The recommended way to run tor is to use it in combination with privoxy. The benefit of this combination is that not only do you get a degree of anonymity when browsing the web on the tor network, you can enjoy an ad free experience as well with privoxy.
1. Download the privoxy RPM from ftp://ftp.muug.mb.ca/mirror/fedoralegacy/fedora/1/updates/i386/privoxy-3.0.3-1.i386.rpm . As of this writing privoxy 3.0.6 is the latest stable version, but we'll use the stable 3.0.3 RPM for Fedora Core 1.
2. Download the latest tor Red Hat RPM from http://tor.eff.org/download-unix.html.en . Currently tor is at version 0.1.2.17.
3. Download the libevent RPM from the Dag repository. Tor 0.1.1.26 requires libevent 1.2, so look for libevent-1.2-1.el4.rf.i386.rpm. http://dag.wieers.com/packages/libevent/
4. Put all of the RPMs into an empty directory, cd into the directory and run
- Code: Tout sélectionner
yum localinstall *.rpm
5. This howto assumes you will NOT be running a tor server; that is, configuring your server to be a middleman or exit node on the tor network. If you don't know what this means, don't worry. Some of the following instructions were taken from here: http://tor.eff.org/docs/tor-doc-unix.html.en.
Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out the following two lines by inserting a # before the line. In section 1.5 comment out the line
logfile logfile
and in section 1.6 comment out the line
jarfile jarfile
6. The instructions on the Tor page assume that we're installing tor on the same machine we use for web browsing. In our case, we're installing it on our SME server for use by the whole network. So we need to modify the listen address. Find section 4.1 in the privoxy config file and change the listen-address line to, assuming your server's internal IP is 192.168.1.1, this:
listen-address 127.0.0.1:8118
Then scroll down to section 5.2 and add the line
forward-socks4a / localhost:9050 .
at the bottom of the section. Don't forget to add the dot at the end.
Save /etc/privoxy/config .
7. Now we need to make some changes to SME so that tor and privoxy run automatically at startup. From the command line:
- Code: Tout sélectionner
config set privoxy service status enabled
config set tor service status enabled
then
- Code: Tout sélectionner
ln -s /etc/rc.d/init.d/e-smith-service /etc/rc7.d/S84privoxy
ln -s /etc/rc.d/init.d/e-smith-service /etc/rc7.d/S90tor
8. Then we reboot the server like this:
- Code: Tout sélectionner
signal-event post-upgrade; signal-event reboot
Ensuite pour que Squid renvoie automatiquement vers Privoxy, ce que le site ne dit pas :
- Code: Tout sélectionner
db configuration set SquidParent 127.0.0.1
db configuration set SquidParentPort 8118
signal-event proxy-update
Comme ça c'est transparent pour les utilisateurs
Attention Tor peut beaucoup ralentir la navigation, si vous ne voulez plus l'utilisez commenter la ligne dans privoxy concernant les socks4, et arretez le service TOR, Privoxy continuera de fonctionner et suel bonheur toutes ces pubs en moins
Pour configurer plus en avant Privoxy, allez à l'url : http://config.privoy.org