Tor

8 readers
1 users here now

News and discussion about the Tor anonymity software. New to Tor? Please read the Tor FAQ!.

founded 1 year ago
MODERATORS
1
 
 
The original post: /r/tor by /u/o_O-alvin on 2024-11-14 19:10:41.

soo everytime my isp changes my public ip i have to restart my tor service to get it to update to the new one

i am already thinking about writing a script to check for public ip and restart tor if changed

but is there a better way? i am running a bridge relay...

2
 
 
The original post: /r/tor by /u/whichkey45 on 2024-11-14 13:44:23.

Hi, this should be straightforward for someone with the requisite knowledge, who has the time to look through the commands I have issued below, but there is a lot of information here! I have simplified this post as much as I am able to.

I have used the following two tutorials to try and set up a tor wifi router on a raspberry pi 3b+ to which I connected a 5g modem via a hat. The 5g modem appears to the pi as 'usb0'.

https://learn.adafruit.com/setting-up-a-raspberry-pi-as-a-wifi-access-point/install-software

https://learn.adafruit.com/onion-pi

The first tutorial (first block of commands) results in me having a working raspberry pi router. I have made the odd adaptation (mainly due to the fact that I am connecting to the internet through usb0, rather than eth0, and I am in the UK so am using the GB country code rather than, US. But the commands below are exactly what I input.

The second tutorial, converting the wifi router into a tor router isn't working.

I am connected to the pi via eth0 which gets an ip address from my laptop as I am running isc-dhcp-server. I can ping and wget google.com from the pi's command line after the second tutorial, but I can't get to google.com from the web browser on my laptop via the wifi network that I created in the first tutorial.

I am comfortable with the linux aspects of what I have posted below (but usually this kind of problem is usually the result of some sort of daft mistake I am making, I know).

Primarily I am not sure about the torrc I have (it is simple, I know, I have (I have googled extensively, I promise, but I am still learning).

But I am also not sure what impact using a 5g modem attached to the pi via a hat has on any of these commands.

I have been trying to get this working, and experimenting for a long time........ Any help would be very much appreciated! Thanks

So

As well as the above, I also note that many of tutorials I have gone through utilise a bridge interface. I don't know what kind of effect bridging wlan0 with usb0 has, given that I need the hat to get an ip address from the mobile internet provider.

Having said that this pair of tutorials doesn't use a bridge anyway. I wonder whether I need one because of the 5g modem, and I don't know enough tor setup to figure out how I might have to change my torrc in order to accommodate it if I do..

After entering these commands I have a functioning raspberry pi based router:

sudo apt update
sudo apt -y upgrade
sudo apt install -y hostapd dnsmasq
sudo systemctl unmask hostapd
sudo systemctl enable hostapd
sudo DEBIAN_FRONTEND=noninteractive apt install -y netfilter-persistent iptables-persistent
sudo reboot
sudo nano /etc/dhcpcd.conf

interface wlan0
    static ip_address=192.168.4.1/24
    nohook wpa_supplicant

sudo nano /etc/sysctl.d/routed-ap.conf

# Enable IPv4 routing
net.ipv4.ip_forward=1

sudo nano /etc/dnsmasq.conf

interface=wlan0 # Listening interface
dhcp-range=192.168.4.2,192.168.4.20,255.255.255.0,24h
                # Pool of IP addresses served via DHCP
domain=wlan     # Local wireless DNS domain
address=/gw.wlan/192.168.4.1
                # Alias for this router

sudo nano /etc/hostapd/hostapd.conf

country_code=GB
interface=wlan0
ssid=mywifinetwork
hw_mode=a
channel=48
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_passphrase=mywifipassword
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP

sudo rfkill unblock wifi
sudo raspi-config nonint do_wifi_country GB
sudo iptables -t nat -A POSTROUTING -o usb0 -j MASQUERADE
sudo netfilter-persistent save
sudo reboot

-----

sudo apt remove modemmanager # I removed modemmanager because the developer of the hat says I need to. The 5g modem is functioning fine without any need for setup, but I am able to communicate with it using AT commands if I need to. The router worked fine at this point post removal of modemmanager. 

As I said, this results in a working router. Something in it, given that I have this 5g modem/hat or for some other reason, might explain why the following tutorial isn't working. Thanks

sudo apt-get update
sudo apt-get install tor 
sudo nano /etc/tor/torrc

Log notice file /var/log/tor/notices.log
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsSuffixes .onion,.exit
AutomapHostsOnResolve 1
TransPort 9040
TransListenAddress 192.168.42.1
DNSPort 53
DNSListenAddress 192.168.42.1

~~~## I am fairly new to tor. I roughly know that I will point my web browser towards port 9050, and any other general tcp traffic will get pointed towards port 9040. I am confused as to why the listening address is 192.168.42.1? Is this some sort of virtual address used by tor, or is it a typo?~~~

sudo iptables -F
sudo iptables -t nat -F
sudo iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 22 -j REDIRECT --to-ports 22
sudo iptables -t nat -A PREROUTING -i wlan0 -p udp --dport 53 -j REDIRECT --to-ports 53
sudo iptables -t nat -A PREROUTING -i wlan0 -p tcp --syn -j REDIRECT --to-ports 9040
sudo iptables -t nat -L

Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
REDIRECT   tcp  --  anywhere             anywhere             tcp dpt:ssh redir ports 22
REDIRECT   udp  --  anywhere             anywhere             udp dpt:domain redir ports 53
REDIRECT   tcp  --  anywhere             anywhere             tcp flags:FIN,SYN,RST,ACK/SYN redir ports 9040

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         

~~~## I noticed the rule from the previous tutorial didn't appear to be loaded, (I thought sudo netfilter-persistent save would reload it sutomatically) but nevertheless the pi-router was functioning. I decided to re-create the rule as I presume the tutorial expects it. I understand the rule, but am not sure how it interacts with tor.~~~

## Here is the rule:

sudo iptables -t nat -A POSTROUTING -o usb0 -j MASQUERADE

sudo sh -c "iptables-save > /etc/iptables.ipv4.nat"
sudo touch /var/log/tor/notices.log
sudo chown debian-tor /var/log/tor/notices.log
sudo chmod 644 /var/log/tor/notices.log

ls -l /var/log/tor

sudo service tor start
sudo service tor status

● tor.service - Anonymizing overlay network for TCP (multi-instance-master)
     Loaded: loaded (/lib/systemd/system/tor.service; enabled; vendor preset: enabled)
     Active: active (exited) since Thu 2024-11-14 12:20:13 GMT; 23min ago
    Process: 1298 ExecStart=/bin/true (code=exited, status=0/SUCCESS)
   Main PID: 1298 (code=exited, status=0/SUCCESS)
        CPU: 5ms

Nov 14 12:20:13 piOnionROuter systemd[1]: Starting Anonymizing overlay network for TCP (multi-instance-master)...
Nov 14 12:20:13 piOnionROuter systemd[1]: Finished Anonymizing overlay network for TCP (multi-instance-master).

sudo update-rc.d tor enable

3
 
 
The original post: /r/tor by /u/noURbreathtking on 2024-11-14 13:32:47.

the logs says this at top

2024-11-14 13:16:03.796 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.

the repeats general socks server failure

4
 
 
The original post: /r/tor by /u/AntiSuspectual on 2024-11-14 11:46:56.

i have been scrolling aimlessly for almost an hour now and i want to use TOR safely. what are your tips/recommendations/guides for a first time onion user 🫡

5
 
 
The original post: /r/tor by /u/AdArtistic8290 on 2024-11-13 19:49:17.

I have a domain for my website and I've established a server through XAMPP, but everytime I run Apache and MySQL the link continues to say "Unable to connect". Any fixes?

6
 
 
The original post: /r/tor by /u/No_Performer4598 on 2024-11-13 18:36:43.

Hey folks. I’m using Tor Browser both on Linux and Mac OS. Not a single problem on Linux but on Mac I had extremely hard times to connect to the tor network (even had to close and restart the browser several times to achieve it) I had to update Firefox, it took 7 seconds. Tor Browser: 9 minutes. No Orbot nor any download or anything

7
 
 
The original post: /r/tor by /u/Fantastic_Metal_289 on 2024-11-13 17:56:13.

Everything I search it says “onion site has disconnected “ or to restart tor

8
 
 
The original post: /r/tor by /u/satoshiplanet on 2024-11-13 15:02:40.
9
 
 
The original post: /r/tor by /u/Fearless-Ability-142 on 2024-11-13 13:38:39.

Bridges are fresh. There's no any problem when connected to wifi. Does anyone know how to solve this problem?

10
 
 
The original post: /r/tor by /u/Bright-Implement-959 on 2024-11-13 12:24:10.

I've been using TOR for the past week and its been pretty fine, kinda slow but I can handle it. But just today it is incredibly slow, it's taking 5-10 minutes to simply search something, and it cannot load up simple web pages (tries for 10 minutes before quitting). Its not my internet since it's working fine. I didn't modify the TOR Connection in any way, it is just suddenly doing this and I literally cannot use TOR.

11
 
 
The original post: /r/tor by /u/Puzzleheaded_Gift_18 on 2024-11-13 10:48:14.

My mac isn't compatible with the 14 release, I need the last 13 but i don't find it on the official website and i don't trust random website on the internet.

12
 
 
The original post: /r/tor by /u/PresentTank6015 on 2024-11-13 08:24:43.

new tor user here. let's say i need to register on a website. should i create a new email? do i even need a google account? what's the safest option?

13
 
 
The original post: /r/tor by /u/7venhigh on 2024-11-13 02:07:53.

After connecting then copying and pasting an onion, the browser keeps force quitting. Tried a bridge but same issue. Anyone experienced this problem? Solutions? Thanks

14
 
 
The original post: /r/tor by /u/Scared_Astronomer567 on 2024-11-12 23:53:51.

Hi there! Could you recommend a CMS to run a website for a Tor hidden service? Is WordPress a good option?

15
 
 
The original post: /r/tor by /u/Malik_esco on 2024-11-12 23:08:38.

I need to serve court documents to someone who changed their address. Is there any reliable onion that I could use for this?

16
 
 
The original post: /r/tor by /u/Condalmo on 2024-11-12 17:35:30.

Hi - just installed it, trying to get it working, and I can add an individual file in no problem; when I add a folder, it puts a red "+1" in the bottom right corner, but nothing else happens and the folder isn't made share-able. I should note that there are folders nested within the folder I am trying to share.

Am I doing it incorrectly?

17
 
 
The original post: /r/tor by /u/The_Uglyest_femboy on 2024-11-12 13:29:00.
18
 
 
The original post: /r/tor by /u/TheHolyToxicToast on 2024-11-12 11:54:26.

I'm building a p2p app and it needs really strong obfuscation, I'm trying to see whether it's possible to bypass the GFW with obfuscation protocols.

19
 
 
The original post: /r/tor by /u/FreeThinkingBuffalo7 on 2024-11-12 01:40:34.

I'm writing a research paper right now and I'm wondering roughly how much of the "dark web" (meaning sites that can be only accessed through specialized/non-clearnet browsers like TOR or I2P) is on TOR vs. other networks. Sources would be much appreciated.

20
 
 
The original post: /r/tor by /u/i_73 on 2024-11-11 16:37:55.

I heard it was abt fingerprinting

21
 
 
The original post: /r/tor by /u/Affectionate_Cup3684 on 2024-11-11 11:09:59.

Like a few other people last week I got notified by my host that my tor relay was port scanning external hosts. I spent a lot of time looking for the problem, but found nothing. I was ready to put it down to a spoofing attack, but I've been monitoring outbound connections on the server and the tor process still seems to be attempting to make outbound connections on port 22.

I'm using ptcpdump to monitor connections with destination port 22, which there should be none, and I'm getting hits every few hours from the tor process to random external IPs on port 22.

config looks like this:

SocksPort 0
ExitRelay 0
DisableDebuggerAttachment 0
RunAsDaemon 1
ORPort 9001
Nickname <removed>
ContactInfo <removed>
DirPort 9030 
ExitPolicy reject *:*

ptcpdump output looks like this:

14:44:21.699029 eth0 tor.812 Out IP <my ip>.47890 > <destination ip>.22: Flags [S], seq 3926882401, win 64240, options [mss 1460,sackOK,TS val 2125664377 ecr 0,nop,wscale 7], length 0, ParentProc [systemd.1]

Can anyone explain this behaviour, or is anyone seeing similar? I've firewalled it so it's not getting out but I'd rather it wasn't happening at all, since as far as I can see it shouldn't be.

22
 
 
The original post: /r/tor by /u/pablopeecaso on 2024-11-11 08:27:37.

Yea its set to global.

23
 
 
The original post: /r/tor by /u/mrednot on 2024-11-11 01:31:06.

Hi

I'm trying to download 300mb files, the only way to download is if I'm using a Meek Azure bridge (quite slow as expected) but when I use Snowflake or Obf4 the download starts but then stalls... Any suggestions?

Thanks in advance.

24
 
 
The original post: /r/tor by /u/Awkward-Pause-7186 on 2024-11-11 00:03:47.

Hello, I can hack Social Media like Instagram, Facebook, Twitter, Tik Tok and more. If interested write me a message over Reddit and I we will discuss the rest. Also with proof.

25
 
 
The original post: /r/tor by /u/pipjersey on 2024-11-10 22:29:35.

Im just gonna put this briefly, but how can a project that was headed up at a military institution, the 'NRL' , and seemingly funded by the military and government, truly make people think this is a way to bypass government or other entities from seeing what they are doing?

i just dont know if i can trust a program that was created in these environments, i mean just look at the NRL's website and look at the technologies they've developed and are developing, tracking taking to another level

I dont know too much about the tor functionality, but just seeing how the military is involved in it and that they would supposedly give people 'public' access to that? somethings just off with that

view more: next ›