mirror of
https://github.com/vimagick/dockerfiles.git
synced 2024-12-04 10:34:49 +02:00
.. | ||
README.md |
Tor on OpenWrt
Install Tor
$ opkg update
$ opkg install tor
$ vi /etc/tor/torrc
$ vi /etc/config/dhcp
$ vi /etc/firewall.user
$ /etc/init.d/tor restart
$ /etc/init.d/dnsmasq restart
$ /etc/init.d/firewall restart
Config Tor
# /etc/tor/torrc
RunAsDaemon 0
DataDirectory /var/lib/tor
User tor
#Socks5Proxy 127.0.0.1:1080
SocksPort 0.0.0.0:9050
TransPort 0.0.0.0:9040
DNSPort 0.0.0.0:9053
AvoidDiskWrites 1
Socks5 Proxy (optional)
You may need to connect tor network via Socks5Proxy
.
You can use ss-local to setup a local socks5 proxy.
$ wget https://github.com/vimagick/rpi-bin/raw/master/ipk/shadowsocks-libev_2.4.8-3_arm_cortex-a53_neon-vfpv4.ipk
$ opkg install shadowsocks-libev_2.4.8-3_arm_cortex-a53_neon-vfpv4.ipk
$ vi /etc/shadowsocks.json
$ vi /etc/rc.local
$ sh /etc/rc.local
# /etc/rc.local
ss-local -c /etc/shadowsocks.json -f /var/run/ss-local.pid
exit 0
{
"server": "1.2.3.4",
"server_port": 8388,
"local_address": "127.0.0.1",
"local_port": 1080,
"password": "******",
"timeout": 60,
"method": "chacha20",
"auth": true
}
Config DNS
You can config DNS via Luci.
# /etc/config/dhcp
config dnsmasq
option noresolv '1'
list server '127.0.0.1#9053'
Config Firewall
# /etc/firewall.user
iptables -t nat -X TOR
iptables -t nat -N TOR
iptables -t nat -A TOR -d 0.0.0.0/8 -j RETURN
iptables -t nat -A TOR -d 10.0.0.0/8 -j RETURN
iptables -t nat -A TOR -d 127.0.0.0/8 -j RETURN
iptables -t nat -A TOR -d 169.254.0.0/16 -j RETURN
iptables -t nat -A TOR -d 172.16.0.0/12 -j RETURN
iptables -t nat -A TOR -d 192.168.0.0/16 -j RETURN
iptables -t nat -A TOR -d 224.0.0.0/4 -j RETURN
iptables -t nat -A TOR -d 240.0.0.0/4 -j RETURN
iptables -t nat -A TOR -p udp --dport 53 -j REDIRECT --to-ports 9053
iptables -t nat -A TOR -p tcp --syn -j REDIRECT --to-ports 9040
iptables -t nat -A PREROUTING -i br-lan -j TOR
Debug Tor
$ /etc/init.d/tor stop
$ tor
Aug 16 11:49:43.222 [notice] Tor v0.2.7.6 running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2h and Zlib 1.2.8.
Aug 16 11:49:43.223 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Aug 16 11:49:43.223 [notice] Read configuration file "/etc/tor/torrc".
Aug 16 11:49:43.246 [warn] You specified a public address '0.0.0.0:9050' for SocksPort. Other people on the Internet might find your computer and use it as an open proxy. Please don't allow this unless you have a good reason.
Aug 16 11:49:43.246 [warn] You specified a public address '0.0.0.0:9053' for DNSPort. Other people on the Internet might find your computer and use it as an open proxy. Please don't allow this unless you have a good reason.
Aug 16 11:49:43.246 [warn] You specified a public address '0.0.0.0:9040' for TransPort. Other people on the Internet might find your computer and use it as an open proxy. Please don't allow this unless you have a good reason.
Aug 16 11:49:43.251 [notice] Opening Socks listener on 0.0.0.0:9050
Aug 16 11:49:43.251 [notice] Opening DNS listener on 0.0.0.0:9053
Aug 16 11:49:43.251 [notice] Opening Transparent pf/netfilter listener on 0.0.0.0:9040
Aug 16 11:49:44.000 [notice] Bootstrapped 0%: Starting
Aug 16 11:49:46.000 [notice] Bootstrapped 5%: Connecting to directory server
Aug 16 11:49:46.000 [notice] Bootstrapped 80%: Connecting to the Tor network
Aug 16 11:49:46.000 [notice] Bootstrapped 85%: Finishing handshake with first hop
Aug 16 11:49:53.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
Aug 16 11:49:58.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
Aug 16 11:49:58.000 [notice] Bootstrapped 100%: Done
^C
$ /etc/init.d/tor start