![]() ![]() This will work unless you have a very old Linux distribution. Sudo iptables -t nat -A OUTPUT -p tcp -m owner -uid-owner bob -m tcp -j REDIRECT -to-ports 9040 sudo iptables -t nat -A OUTPUT -p udp -m owner -uid-owner bob -m udp -dport 53 -j REDIRECT -to-ports 53 sudo iptables -t filter -A OUTPUT -p tcp -m owner -uid-owner bob -m tcp -dport 9040 -j ACCEPT sudo iptables -t filter -A OUTPUT -p udp -m owner -uid-owner bob -m udp -dport 53 -j ACCEPT sudo iptables -t filter -A OUTPUT -m owner -uid-owner bob -j DROP To redirect all the applications' network traffic, there is the Linux firewall iptables: You can use any existing DNS server by omitting the DNSPort line, but this is not as secure as TOR. TOR will fail if it has insufficient privilege for the DNS port. This will instruct TOR to forward redirected traffic at port 9040, and forward domain name server requests at port 53. VirtualAddrNetwork 10.192.0.0/10 AutomapHostsOnResolve 1 TransPort 9040 DNSPort 53 In Ubuntu for example, add the following lines to /etc/tor/torrc: ![]() By default, TOR runs as daemon and has root privilege. ![]() First install TOR use one of the several distribution specific ways. It is not advised to use Vidalia as it does not have sufficient system privileged by default. TOR only published instructions for the VPN mode in Linux, which is called transparent proxy, routing all network traffic via TOR transparently. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |