Created
February 8, 2016 06:47
-
-
Save 0x9090/f2a1d6069f0c330e3a2b to your computer and use it in GitHub Desktop.
torrc examples
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file is part of Whonix | |
Copyright (C) 2012 - 2014 Patrick Schleizer <[email protected]> | |
See the file COPYING for copying conditions. | |
**** Do NOT edit this file! **** | |
This file will show you examples you can copy and paste to /etc/tor/torrc | |
Additionally, you can read the official Tor Manual at: | |
https://www.torproject.org/docs/tor-manual.html.en | |
**** Do NOT edit this file! **** | |
Contents | |
======== | |
- Bridges | |
- Firewall | |
- Proxy | |
- Hidden Services | |
Bridges | |
======= | |
Less sophisticated censors prevent users from accessing | |
the Tor network by blocking connections to known relays. | |
"Bridge relays" help these users access Tor by not being | |
in the same public lists as normal relays. | |
Sophisticated censors can only be circumvented with | |
private obfuscated bridges. | |
Because there is NOT a 100% way to hide Tor, Whonix does | |
NOT recommend using Tor if you fear detection. | |
Finding Public Bridges | |
---------------------- | |
https://bridges.torproject.org/bridges | |
If you can not reach the URL, send an email (from a | |
gmail.com or yahoo.com account only) to | |
[email protected] with "get bridges" in the | |
message body. | |
Private Obfuscated Bridges | |
-------------------------- | |
A sophisticated user you trust -- outside the reach of | |
the censors but accessible from your location -- must | |
run a bridge service configured with obfsproxy (to | |
help avoid detection) and the option | |
"PublishServerDescriptor 0" (to not be listed by The | |
Tor Project). However, since even private obfuscated | |
bridges can ultimately be detected, Whonix does NOT | |
recommend using bridges if you fear detection. | |
To use bridges, copy the two lines below and paste | |
them into /etc/tor/torrc | |
UseBridges 1 | |
ClientTransportPlugin obfs2,obfs3 exec /usr/bin/obfsproxy managed | |
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy managed | |
You must also add the IPs for your bridges. The | |
following lines are an example of how it should look: | |
bridge 23.22.110.133:443 | |
bridge 24.22.1.54:443 | |
bridge obfs2 209.176.111.47:42105 | |
bridge obfs3 199.241.31.96:12873 | |
bridge obfs4 141.201.27.48:420 gibberish cert=more-gibberish iat-mode=0 | |
Firewall | |
======== | |
The option ReachableAddresses ADDR[/MASK][:PORT] | |
restricts the ports and IPs that Tor attempts to connect | |
through. Study the examples below. | |
If your firewall blocks all ports but 80 and 443, copy the | |
two lines below into /etc/tor/torrc | |
ReachableAddresses accept *:80 | |
ReachableAddresses accept *:443 | |
If your firewall allows connections to everything inside | |
net 99, rejects port 80 inside net 18, but otherwise | |
accepts connections to port 80: | |
ReachableAddresses 99.0.0.0/8 | |
ReachableAddresses reject 18.0.0.0/8:80 | |
ReachableAddresses accept *:80 | |
Proxy | |
===== | |
If you use an HTTP, SOCKS 4, or SOCKS 5 proxy to connect to | |
the internet, study the examples below and configure | |
/etc/tor/torrc accordingly. | |
Note, you need to use the IP instead of the hostname | |
(proxy.example.com). This may result in subtle differences | |
your proxy may detect. See also Whonix documentation: | |
https://www.whonix.org/wiki/Tunnel_Tor_through_proxy_or_VPN_or_SSH#Tunnel_Tor_through_proxy | |
HTTP Proxy | |
---------- | |
If you use an HTTP proxy at 192.168.1.44 via port 443 | |
HTTPSProxy 192.168.1.44:443 | |
If it requires a username and password | |
HTTPSProxyAuthenticator username:password | |
SOCKS 4 | |
------- | |
To use a SOCKS 4 proxy at 10.0.1.3 via port 1080 | |
Socks4Proxy 10.0.1.3:1080 | |
SOCKS 5 | |
------- | |
To use a SOCKS 5 proxy at 172.1.3.3 via port 1080 | |
Socks5Proxy 172.1.3.3:1080 | |
If it requires a username and password | |
Socks5ProxyUsername username | |
Socks5ProxyPassword password | |
Hidden Services | |
=============== | |
To make a service on Whonix-Workstation accessible over | |
Tor, you must assign a directory and port for it inside | |
Whonix-Gateway's /etc/tor/torrc. Below are examples that | |
you can copy to /etc/tor/torrc | |
For a longer tutorial, see: | |
https://www.whonix.org/wiki/Hidden_Services | |
Web Server | |
---------- | |
If a web server is running in Whonix-Workstation, add | |
the next two lines to /etc/tor/torrc to make it | |
accessible to others. | |
HiddenServiceDir /var/lib/tor/webserver/ | |
HiddenServicePort 80 10.152.152.11:80 | |
Find the .onion address for this service: | |
sudo cat /var/lib/tor/webserver/hostname | |
Backup /var/lib/tor/webserver/private_key | |
TorChat | |
------- | |
HiddenServiceDir /var/lib/tor/torchat/ | |
HiddenServicePort 11009 10.152.152.11:11009 | |
Find the .onion address for this service: | |
sudo cat /var/lib/tor/torchat/hostname | |
Backup /var/lib/tor/torchat/private_key | |
Mumble Server | |
------------- | |
HiddenServiceDir /var/lib/tor/mumble/ | |
HiddenServicePort 80 10.152.152.11:80 | |
Find the .onion address for this service: | |
sudo cat /var/lib/tor/mumble/hostname | |
Backup /var/lib/tor/mumble/private_key |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment