-
Notifications
You must be signed in to change notification settings - Fork 22
Security
Archtorify is produced independently from the Tor anonimity software and carries no guarantee from the Tor Project about quality, suitability or anything else, please read these documents to know how to use the Tor network safely:
Archtorify provides transparent proxy management on Tor but does not provide 100% anonimity.
From Arch Linux Wiki about Transparent Torification: Using iptables to transparently torify a system affords comparatively strong leak protection, but it is not a substitute for virtualized torification applications such as Whonix, or TorVM. Applications can still learn your computer's hostname, MAC address, serial number, timezone, etc. and those with root privileges can disable the firewall entirely. In other words, transparent torification with iptables protects against accidental connections and DNS leaks by misconfigured software, it is not sufficient to protect against malware or software with serious security vulnerabilities.
For this, you should change at least the hostname and the MAC address:
Setting the Hostname on Arch Linux
Arch Linux is a user-centric distribution, for this, configuration of transparent proxy strongly depends on your network settings.
Before starting the program make sure you have read the Arch Linux wiki pages about Tor and network configuration
After starting archtorify you can use tcpdump to check if there are any internet activity other the Tor:
First, get your network interface:
ip -o addr
or
tcpdump -D
We'll assume its enp0s3
.
Next you need to identify the Tor guard IP, you can use ss
, netstat
or GETINFO entry-guards
through the tor controller to identify the guard IP.
Example with ss
:
ss -ntp | grep $(cat /var/run/tor/tor.pid)
With the interface and guard IP at hand, we can now use tcpdump
to check for possible non-tor leaks. Replace IP.TO.TOR.GUARD with the IP you got from the ss
output.
tcpdump -n -f -p -i eth0 not arp and not host IP.TO.TOR.GUARD
You are not supposed to see any output other than the first two header lines. You can remove and not host IP
to see how it would look like otherwise.