1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 |
- // Copyright (c) The Tor Project, Inc.
- // See LICENSE for licensing information
- // This is an asciidoc file used to generate the manpage/html reference.
- // Learn asciidoc on http://www.methods.co.nz/asciidoc/userguide.html
- torify(1)
- =========
- Peter Palfrader
- Jacob Appelbaum
- NAME
- ----
- torify - wrapper for torsocks or tsocks and tor
- SYNOPSIS
- --------
- **torify** __application__ [__application's__ __arguments__]
- DESCRIPTION
- -----------
- **torify** is a simple wrapper that attempts to find the best underlying Tor
- wrapper available on a system. It calls torsocks or tsocks with a tor specific
- configuration file. +
- torsocks is an improved wrapper that explictly rejects UDP, safely resolves DNS
- lookups and properly socksifies your TCP connections. +
- tsocks itself is a wrapper between the tsocks library and the application that
- you would like to run socksified. +
- Please note that since both method use LD_PRELOAD, torify cannot be applied to
- suid binaries.
- WARNING
- -------
- You should also be aware that the way tsocks currently works only TCP
- connections are socksified. Be aware that this will in most circumstances not
- include hostname lookups which would still be routed through your normal system
- resolver to your usual resolving nameservers. The **tor-resolve**(1) tool can be
- useful as a workaround in some cases. The Tor FAQ at
- https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ might have further
- information on this subject. +
- When used with torsocks, torify should not leak DNS requests or UDP data. +
- Both will leak ICMP data.
- SEE ALSO
- --------
- **tor**(1), **tor-resolve**(1), **torsocks**(1), **tsocks**(1),
- **tsocks.conf**(5).
|