From: Roger Dingledine Date: Sat, 18 Dec 2004 16:49:21 +0000 (+0000) Subject: a first cut of win32 specific doc X-Git-Tag: debian-version-0.0.9.2-1~74 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=e21fdcb7b0421ba760a91b76160c6442948b9e9f;p=thirdparty%2Ftor.git a first cut of win32 specific doc svn:r3174 --- diff --git a/doc/tor-doc-win32.html b/doc/tor-doc-win32.html new file mode 100644 index 0000000000..674c446ac5 --- /dev/null +++ b/doc/tor-doc-win32.html @@ -0,0 +1,115 @@ + + +Tor: an anonymizing overlay network for TCP + + + + + + + + +

Tor for Win32

+ + +

Installing Tor

+ +

You can get the latest releases here. Look for the highest +version (most recent date) that includes "-win32.exe". +

+ +

Our Tor installer should make everything pretty simple: +

+ +[screenshot for Tor installer that looks comforting] + +

It will run Tor in a dos window so you can see its logs and +errors. (You can minimize this window, but do not close it.) +

+ +tor window screenshot + +

Tor comes configured as a client by default. It uses a built-in +default configuration file, and most people won't need to change any of +the settings.

+ +

After installing Tor, you should install privoxy, which is a filtering web proxy +that integrates well with Tor. Privoxy will appear in your system tray: +

+ +privoxy icon in the system tray + +

You need to configure Privoxy to use Tor. Open Privoxy's main config file:

+ +editing privoxy config + +

Add the line
+forward-socks4a / localhost:9050 .
+(don't forget the dot) to privoxy's config file (you can just add it to the +top):

+ +privoxy points to tor + +

Then change your browser to http proxy at localhost port 8118. +In Mozilla, this is in Edit|Preferences|Advanced|Proxies. In IE, it's +Tools|Internet Options|Connections|LAN Settings|Advanced. +You should also set your SSL proxy (IE calls it "Secure") to the same +thing, to hide your SSL traffic:

+ +privoxy points to tor +privoxy points to tor + +

Using privoxy is necessary because Mozilla leaks your +DNS requests when it uses a socks proxy directly. Privoxy also gives +you good html scrubbing.

+ +

To test if it's working, go to http://www.junkbusters.com/cgi-bin/privacy +and see what IP it says you're coming from. +

+ +

+If you have a personal firewall, be sure to allow local connections to +port 8118 and port 9050. If your firewall blocks outgoing connections, +punch a hole so it can connect to TCP ports 80, 443, and 9001-9033. +For more troubleshooting suggestions, see the FAQ. +

+ +

To Torify an application that supports http, just point it at +Privoxy. To use socks directly, point it at localhost port 9050. For +applications that support neither socks nor http, take a look at either SocksCap +or the Hummingbird +SOCKS client. Let us know if you get them working so we can add better +instructions here.

+ + +

Configuring a hidden service

+ +

Tor allows clients and servers to offer hidden services. That +is, you can offer an apache, sshd, etc, without revealing your IP to its +users. This works via Tor's rendezvous point design: both sides build +a Tor circuit out, and they meet in the middle.

+ +

Once you've installed Tor and Privoxy, you can go to the hidden wiki to see +hidden services in action.

+ +

To set up a hidden service, edit your torrc:

+ +[screenshot here of clicking on tor|torrc] + +

Edit the middle part to enable your service. Then restart Tor. It will +create each HiddenServiceDir you have configured, and it will create a +'hostname' file which specifies the url (xyz.onion) for that service. You +can tell people the url, and they can connect to it via their Tor client, +assuming they're also using Tor and Privoxy.

+ + + +