E
Eric Hansen
Guest
Ubuntu in all of its glory has Tor in their repositories. However, Ubuntu in all of its overly-cautious approach of everything usually don’t have the most updated versions of software, either. Normally this doesn’t bother me but when it comes to security software I prefer to either compile from source or have a better alternative for package management.
Luckily Tor has their own deb repository that both Debian and Ubuntu (plus derivatives) can use to get the most recent stable version of Tor. So we will go this route. If you’re using Debian or Ubuntu (or Mint, Kubuntu, etc…), which I’m going to figure you are, open up /etc/apt/sources.list and root (sudo nnao /etc/apt/sources.list) and add this to the bottom (change “precise” to fit the rest of your items in the sources.list file):
After that, we need to get the GPG key for the server and store it or else we’ll receive errors when updating. Run the following commands (preferably not as root as its not needed):
Now we need to update our cache of packages:
Next, while this isn’t needed, its helpful if you want to not have to keep making sure the key correct, so we’ll install it too:
Lastly we will finally install the point of this, Tor:
Using Tor
Back in the old days, when Tor was first created and used, you had to install another program called Privoxy due to a DNS issue that would lead to DNS poisoning and compromise the whole point of Tor. Thankfully these days we don’t need to be going this far and Tor makes everything just as easy, if not easier. No longer are the days of having to forward traffic through Privoxy to Tor.
Tor is a SOCKS proxy, which means any applications which support SOCKS proxies (which most do these days) can use Tor to route traffic through. After you install Tor it starts automatically so we just need to pass localhost:9050 to any applications we want to link through Tor first.
A good example of this is your browser. Go to a website that shows you your IP (I usually use http://www.whatsmyip.org), and note what it says as your IP. Then set up your web browser’s proxy settings to point SOCKS (or HTTP requests) to localhost:9050, and Ctrl+F5 (or however your browser force-refreshes a page) and see what IP it gives you now. It should be completely different.
Luckily Tor has their own deb repository that both Debian and Ubuntu (plus derivatives) can use to get the most recent stable version of Tor. So we will go this route. If you’re using Debian or Ubuntu (or Mint, Kubuntu, etc…), which I’m going to figure you are, open up /etc/apt/sources.list and root (sudo nnao /etc/apt/sources.list) and add this to the bottom (change “precise” to fit the rest of your items in the sources.list file):
Code:
deb http://deb.torproject.org/torproject.org precise main
Code:
gpg --keyserver keys.gnupg.net --recv 886DDD89
gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
Code:
sudo apt-get update
Code:
sudo apt-get install deb.torproject.org-keyring
Code:
sudo apt-get install tor
Back in the old days, when Tor was first created and used, you had to install another program called Privoxy due to a DNS issue that would lead to DNS poisoning and compromise the whole point of Tor. Thankfully these days we don’t need to be going this far and Tor makes everything just as easy, if not easier. No longer are the days of having to forward traffic through Privoxy to Tor.
Tor is a SOCKS proxy, which means any applications which support SOCKS proxies (which most do these days) can use Tor to route traffic through. After you install Tor it starts automatically so we just need to pass localhost:9050 to any applications we want to link through Tor first.
A good example of this is your browser. Go to a website that shows you your IP (I usually use http://www.whatsmyip.org), and note what it says as your IP. Then set up your web browser’s proxy settings to point SOCKS (or HTTP requests) to localhost:9050, and Ctrl+F5 (or however your browser force-refreshes a page) and see what IP it gives you now. It should be completely different.