Latest Tips & Tricks, Softwares: Quick Guide to Setting up a Tor Client on Ubuntu

Quick Guide to Setting up a Tor Client on Ubuntu

This is a specialized version of the page Running the Tor client on Linux/BSD/Unix which is specific to Ubuntu Linux (and variants like Kubuntu, Xubuntu). (These instructions probably work for Debian too.)

This guide explains how to browse webpages anonymously using Firefox. For more details please see the original guide (http://tor.eff.org/docs/tor-doc-unix.html.en).

Step One: Install Tor and Privoxy

Privoxy is a filtering web proxy that integrates well with Tor.

From a terminal, type:

sudo apt-get install tor privoxy

OR find the Synaptic Package Manager in your menu and install the two packages tor and privoxy.

After installing Tor, you need to configure your applications to use it. Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings.

Step Two: Configure Privoxy for Web Browsing

The first step is to set up web browsing. Once you've installed Privoxy (Step One), you will need to configure Privoxy to use Tor. Open Privoxys file (for Ubuntu its /etc/privoxy/config, on other systems it may be in /usr/local/etc/) and add the line

forward-socks4a / 127.0.0.1:9050 .

to the top of the config file. Do not forget to add the dot at the end.

Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out three lines by inserting a # before the line. The three lines are: (don't worry if you do not have the 3rd)

logfile logfile
jarfile jarfile
debug 1 # show each GET/POST/CONNECT request

Note that the config must edited as the root user, you can do this from a terminal by typing sudo nano /etc/privoxy/config. It will prompt for your password. If you've never used nano before, the commands are listed at the bottom of the screen.

You'll need to restart Privoxy for the changes to take effect. To do this, type

sudo /etc/init.d/privoxy restart

Step Three: Configure your applications to use Tor

After installing Tor and Privoxy, you need to configure Firefox to use them.

Install the Torbutton plugin, restart your Firefox, and you are all set:
Click here for the Torbutton plugin page (https://addons.mozilla.org/firefox/2275/)
Learn more about Torbutton here.
(https://torbutton.torproject.org)

In the bottom right hand corner of the browser you'll see when Tor and privoxy are anonymizing your browsing, and when they are not.

Step Four: Make sure it is working

Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector (http://torcheck.xenobite.eu) and see whether it thinks you're using Tor or not. (If that site is down, see this FAQ entry (http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient) for more suggestions on how to test your Tor.)

If it's still not working, look at this FAQ entry (http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork) for hints.

(Optional) Step Five: Torrifying access to certain sites

If you only want to hide your identity from certain sites you can tell Privoxy to use Tor for them only.

In Step Two, we configured Privoxy to use Tor for all websites, which will happen whenever the Torbutton is on. If you would rather create a "blacklist" of individual websites to hide your identity from, you can add something like:

forward-socks4a *.google.* 127.0.0.1:9050 .
forward-socks4a *.google-analytics.* 127.0.0.1:9050 .
forward-socks4a *.amazon.* 127.0.0.1:9050 .

to /etc/privoxy/config . Now, whenever Torbutton is on, you will visit the sites in the list above anonymously, and all other sites non-anonymously.

Warning: this provides only a very weak form of anonymity, and might confuse you since Torbutton will be on during non-anonymous browsing. Here's why this is weak. Suppose you visit http://www.bob.com, enter the query 'asdf' at time 04:01:02. When bob.com returns your page, there is a link, which goes to http://www.evilbob.com?q=asdf&t=040102. EvilBob records your IP, your query and the time, redirects your browser to the link you wanted, then shares this information with Bob. Use step 5 at your own risk

Feedback about this guide can be sent to gzaveruc at cs.uwaterloo.ca.