Transparent proxy trough Tor for Arch Linux OS
Branch: master
Clone or download
brainfucksec
brainfucksec Update README
Latest commit f5a75f8 Feb 11, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
data v1.15.0 - 2018-09-06 21:41:47 Sep 6, 2018
CHANGELOG v1.17.1 - little fixes Feb 4, 2019
LICENSE GPLv3 Mar 20, 2016
Makefile v1.17.1 - little fixes Feb 4, 2019
README.md Update README Feb 11, 2019
archtorify.sh v1.17.1 - little fixes Feb 4, 2019

README.md

archtorify

About archtorify

archtorify is a shell script for Arch Linux which use iptables settings to create a transparent proxy through TorNetwork, the program also allows you to perform various checks like checking the Tor Exit Node (i.e. your public IP when you are under Tor proxy) or if Tor has been configured correctly.

What is Transparent Proxy through Tor?

Transparent proxy is an intermediary system that sit between a user and a content provider. When a user makes a request to a web server, the transparent proxy intercepts the request to perform various actions including caching, redirection and authentication.

alt text

Transparent proxy via Tor means that every network application will make its TCP connections through Tor; no application will be able to reveal your IP address by connecting directly. In simple terms, with archtorify you can redirect all traffic of your Arch Linux operating system through the Tor Network.

In the Tor project wiki you find an explanation of what is the "Transparent Proxy through Tor" and related settings. you should read it.

Recommendations and security considerations

archtorify is produced independently from the Tor anonimity software and carries no guarantee from the Tor Project about quality, suitability or anything else, please read these documents to know how to use the Tor network safely:

Tor General FAQ

Whonix Do Not recommendations

archtorify provides transparent proxy management on Tor but does not provide 100% anonimity.

From Arch Linux Wiki about Transparent Torification: Using iptables to transparently torify a system affords comparatively strong leak protection, but it is not a substitute for virtualized torification applications such as Whonix, or TorVM. Applications can still learn your computer's hostname, MAC address, serial number, timezone, etc. and those with root privileges can disable the firewall entirely. In other words, transparent torification with iptables protects against accidental connections and DNS leaks by misconfigured software, it is not sufficient to protect against malware or software with serious security vulnerabilities.

For this, you should change at least the hostname and the MAC address:

Setting the Hostname on Arch Linux

Changing MAC Address on Linux

Arch Linux is a user-centric distribution, for this, configuration of transparent proxy strongly depends on your network settings.

Before starting the program make sure you have read the Arch Linux wiki pages about Tor and network configuration

Install

Install dependencies:

sudo pacman -Syu

sudo pacman -S tor

Install Package from AUR:

AUR: archtorify-git

Manual installation:

git clone https://github.com/brainfucksec/archtorify

cd archtorify/

sudo make install

sudo reboot

Usage

archtorify [option]

Options:

-t, --tor

start transparent proxy through tor

-c, --clearnet

reset iptables and return to clearnet navigation

-s, --status

check status of program and services

-i, --ipinfo

show public IP

-r, --restart

restart tor service and change IP

Thanks

Support archtorify

Please consider donating to sustain this project

BITCOIN: 1B39SnAXcR2bkxNpNy3AuckgaTshqNc2ce