Friday, October 19, 2012

Easy anonymization using combination Tor + Proxychains in Debian

English: Tor Logo
English: Tor Logo (Photo credit: Wikipedia)








Today governments of many countries are trying to limit maximally anonymous activity in Internet. Laws are made that strive for total control of everything under cover of good intensions.

Everything would be fine but you may agree that it is not very pleasant to know that someone can read everything you write, check which sites do you visit and so on just at any moment. 

The holywar might be very long but in this article I want to describe what can we oppose in such situation.

At the current moment there are 2 popular developing projects: I2P and TorProject.
  1. I2P - http://www.i2p2.de/ It is a distributed encrypted net that has its own resources and uses Internet as a transport for its needs.
  2. TorProject - https://www.torproject.org/ It is a distributed net that ensures anonimization of you traffic in the whole Internet.

In this article we will consider the easiest way to anonymize your traffic for any application of your system using the combination Tor + Proxychains even if this application doesn't stipulate work via SOCKS Proxy.

Let's begin.

Actually we don't even need to configure anything in Debian - everything did distributive assemblers.

Install SW.
apt-get update
apt-get install proxychains tor -y
Now each application that runs via Proxychains will get access to the net via Tor net. about organisation of Tor net here.

Let's check the result:

Current IP address.
wget -O - http://2ip.ru | grep big | gawk -F\<big\> '{print $2}' | gawk -F\<\/big\> '{print "You IP Adres "$1}'
--2012-08-21 03:44:54--  http://2ip.ru/
Resolving 2ip.ru (2ip.ru)... 188.40.74.9, 188.40.74.10
Connecting to 2ip.ru (2ip.ru)|188.40.74.9|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: `STDOUT'

    [  <=>                                                                                                                                                       ] 25,427      80.5K/s   in 0.3s    

2012-08-21 03:44:54 (80.5 KB/s) - written to stdout [25427]

You IP Adres 2.92.123.200
Address that you got via Tor net.

proxychains wget -O - http://2ip.ru | grep big | gawk -F\<big\> '{print $2}' | gawk -F\<\/big\> '{print "You IP Adres "$1}'
--2012-08-21 03:45:28--  http://2ip.ru/
Resolving 2ip.ru (2ip.ru)... |DNS-request| 2ip.ru 
|S-chain|-<>-127.0.0.1:9050-<><>-4.2.2.2:53-<><>-OK
|DNS-response| 2ip.ru is 188.40.74.10
188.40.74.10
Connecting to 2ip.ru (2ip.ru)|188.40.74.10|:80... |S-chain|-<>-127.0.0.1:9050-<><>-188.40.74.10:80-<><>-OK
connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: `STDOUT'

    [  <=>                                                                                                                                                       ] 25,745      84.3K/s   in 0.3s    

2012-08-21 03:45:32 (84.3 KB/s) - written to stdout [25745]

You IP Adres 46.17.101.154
For changing address restarting your local Tor server is needed.
/etc/init.d/tor restart
[ ok ] Stopping tor daemon...done.
[ ok ] Starting tor daemon...done.
One more check.
proxychains wget -O - http://2ip.ru | grep big | gawk -F\<big\> '{print $2}' | gawk -F\<\/big\> '{print "You IP Adres "$1}'
--2012-08-21 04:54:33--  http://2ip.ru/
Resolving 2ip.ru (2ip.ru)... |DNS-request| 2ip.ru 
|S-chain|-<>-127.0.0.1:9050-<><>-4.2.2.2:53-<><>-OK
<><>-OK
|DNS-response| 2ip.ru is 188.40.74.10
188.40.74.10
Connecting to 2ip.ru (2ip.ru)|188.40.74.10|:80... |S-chain|-<>-127.0.0.1:9050-<><>-188.40.74.10:80-<><>-OK
connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
Saving to: `STDOUT'

    [  <=>                                                                                                                                                       ] 26,507      26.0K/s   in 1.0s    

2012-08-21 04:54:42 (26.0 KB/s) - written to stdout [26507]

You IP Adres 94.126.178.1
You can configure manually your programs to use Tor using the following data:
socks4     127.0.0.1 9050
Enhanced by Zemanta

No comments:

Post a Comment