| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230 | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN""http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"><head>  <title>Tor Linux/BSD/Unix Install Instructions</title>  <meta name="Author" content="Roger Dingledine" />  <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />  <link rel="stylesheet" type="text/css" href="http://tor.eff.org/stylesheet.css" />  <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" /></head><body><!-- TITLE BAR & NAVIGATION --><table class="banner" border="0" cellpadding="0" cellspacing="0">    <tr>        <td class="banner-left"></td>        <td class="banner-middle">            <a href="/index.html">Home</a>          | <a href="/howitworks.html">How It Works</a>          | <a href="/download.html">Download</a>          | <a href="/documentation.html">Docs</a>          | <a href="/users.html">Users</a>          | <a href="/faq.html">FAQs</a>          | <a href="/volunteer.html">Volunteer</a>          | <a href="/developers.html">Developers</a>          | <a href="/research.html">Research</a>          | <a href="/people.html">People</a>        </td>        <td class="banner-right"></td>    </tr></table> <!-- END TITLE BAR & NAVIGATION --><div class="center"><div class="main-column"><h1>Running the <a href="http://tor.eff.org/">Tor</a> client on Linux/BSD/Unix</h1><br /><p><b>Note that these are the installation instructions for running a Torclient. If you want to configure it as a server (please do), read the <ahref="tor-doc-server.html">Configuring a server</a> guide.</b></p><hr /><a id="installing"></a><h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2><br /><p>The latest release of Tor can be found on the <ahref="/download.html">download</a> page. We have packages for Debian,Red Hat, Gentoo, *BSD, etc there too.</p><p>If you're building from source, first install <ahref="http://www.monkey.org/~provos/libevent/">libevent</a>, andmake sure you have openssl and zlib (including the -devel packages ifapplicable). Then Run <tt>tar xzf tor-0.1.0.15.tar.gz;cd tor-0.1.0.15</tt>. Then <tt>./configure && make</tt>. Now youcan run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>(as root if necessary) to install it into /usr/local/, and then you canstart it just by running <tt>tor</tt>.</p><p>Tor comes configured as a client by default. It uses a built-indefault configuration file, and most people won't need to change any ofthe settings. Tor is now installed.</p><hr /><a id="privoxy"></a><h2><a class="anchor" href="#privoxy">Step Two: Install Privoxy for Web Browsing</a></h2><br /><p>After installing Tor, you need to configure your applications to use it.</p><p>The first step is to set up web browsing. Start by installing <ahref="http://www.privoxy.org/">Privoxy</a>: click on 'recent releases'and pick your favorite package or install from source. Privoxy is afiltering web proxy that integrates well with Tor.</p><p>You need to configure Privoxy to use Tor.Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/)and add the line <br><tt>forward-socks4a / localhost:9050 .</tt><br>to the top of the config file. Don't forget to add the dot at the end.</p><p>Privoxy keeps a log file of everything passed through it.  Inorder to stop this you will need to comment out two lines by inserting a# before the line. The two lines are:<br><tt>logfile logfile</tt><br>and the line <br><tt>jarfile jarfile</tt><br></p><p>You'll need to restart Privoxy for the changes to take effect.</p><hr /><a id="using"></a><h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2><br /><p>After installing Tor and Privoxy, you need to configure yourapplications to use them. The first step is to set up web browsing.</p><p>If you're using Firefox (we recommend it), check out our <ahref="tor-switchproxy.html">Tor SwitchProxy howto</a> to set upa plugin that makes it easy to switch between using Tor and using adirect connection.</p><p>Otherwise, you need to manually configure your browser to HTTP proxyat localhost port 8118.(That's where Privoxy listens.)In Mozilla, this is in Edit|Preferences|Advanced|Proxies.In Opera 7.5x it's Tools|Preferences|Network|Proxy servers.You should click the "use the same proxy server for all protocols"button; but see <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">thisnote</a> about Tor and ftp proxies.<p>Using privoxy is <strong>necessary</strong> because <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsersleak your DNS requests when they use a SOCKS proxy directly</a>, whichis bad for your anonymity. Privoxy also removes certain dangerousheaders from your web requests, and blocks obnoxious ad sites likeDoubleclick.</p><p>To Torify other applications that support HTTP proxies, justpoint them at Privoxy (that is, localhost port 8118). To use SOCKSdirectly (for instant messaging, Jabber, IRC, etc), you can pointyour application directly at Tor (localhost port 9050), but see <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">thisFAQ entry</a> for why this may be dangerous. For applicationsthat support neither SOCKS nor HTTP, take a look at <ahref="http://tsocks.sourceforge.net/">tsocks</a> or <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.</p><p>For information on how to Torify other applications, check out the<a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">TorifyHOWTO</a>.</p><hr /><a id="verify"></a><h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2><br /><p><a href="http://ipid.shat.net">ipid.shat.net</a> and<a href="http://www.showmyip.com/">showmyip.com</a>are sites that show what IP address and country you appear to be comingfrom.</p><p>If you don't know your current public IP address, this may not be avery useful test. To learn your IP address, run "<tt>ifconfig</tt>".If you are behind a NAT or firewall, though, you won't be ableto learn your public IP address. In this case, you should 1) configureyour browser to connect directly (that is, stop using Privoxy), 2) checkyour IP address with one of the sites above, 3) point your browser backto Privoxy, and 4) see whether your IP address has changed.</p><p>If you have a personal firewall that limits your computer'sability to connect to itself (this includes something like SELinux onFedora Core 4), be sure to allow connections fromyour local applications to Privoxy (local port 8118) and Tor (local port9050). Ifyour firewall blocks outgoing connections, punch a hole soit can connect to at least TCP ports 80 and 443, and then see <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">thisFAQ entry</a>.  If your SELinux config is not allowing tor or privoxy torun correctly, create a file named booleans.local in the directory/etc/selinux/targeted.  Edit this file in your favorite text editor andinsert "allow_ypbind=1".  Restart your machine for this change to takeeffect.</p><p>If it's still not working, look at <ahref="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">thisFAQ entry</a> for hints.</p><hr /><a id="server"></a><h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2><br /><p>The Tor network relies on volunteers to donate bandwidth. The morepeople who run servers, the faster the Tor network will be. If you haveat least 20 kilobytes/s each way, please help out Tor by configuring yourTor to be a server too. We have many features that make Tor servers easyand convenient, including rate limiting for bandwidth, exit policies soyou can limit your exposure to abuse complaints, and support for dynamicIP addresses.</p><p>Having servers in many different places on the Internet is whatmakes Tor users secure. You may also get stronger anonymity yourself,since remote sites can't know whether connections originated at yourcomputer or were relayed from others.</p><p>Read more at our <a href="tor-doc-server.html">Configuring a server</a>guide.</p><hr /><p>If you have suggestions for improving this document, please postthem on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in thewebsite category. Thanks!</p>  </div><!-- #main --></div>  <div class="bottom" id="bottom">     <i><a href="mailto:tor-webmaster@freehaven.net"     class="smalllink">Webmaster</a></i> - $Id$  </div></body></html>
 |