How to anonymize the programs from your terminal with torify
Rabu, 30 Januari 2013
0
komentar
http://linuxaria.com/howto/how-to-anonymize-the-programs-from-your-terminal-with-torify?lang=en
In the past I’ve posted an article about Anonymous browsing with Tor that can be useful when you use your favorite browser and you wish to stay anonymous thanks to the Tor software.
Tor (short for The Onion Router) is a system intended to enable online anonymity. Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user and is intended to protect users’ personal freedom, privacy, and ability to conduct confidential business by keeping their internet activities from being monitored.
Today I want to show some simple uses of the command
As first thing install the software,
In this example we’ll keep all the standard configuration but 2 things, in the file
And set
With these 2 options we set the port on which Tor will listen for local connections from Tor controller applications, and we tell to Tor that we don’t need an authentication, so any program can control Tor (don’t do this on a shared computer or server), later in this post I’ll show how to set a password, once changed save the file and restart
And now a simple example that shows how to use the command torify and start a new session on tor from the Linux terminal, as first thing I get my public IP address with:
So 79.35.56.153 is my public IP, now I use
As you can see now I browse on the net with a different Ip: 74.120.15.150, but from the command line I can also force Tor to start a “new session” with the command:
This small script connects to port 9051 and issue the command “
In this small example I’ve used
How to set a password for Tor
If you are in a shared environment it’s better to set up a password for Tor, here it’s how you can do it in a few steps:
1) Generating your encrypted password:
In a terminal type:
This will generate a password hash, you will need to save this for inserting into the TOR configuration file in the next step.
(This is the hash for “passwordhere”, 16:113BD60B17CD1E98609013B4426860D576F7096C189184808AFF551F65)
2) Editing the Tor configuration file :
Open the file
Next find the line:
remove the # at the beginning and replace the password hash that is currently there with the hash you have just generated.
So with the hash generated in this example the configuration would be:
Save your changes.
3) Restart TOR:
Restart Tor so it get the new directives with:
Now you can use the former command to connect to teh Tor daemon, but using your password, so for me this would be:
References:
http://fixitts.com/2012/09/28/data-scraping-series-2-1-rotating-your-tor-ip-address-php-or-linux/
Using Tor to Anonymize Your Traffic (and setting up Tor in Arch Linux)
Using Tor in Ubuntu | Torify our life
In the past I’ve posted an article about Anonymous browsing with Tor that can be useful when you use your favorite browser and you wish to stay anonymous thanks to the Tor software.
Tor (short for The Onion Router) is a system intended to enable online anonymity. Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user and is intended to protect users’ personal freedom, privacy, and ability to conduct confidential business by keeping their internet activities from being monitored.
Today I want to show some simple uses of the command
torify
that can be used from the Linux terminal.torify
is a simple wrapper that attempts to find the best underlying Tor wrapper available on a system. It calls torsocks or tsocks with a tor specific configuration file.As first thing install the software,
tor
is usually found on all the repository so for Debian, Ubuntu and Mint you just have to type:sudo apt-get install tor |
/etc/tor/torrc
you should uncomment the directive:ControlPort 9051 |
CookieAuthentication 0 |
tor
with the command:sudo /etc/init.d/tor restart |
$ curl ifconfig.me |
torify
before the command curl
in the command line :$ torify curl ifconfig.me 2>/dev/null |
echo -e 'AUTHENTICATE ""\r\nsignal NEWNYM\r\nQUIT' | nc 127.0.0.1 9051 |
signal newnym
” that will make Tor switch to clean circuits, so new application requests don’t share any circuits with old ones, now if I check my IP I expect to see a new one:$ torify curl ifconfig.me 2>/dev/null |
curl
to get my ip address, but with torify you could use almost any terminal program, such as ssh
, wget
, w3m
or BitchX
.How to set a password for Tor
If you are in a shared environment it’s better to set up a password for Tor, here it’s how you can do it in a few steps:1) Generating your encrypted password:
In a terminal type:
tor --hash-password "passwordhere" |
(This is the hash for “passwordhere”, 16:113BD60B17CD1E98609013B4426860D576F7096C189184808AFF551F65)
2) Editing the Tor configuration file :
Open the file
/etc/tor/torrc
and comment the line we set before:#CookieAuthentication 0
Next find the line:
#HashedControlPassword 16:2283409283049820409238409284028340238409238
remove the # at the beginning and replace the password hash that is currently there with the hash you have just generated.
So with the hash generated in this example the configuration would be:
HashedControlPassword 16:113BD60B17CD1E98609013B4426860D576F7096C189184808AFF551F65
Save your changes.
3) Restart TOR:
Restart Tor so it get the new directives with:
sudo /etc/init.d/tor restart |
echo -e 'AUTHENTICATE "passwordhere"\r\nsignal NEWNYM\r\nQUIT' | nc 127.0.0.1 9051 |
http://fixitts.com/2012/09/28/data-scraping-series-2-1-rotating-your-tor-ip-address-php-or-linux/
Using Tor to Anonymize Your Traffic (and setting up Tor in Arch Linux)
Using Tor in Ubuntu | Torify our life
TERIMA KASIH ATAS KUNJUNGAN SAUDARA
Judul: How to anonymize the programs from your terminal with torify
Ditulis oleh Unknown
Rating Blog 5 dari 5
Semoga artikel ini bermanfaat bagi saudara. Jika ingin mengutip, baik itu sebagian atau keseluruhan dari isi artikel ini harap menyertakan link dofollow ke http://androidjapane.blogspot.com/2013/01/how-to-anonymize-programs-from-your.html. Terima kasih sudah singgah membaca artikel ini.Ditulis oleh Unknown
Rating Blog 5 dari 5
0 komentar:
Posting Komentar