org/">the Tor detector</a> |
102 |
- and see whether it thinks you're using Tor or not. #<a |
|
103 |
- href="http://ipchicken.com/">this site</a> #to see what IP |
|
104 |
- address it thinks you're using. (If that site is down, see <a |
|
102 |
+ and see whether it thinks you're using Tor or not. |
|
103 |
+ (If that site is down, see <a |
|
105 | 104 |
href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more |
106 | 105 |
suggestions on how to test your Tor.) |
107 | 106 |
</p> |
... | ... |
@@ -16,7 +16,7 @@ |
16 | 16 |
<p> |
17 | 17 |
<b>Note that these are the installation instructions for running a |
18 | 18 |
Tor client. The easiest way to do this is to simply download the <a |
19 |
- href="<page projects/torbrowser>"Tor Browser Bundle</a> and you are |
|
19 |
+ href="<page projects/torbrowser>">Tor Browser Bundle</a> and you are |
|
20 | 20 |
done. </b> |
21 | 21 |
</p> |
22 | 22 |
|
... | ... |
@@ -14,10 +14,10 @@ |
14 | 14 |
<br> |
15 | 15 |
|
16 | 16 |
<p> |
17 |
- <b>Note that these are the installation instructions for running a Tor |
|
18 |
- client. If you want to relay traffic for others to help the network grow |
|
19 |
- (please do), read the <a |
|
20 |
- href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b> |
|
17 |
+ <b>Note that these are the installation instructions for running a |
|
18 |
+ Tor client. The easiest way to do this is to simply download the <a |
|
19 |
+ href="<page projects/torbrowser>"Tor Browser Bundle</a> and you are |
|
20 |
+ done. </b> |
|
21 | 21 |
</p> |
22 | 22 |
|
23 | 23 |
<hr> |
... | ... |
@@ -78,20 +78,16 @@ |
78 | 78 |
entry for running Tor on a different computer</a>. |
79 | 79 |
</p> |
80 | 80 |
|
81 |
- <p>To Torify other applications that support HTTP proxies, just |
|
82 |
- point them at Polipo (that is, localhost port 8118). To use SOCKS |
|
83 |
- directly (for instant messaging, Jabber, IRC, etc), you can point |
|
84 |
- your application directly at Tor (localhost port 9050), but see <a |
|
85 |
- href="<wikifaq>#SOCKSAndDNS">this |
|
86 |
- FAQ entry</a> for why this may be dangerous. For applications |
|
87 |
- that support neither SOCKS nor HTTP, take a look at <a |
|
88 |
- href="https://code.google.com/p/torsocks/">torsocks</a> or <a |
|
89 |
- href="<wiki>doc/TorifyHOWTO#socat">socat</a>. |
|
81 |
+ <p>To Torify other applications that support SOCKS proxies, just |
|
82 |
+ point them at Tor's SOCKS port (127.0.0.1 port 9050). See <a |
|
83 |
+ href="<wikifaq>#SOCKSAndDNS">this FAQ entry</a> for why this may be |
|
84 |
+ dangerous. For applications that support neither SOCKS nor HTTP, take |
|
85 |
+ a look at <a href="https://code.google.com/p/torsocks/">torsocks</a> |
|
86 |
+ or <a href="<wiki>doc/TorifyHOWTO#socat">socat</a>. |
|
90 | 87 |
</p> |
91 | 88 |
|
92 | 89 |
<p>For information on how to Torify other applications, check out the |
93 |
- <a href="<wiki>doc/TorifyHOWTO">Torify |
|
94 |
- HOWTO</a>. |
|
90 |
+ <a href="<wiki>doc/TorifyHOWTO">Torify HOWTO</a>. |
|
95 | 91 |
</p> |
96 | 92 |
|
97 | 93 |
<hr> |
... | ... |
@@ -101,30 +97,26 @@ |
101 | 97 |
|
102 | 98 |
<p> |
103 | 99 |
Next, you should try using your browser with Tor and make |
104 |
- sure that your IP address is being anonymized. Click on |
|
105 |
- <a href="https://check.torproject.org/">the |
|
106 |
- Tor detector</a> |
|
107 |
- and see whether it thinks you're using Tor or not. |
|
108 |
- #<a href="http://ipchicken.com/">this site</a> |
|
109 |
- #to see what IP address it thinks you're using. |
|
110 |
- (If that site is down, see <a |
|
111 |
- href="<wikifaq>#IsMyConnectionPrivate">this |
|
112 |
- FAQ entry</a> for more suggestions on how to test your Tor.) |
|
100 |
+ sure that your IP address is being anonymized. Click on <a |
|
101 |
+ href="https://check.torproject.org/">the Tor detector</a> |
|
102 |
+ and see whether it thinks you're using Tor or not. #<a |
|
103 |
+ href="http://ipchicken.com/">this site</a> #to see what IP |
|
104 |
+ address it thinks you're using. (If that site is down, see <a |
|
105 |
+ href="<wikifaq>#IsMyConnectionPrivate">this FAQ entry</a> for more |
|
106 |
+ suggestions on how to test your Tor.) |
|
113 | 107 |
</p> |
114 | 108 |
|
115 |
- <p>If you have a personal firewall that limits your computer's |
|
116 |
- ability to connect to itself (this includes something like SELinux on |
|
117 |
- Fedora Core 4), be sure to allow connections from |
|
118 |
- your local applications to Polipo (local port 8118) and Tor (local port |
|
119 |
- 9050). If |
|
120 |
- your firewall blocks outgoing connections, punch a hole so |
|
121 |
- it can connect to at least TCP ports 80 and 443, and then see <a |
|
122 |
- href="<wikifaq>#FirewalledClient">this |
|
123 |
- FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to |
|
124 |
- run correctly, create a file named booleans.local in the directory |
|
125 |
- /etc/selinux/targeted. Edit this file in your favorite text editor and |
|
126 |
- insert "allow_ypbind=1". Restart your machine for this change to take |
|
127 |
- effect. |
|
109 |
+ <p>If you have a personal firewall that limits your computer's ability |
|
110 |
+ to connect to itself (this includes something like SELinux on Fedora |
|
111 |
+ Core 4), be sure to allow connections from your local applications to |
|
112 |
+ Tor (local port 9050). If your firewall blocks outgoing connections, |
|
113 |
+ punch a hole so it can connect to at least TCP ports 80 and 443, and |
|
114 |
+ then see <a href="<wikifaq>#FirewalledClient">this FAQ entry</a>. |
|
115 |
+ If your SELinux config is not allowing tor or privoxy to run |
|
116 |
+ correctly, create a file named booleans.local in the directory |
|
117 |
+ /etc/selinux/targeted. Edit this file in your favorite text editor |
|
118 |
+ and insert "allow_ypbind=1". Restart your machine for this change |
|
119 |
+ to take effect. |
|
128 | 120 |
</p> |
129 | 121 |
|
130 | 122 |
<p>If it's still not working, look at <a |
... | ... |
@@ -139,19 +131,18 @@ |
139 | 131 |
|
140 | 132 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
141 | 133 |
people who run relays, the faster the Tor network will be. If you have |
142 |
- at least 20 kilobytes/s each way, please help out Tor by configuring your |
|
134 |
+ at least 20 KiloBytes/s each way, please help out Tor by configuring your |
|
143 | 135 |
Tor to be a relay too. We have many features that make Tor relays easy |
144 | 136 |
and convenient, including rate limiting for bandwidth, exit policies so |
145 | 137 |
you can limit your exposure to abuse complaints, and support for dynamic |
146 | 138 |
IP addresses.</p> |
147 | 139 |
|
148 | 140 |
<p>Having relays in many different places on the Internet is what |
149 |
- makes Tor users secure. <a |
|
150 |
- href="<wikifaq>#RelayAnonymity">You |
|
151 |
- may also get stronger anonymity yourself</a>, |
|
152 |
- since remote sites can't know whether connections originated at your |
|
153 |
- computer or were relayed from others.</p> |
|
154 |
- |
|
141 |
+ makes Tor users secure. <a href="<wikifaq>#RelayAnonymity">You may |
|
142 |
+ also get stronger anonymity yourself</a>, since remote sites can't |
|
143 |
+ know whether connections originated at your computer or were relayed |
|
144 |
+ from others.</p> |
|
145 |
+ |
|
155 | 146 |
<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
156 | 147 |
guide.</p> |
157 | 148 |
|
... | ... |
@@ -51,48 +51,13 @@ |
51 | 51 |
the settings. Tor is now installed. |
52 | 52 |
</p> |
53 | 53 |
|
54 |
- <hr> |
|
55 |
- <a id="privoxy"></a> |
|
56 |
- <a id="polipo"></a> |
|
57 |
- <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2> |
|
58 |
- <br> |
|
59 |
- |
|
60 |
- <p>After installing Tor, you need to configure your applications to use it. |
|
61 |
- </p> |
|
62 |
- |
|
63 |
- <p> |
|
64 |
- The first step is to set up web browsing. Start by installing <a |
|
65 |
- href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from |
|
66 |
- your favorite repository. Polipo is a caching web proxy that does http |
|
67 |
- pipelining well, so it's well-suited for Tor's latencies. Make sure |
|
68 |
- to get at least Polipo 1.0.4, since earlier versions lack the SOCKS support |
|
69 |
- required to use Polipo with Tor. You should uninstall privoxy at this |
|
70 |
- point (e.g. apt-get remove privoxy or yum remove privoxy), so they don't |
|
71 |
- conflict. |
|
72 |
- </p> |
|
73 |
- |
|
74 |
- <p>Once you've installed Polipo (either from package or from |
|
75 |
- source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a |
|
76 |
- href="<tbbrepo>/build-scripts/config/polipo.conf">Polipo |
|
77 |
- configuration for Tor</a> and put it in place of your current polipo |
|
78 |
- config file (e.g. /etc/polipo/config or ~/.polipo). |
|
79 |
- You'll need to restart Polipo for the changes to take effect. For |
|
80 |
- example:<br> |
|
81 |
- <tt>/etc/init.d/polipo restart</tt> |
|
82 |
- </p> |
|
83 |
- |
|
84 |
- <p>If you prefer, you can instead use Privoxy with <a |
|
85 |
- href="<wiki>doc/PrivoxyConfig">this |
|
86 |
- sample Privoxy configuration</a>. But since the config files both use |
|
87 |
- port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
|
88 |
- |
|
89 | 54 |
<hr> |
90 | 55 |
<a id="using"></a> |
91 |
- <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2> |
|
56 |
+ <h2><a class="anchor" href="#using">Step Two: Configure your applications to use Tor</a></h2> |
|
92 | 57 |
<br> |
93 | 58 |
|
94 |
- <p>After installing Tor and Polipo, you need to configure your |
|
95 |
- applications to use them. The first step is to set up web browsing.</p> |
|
59 |
+ <p>After installing Tor, you need to configure your applications to |
|
60 |
+ use them. The first step is to set up web browsing.</p> |
|
96 | 61 |
|
97 | 62 |
<p>You should use Tor with Firefox and Torbutton, for best safety. |
98 | 63 |
Simply install the <a |
... | ... |
@@ -131,7 +96,7 @@ |
131 | 96 |
|
132 | 97 |
<hr> |
133 | 98 |
<a id="verify"></a> |
134 |
- <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2> |
|
99 |
+ <h2><a class="anchor" href="#verify">Step Three: Make sure it's working</a></h2> |
|
135 | 100 |
<br> |
136 | 101 |
|
137 | 102 |
<p> |
... | ... |
@@ -169,7 +134,7 @@ |
169 | 134 |
<hr> |
170 | 135 |
<a id="server"></a> |
171 | 136 |
<a id="relay"></a> |
172 |
- <h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2> |
|
137 |
+ <h2><a class="anchor" href="#relay">Step Four: Configure it as a relay</a></h2> |
|
173 | 138 |
<br> |
174 | 139 |
|
175 | 140 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
... | ... |
@@ -82,7 +82,7 @@ |
82 | 82 |
</p> |
83 | 83 |
|
84 | 84 |
<p>If you prefer, you can instead use Privoxy with <a |
85 |
- href="<wiki>TheOnionRouter/PrivoxyConfig">this |
|
85 |
+ href="<wiki>doc/PrivoxyConfig">this |
|
86 | 86 |
sample Privoxy configuration</a>. But since the config files both use |
87 | 87 |
port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
88 | 88 |
|
... | ... |
@@ -121,11 +121,11 @@ |
121 | 121 |
FAQ entry</a> for why this may be dangerous. For applications |
122 | 122 |
that support neither SOCKS nor HTTP, take a look at <a |
123 | 123 |
href="https://code.google.com/p/torsocks/">torsocks</a> or <a |
124 |
- href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
124 |
+ href="<wiki>doc/TorifyHOWTO#socat">socat</a>. |
|
125 | 125 |
</p> |
126 | 126 |
|
127 | 127 |
<p>For information on how to Torify other applications, check out the |
128 |
- <a href="<wiki>TheOnionRouter/TorifyHOWTO">Torify |
|
128 |
+ <a href="<wiki>doc/TorifyHOWTO">Torify |
|
129 | 129 |
HOWTO</a>. |
130 | 130 |
</p> |
131 | 131 |
|
... | ... |
@@ -96,7 +96,7 @@ |
96 | 96 |
|
97 | 97 |
<p>You should use Tor with Firefox and Torbutton, for best safety. |
98 | 98 |
Simply install the <a |
99 |
- href="https://www.torproject.org/torbutton/">Torbutton |
|
99 |
+ href="<page torbutton/index>">Torbutton |
|
100 | 100 |
plugin</a>, restart your Firefox, and you're all set: |
101 | 101 |
</p> |
102 | 102 |
|
... | ... |
@@ -96,7 +96,7 @@ |
96 | 96 |
|
97 | 97 |
<p>You should use Tor with Firefox and Torbutton, for best safety. |
98 | 98 |
Simply install the <a |
99 |
- href="https://addons.mozilla.org/firefox/2275/">Torbutton |
|
99 |
+ href="https://www.torproject.org/torbutton/">Torbutton |
|
100 | 100 |
plugin</a>, restart your Firefox, and you're all set: |
101 | 101 |
</p> |
102 | 102 |
|
... | ... |
@@ -31,6 +31,8 @@ |
31 | 31 |
Red Hat, Gentoo, *BSD, etc there too. If you're |
32 | 32 |
using Ubuntu, don't use the default packages: use <a |
33 | 33 |
href="<page docs/debian>#ubuntu">our deb repository</a> instead. |
34 |
+ Similarly, CentOS / Fedora / OpenSUSE users should use <a href="<page |
|
35 |
+ docs/rpms>">our rpm repository</a> instead. |
|
34 | 36 |
</p> |
35 | 37 |
|
36 | 38 |
<p>If you're building from source, first install <a |
... | ... |
@@ -118,7 +118,7 @@ |
118 | 118 |
href="<wikifaq>#SOCKSAndDNS">this |
119 | 119 |
FAQ entry</a> for why this may be dangerous. For applications |
120 | 120 |
that support neither SOCKS nor HTTP, take a look at <a |
121 |
- href="http://tsocks.sourceforge.net/">tsocks</a> or <a |
|
121 |
+ href="https://code.google.com/p/torsocks/">torsocks</a> or <a |
|
122 | 122 |
href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
123 | 123 |
</p> |
124 | 124 |
|
... | ... |
@@ -71,7 +71,7 @@ |
71 | 71 |
|
72 | 72 |
<p>Once you've installed Polipo (either from package or from |
73 | 73 |
source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a |
74 |
- href="https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/config/polipo.conf">Polipo |
|
74 |
+ href="<tbbrepo>/build-scripts/config/polipo.conf">Polipo |
|
75 | 75 |
configuration for Tor</a> and put it in place of your current polipo |
76 | 76 |
config file (e.g. /etc/polipo/config or ~/.polipo). |
77 | 77 |
You'll need to restart Polipo for the changes to take effect. For |
... | ... |
@@ -71,7 +71,7 @@ |
71 | 71 |
|
72 | 72 |
<p>Once you've installed Polipo (either from package or from |
73 | 73 |
source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a |
74 |
- href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">Polipo |
|
74 |
+ href="https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/config/polipo.conf">Polipo |
|
75 | 75 |
configuration for Tor</a> and put it in place of your current polipo |
76 | 76 |
config file (e.g. /etc/polipo/config or ~/.polipo). |
77 | 77 |
You'll need to restart Polipo for the changes to take effect. For |
... | ... |
@@ -11,7 +11,7 @@ |
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 | 13 |
<h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
14 |
- <br /> |
|
14 |
+ <br> |
|
15 | 15 |
|
16 | 16 |
<p> |
17 | 17 |
<b>Note that these are the installation instructions for running a Tor |
... | ... |
@@ -20,10 +20,10 @@ |
20 | 20 |
href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b> |
21 | 21 |
</p> |
22 | 22 |
|
23 |
- <hr /> |
|
23 |
+ <hr> |
|
24 | 24 |
<a id="installing"></a> |
25 | 25 |
<h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
26 |
- <br /> |
|
26 |
+ <br> |
|
27 | 27 |
|
28 | 28 |
<p> |
29 | 29 |
The latest release of Tor can be found on the <a |
... | ... |
@@ -36,9 +36,9 @@ |
36 | 36 |
<p>If you're building from source, first install <a |
37 | 37 |
href="http://www.monkey.org/~provos/libevent/">libevent</a>, and |
38 | 38 |
make sure you have openssl and zlib (including the -devel packages if |
39 |
- applicable). Then run:<br /> |
|
40 |
- <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br /> |
|
41 |
- <tt>./configure && make</tt><br /> |
|
39 |
+ applicable). Then run:<br> |
|
40 |
+ <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br> |
|
41 |
+ <tt>./configure && make</tt><br> |
|
42 | 42 |
Now you can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt> |
43 | 43 |
(as root if necessary) to install it into /usr/local/, and then you can |
44 | 44 |
start it just by running <tt>tor</tt>. |
... | ... |
@@ -49,11 +49,11 @@ |
49 | 49 |
the settings. Tor is now installed. |
50 | 50 |
</p> |
51 | 51 |
|
52 |
- <hr /> |
|
52 |
+ <hr> |
|
53 | 53 |
<a id="privoxy"></a> |
54 | 54 |
<a id="polipo"></a> |
55 | 55 |
<h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2> |
56 |
- <br /> |
|
56 |
+ <br> |
|
57 | 57 |
|
58 | 58 |
<p>After installing Tor, you need to configure your applications to use it. |
59 | 59 |
</p> |
... | ... |
@@ -75,7 +75,7 @@ |
75 | 75 |
configuration for Tor</a> and put it in place of your current polipo |
76 | 76 |
config file (e.g. /etc/polipo/config or ~/.polipo). |
77 | 77 |
You'll need to restart Polipo for the changes to take effect. For |
78 |
- example:<br /> |
|
78 |
+ example:<br> |
|
79 | 79 |
<tt>/etc/init.d/polipo restart</tt> |
80 | 80 |
</p> |
81 | 81 |
|
... | ... |
@@ -84,10 +84,10 @@ |
84 | 84 |
sample Privoxy configuration</a>. But since the config files both use |
85 | 85 |
port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
86 | 86 |
|
87 |
- <hr /> |
|
87 |
+ <hr> |
|
88 | 88 |
<a id="using"></a> |
89 | 89 |
<h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2> |
90 |
- <br /> |
|
90 |
+ <br> |
|
91 | 91 |
|
92 | 92 |
<p>After installing Tor and Polipo, you need to configure your |
93 | 93 |
applications to use them. The first step is to set up web browsing.</p> |
... | ... |
@@ -102,7 +102,7 @@ |
102 | 102 |
src="$(IMGROOT)/screenshot-torbutton.png" |
103 | 103 |
border="1"> |
104 | 104 |
|
105 |
- <br /> |
|
105 |
+ <br> |
|
106 | 106 |
|
107 | 107 |
<p> |
108 | 108 |
If you plan to run Firefox on a different computer than Tor, see the <a |
... | ... |
@@ -127,10 +127,10 @@ |
127 | 127 |
HOWTO</a>. |
128 | 128 |
</p> |
129 | 129 |
|
130 |
- <hr /> |
|
130 |
+ <hr> |
|
131 | 131 |
<a id="verify"></a> |
132 | 132 |
<h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2> |
133 |
- <br /> |
|
133 |
+ <br> |
|
134 | 134 |
|
135 | 135 |
<p> |
136 | 136 |
Next, you should try using your browser with Tor and make |
... | ... |
@@ -164,11 +164,11 @@ |
164 | 164 |
href="<wikifaq>#ItDoesntWork">this |
165 | 165 |
FAQ entry</a> for hints.</p> |
166 | 166 |
|
167 |
- <hr /> |
|
167 |
+ <hr> |
|
168 | 168 |
<a id="server"></a> |
169 | 169 |
<a id="relay"></a> |
170 | 170 |
<h2><a class="anchor" href="#relay">Step Five: Configure it as a relay</a></h2> |
171 |
- <br /> |
|
171 |
+ <br> |
|
172 | 172 |
|
173 | 173 |
<p>The Tor network relies on volunteers to donate bandwidth. The more |
174 | 174 |
people who run relays, the faster the Tor network will be. If you have |
... | ... |
@@ -188,7 +188,7 @@ |
188 | 188 |
<p>Read more at our <a href="<page docs/tor-doc-relay>">Configuring a relay</a> |
189 | 189 |
guide.</p> |
190 | 190 |
|
191 |
- <hr /> |
|
191 |
+ <hr> |
|
192 | 192 |
|
193 | 193 |
<p>If you have suggestions for improving this document, please <a |
194 | 194 |
href="<page about/contact>">send them to us</a>. Thanks!</p> |
... | ... |
@@ -80,7 +80,7 @@ |
80 | 80 |
</p> |
81 | 81 |
|
82 | 82 |
<p>If you prefer, you can instead use Privoxy with <a |
83 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this |
|
83 |
+ href="<wiki>TheOnionRouter/PrivoxyConfig">this |
|
84 | 84 |
sample Privoxy configuration</a>. But since the config files both use |
85 | 85 |
port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
86 | 86 |
|
... | ... |
@@ -106,7 +106,7 @@ |
106 | 106 |
|
107 | 107 |
<p> |
108 | 108 |
If you plan to run Firefox on a different computer than Tor, see the <a |
109 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SocksListenAddress"> |
|
109 |
+ href="<wikifaq>#SocksListenAddress"> |
|
110 | 110 |
FAQ |
111 | 111 |
entry for running Tor on a different computer</a>. |
112 | 112 |
</p> |
... | ... |
@@ -115,15 +115,15 @@ |
115 | 115 |
point them at Polipo (that is, localhost port 8118). To use SOCKS |
116 | 116 |
directly (for instant messaging, Jabber, IRC, etc), you can point |
117 | 117 |
your application directly at Tor (localhost port 9050), but see <a |
118 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this |
|
118 |
+ href="<wikifaq>#SOCKSAndDNS">this |
|
119 | 119 |
FAQ entry</a> for why this may be dangerous. For applications |
120 | 120 |
that support neither SOCKS nor HTTP, take a look at <a |
121 | 121 |
href="http://tsocks.sourceforge.net/">tsocks</a> or <a |
122 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
122 |
+ href="<wiki>TheOnionRouter/TorifyHOWTO#socat">socat</a>. |
|
123 | 123 |
</p> |
124 | 124 |
|
125 | 125 |
<p>For information on how to Torify other applications, check out the |
126 |
- <a href="https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO">Torify |
|
126 |
+ <a href="<wiki>TheOnionRouter/TorifyHOWTO">Torify |
|
127 | 127 |
HOWTO</a>. |
128 | 128 |
</p> |
129 | 129 |
|
... | ... |
@@ -141,7 +141,7 @@ |
141 | 141 |
#<a href="http://ipchicken.com/">this site</a> |
142 | 142 |
#to see what IP address it thinks you're using. |
143 | 143 |
(If that site is down, see <a |
144 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this |
|
144 |
+ href="<wikifaq>#IsMyConnectionPrivate">this |
|
145 | 145 |
FAQ entry</a> for more suggestions on how to test your Tor.) |
146 | 146 |
</p> |
147 | 147 |
|
... | ... |
@@ -152,7 +152,7 @@ |
152 | 152 |
9050). If |
153 | 153 |
your firewall blocks outgoing connections, punch a hole so |
154 | 154 |
it can connect to at least TCP ports 80 and 443, and then see <a |
155 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this |
|
155 |
+ href="<wikifaq>#FirewalledClient">this |
|
156 | 156 |
FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to |
157 | 157 |
run correctly, create a file named booleans.local in the directory |
158 | 158 |
/etc/selinux/targeted. Edit this file in your favorite text editor and |
... | ... |
@@ -161,7 +161,7 @@ |
161 | 161 |
</p> |
162 | 162 |
|
163 | 163 |
<p>If it's still not working, look at <a |
164 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this |
|
164 |
+ href="<wikifaq>#ItDoesntWork">this |
|
165 | 165 |
FAQ entry</a> for hints.</p> |
166 | 166 |
|
167 | 167 |
<hr /> |
... | ... |
@@ -180,7 +180,7 @@ |
180 | 180 |
|
181 | 181 |
<p>Having relays in many different places on the Internet is what |
182 | 182 |
makes Tor users secure. <a |
183 |
- href="https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity">You |
|
183 |
+ href="<wikifaq>#RelayAnonymity">You |
|
184 | 184 |
may also get stronger anonymity yourself</a>, |
185 | 185 |
since remote sites can't know whether connections originated at your |
186 | 186 |
computer or were relayed from others.</p> |
... | ... |
@@ -5,12 +5,12 @@ |
5 | 5 |
#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8" |
6 | 6 |
<div id="content" class="clearfix"> |
7 | 7 |
<div id="breadcrumbs"> |
8 |
- <a href="<page home>">Home » </a> |
|
8 |
+ <a href="<page index>">Home » </a> |
|
9 | 9 |
<a href="<page docs/documentation>">Documentation » </a> |
10 | 10 |
<a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a> |
11 | 11 |
</div> |
12 | 12 |
<div id="maincol"> |
13 |
- <h1>Running the <a href="<page home>">Tor</a> client on Linux/BSD/Unix</h1> |
|
13 |
+ <h1>Running the <a href="<page index>">Tor</a> client on Linux/BSD/Unix</h1> |
|
14 | 14 |
<br /> |
15 | 15 |
|
16 | 16 |
<p> |
1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,204 @@ |
1 |
+## translation metadata |
|
2 |
+# Revision: $Revision: 21798 $ |
|
3 |
+# Translation-Priority: 3-low |
|
4 |
+ |
|
5 |
+#include "head.wmi" TITLE="Tor: Linux/BSD/Unix Install Instructions" CHARSET="UTF-8" |
|
6 |
+<div id="content" class="clearfix"> |
|
7 |
+ <div id="breadcrumbs"> |
|
8 |
+ <a href="<page home>">Home » </a> |
|
9 |
+ <a href="<page docs/documentation>">Documentation » </a> |
|
10 |
+ <a href="<page docs/tor-doc-unix>">Linux/BSD/Unix Client</a> |
|
11 |
+ </div> |
|
12 |
+ <div id="maincol"> |
|
13 |
+ <h1>Running the <a href="<page home>">Tor</a> client on Linux/BSD/Unix</h1> |
|
14 |
+ <br /> |
|
15 |
+ |
|
16 |
+ <p> |
|
17 |
+ <b>Note that these are the installation instructions for running a Tor |
|
18 |
+ client. If you want to relay traffic for others to help the network grow |
|
19 |
+ (please do), read the <a |
|
20 |
+ href="<page docs/tor-doc-relay>">Configuring a relay</a> guide.</b> |
|
21 |
+ </p> |
|
22 |
+ |
|
23 |
+ <hr /> |
|
24 |
+ <a id="installing"></a> |
|
25 |
+ <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2> |
|
26 |
+ <br /> |
|
27 |
+ |
|
28 |
+ <p> |
|
29 |
+ The latest release of Tor can be found on the <a |
|
30 |
+ href="<page download/download>">download</a> page. We have packages for Debian, |
|
31 |
+ Red Hat, Gentoo, *BSD, etc there too. If you're |
|
32 |
+ using Ubuntu, don't use the default packages: use <a |
|
33 |
+ href="<page docs/debian>#ubuntu">our deb repository</a> instead. |
|
34 |
+ </p> |
|
35 |
+ |
|
36 |
+ <p>If you're building from source, first install <a |
|
37 |
+ href="http://www.monkey.org/~provos/libevent/">libevent</a>, and |
|
38 |
+ make sure you have openssl and zlib (including the -devel packages if |
|
39 |
+ applicable). Then run:<br /> |
|
40 |
+ <tt>tar xzf tor-<version-stable>.tar.gz; cd tor-<version-stable></tt><br /> |
|
41 |
+ <tt>./configure && make</tt><br /> |
|
42 |
+ Now you can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt> |
|
43 |
+ (as root if necessary) to install it into /usr/local/, and then you can |
|
44 |
+ start it just by running <tt>tor</tt>. |
|
45 |
+ </p> |
|
46 |
+ |
|
47 |
+ <p>Tor comes configured as a client by default. It uses a built-in |
|
48 |
+ default configuration file, and most people won't need to change any of |
|
49 |
+ the settings. Tor is now installed. |
|
50 |
+ </p> |
|
51 |
+ |
|
52 |
+ <hr /> |
|
53 |
+ <a id="privoxy"></a> |
|
54 |
+ <a id="polipo"></a> |
|
55 |
+ <h2><a class="anchor" href="#polipo">Step Two: Install Polipo for Web Browsing</a></h2> |
|
56 |
+ <br /> |
|
57 |
+ |
|
58 |
+ <p>After installing Tor, you need to configure your applications to use it. |
|
59 |
+ </p> |
|
60 |
+ |
|
61 |
+ <p> |
|
62 |
+ The first step is to set up web browsing. Start by installing <a |
|
63 |
+ href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> from |
|
64 |
+ your favorite repository. Polipo is a caching web proxy that does http |
|
65 |
+ pipelining well, so it's well-suited for Tor's latencies. Make sure |
|
66 |
+ to get at least Polipo 1.0.4, since earlier versions lack the SOCKS support |
|
67 |
+ required to use Polipo with Tor. You should uninstall privoxy at this |
|
68 |
+ point (e.g. apt-get remove privoxy or yum remove privoxy), so they don't |
|
69 |
+ conflict. |
|
70 |
+ </p> |
|
71 |
+ |
|
72 |
+ <p>Once you've installed Polipo (either from package or from |
|
73 |
+ source), <b>you will need to configure Polipo to use Tor</b>. Grab our <a |
|
74 |
+ href="https://svn.torproject.org/svn/torbrowser/trunk/build-scripts/config/polipo.conf">Polipo |
|
75 |
+ configuration for Tor</a> and put it in place of your current polipo |
|
76 |
+ config file (e.g. /etc/polipo/config or ~/.polipo). |
|
77 |
+ You'll need to restart Polipo for the changes to take effect. For |
|
78 |
+ example:<br /> |
|
79 |
+ <tt>/etc/init.d/polipo restart</tt> |
|
80 |
+ </p> |
|
81 |
+ |
|
82 |
+ <p>If you prefer, you can instead use Privoxy with <a |
|
83 |
+ href="https://wiki.torproject.org/noreply/TheOnionRouter/PrivoxyConfig">this |
|
84 |
+ sample Privoxy configuration</a>. But since the config files both use |
|
85 |
+ port 8118, you shouldn't run both Polipo and Privoxy at the same time.</p> |
|
86 |
+ |
|
87 |
+ <hr /> |
|
88 |
+ <a id="using"></a> |
|
89 |
+ <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2> |
|
90 |
+ <br /> |
|
91 |
+ |
|
92 |
+ <p>After installing Tor and Polipo, you need to configure your |
|
93 |
+ applications to use them. The first step is to set up web browsing.</p> |
|
94 |
+ |
|
95 |
+ <p>You should use Tor with Firefox and Torbutton, for best safety. |
|
96 |
+ Simply install the <a |
|
97 |
+ href="https://addons.mozilla.org/firefox/2275/">Torbutton |
|