Advertisement
Narzew

BHStyle - Tor Only Environment

Nov 5th, 2014
369
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.42 KB | None | 0 0
  1. Up until now, we have been using our Virtual Machine to access the internet directly. This was necessary so that we could install updates, software, and get a feel for how to use Ubuntu.
  2. Now it is time to force Ubuntu to connect to the internet using TOR Only. At the end of this phase, your Ubuntu virtual machine will be usable as a secure and anonymous TOR based browsing environment.
  3. It will be *impossible* for you to access the internet except through TOR, and therefore you can rest assured that anything at all you do online through the Ubuntu virtual machine will be through TOR.
  4. First, we need to shut down any running virtual machines. If "Primary" is running, click the 'X' in the top right to close it. Select "Send shutdown signal" and then select "Shut Down" when prompted. If "Firewall" is running, go ahead and close it in the same way, but choose "Power off".
  5. After a minute or so, you should be back to your VirtualBox Manager, with neither virtual machine running.
  6. 1. Right click on "Primary, Powered Off" and go to "Settings"
  7. 2. Select "Network" from the menu on the left.
  8. 3. Next to "Attached to" is a pull down menu. Right now it is set to "NAT". Choose "Internal Network" and click "Ok"
  9. 4. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.
  10. 5. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.
  11. 6. Right click "Firewall" and click "Start"
  12. Now your Firewall will be resumed exactly where it had been previously set up. The last command entered should s
  13. Before you proceed, make sure that TOR is running on your main Windows computer. If it is, you will see an "Onion" icon visible in your task bar. Click on that icon and you should see the "Vidalia Control Panel". Make sure that it says "Connected to the TOR Network".
  14. If so, you are ready to proceed. If not then please see section 2 : "Using and Testing Tor Browser for the first time" to re-start TOR. Once TOR is running, proceed.
  15. Let's restart Ubuntu:
  16. 7. Right click "Primary" and click Start. Log in as normal.
  17. 8. After fully logged in, open "Firefox" by clicking the orange "Firefox" logo at the top, next to "System".
  18. 9. Try to go to any website, such as http://www.google.com. Try at least 3-5 different websites. You should not be able to connect to any of them.
  19. Note: If you attempt to go to websites you have already been to using Ubuntu, they may appear to load because they are cached.
  20. 10. In Firefox on Ubuntu, go to "Edit" and "Preferences"
  21. 11. Click on the "Advanced" icon
  22. 12. Click on the "Network" tab
  23. 13. Under "Connection" it says "Configure how Firefox connects to the internet". To the right of that is a "Settings" button. Click that button.
  24. 14. Select "Manual proxy configuration"
  25. 15. Next to both "HTTP Proxy" and "SSL Proxy" type in: 127.0.0.1
  26. 16. Set the port to 8118 for both "HTTP Proxy" and "SSL Proxy"
  27. 17. Next to "SOCKS Host" type: 127.0.0.1
  28. 18. Set the port for "SOCKS Host" to 9050
  29. 19. Make sure that "SOCKS v5" is selected at the bottom.
  30. 20. Click "Ok" and then "Close"
  31. Now we have instructed Firefox to use TOR. However, Firefox cannot use TOR yet. Right now, Ubuntu is completely unable to connect to the Internet. We
  32. are going to change that.
  33. 21. Go to "Applications" -> "Accessories" -> "Terminal"
  34. 22. Type in: sudo bash (and hit enter)
  35. 23. Type in your password if prompted.
  36. 24. Type in the following commands exactly as shown below (or copy paste them):
  37. ifconfig eth0 10.0.3.2
  38. /etc/init.d/polipo stop
  39. /etc/init.d/tor stop
  40. /etc/init.d/privoxy stop
  41. (Note: the last three commands, those beginning with /etc/ are only necessary if you installed Torchat)
  42. Now you have told your Ubuntu machine to join the same network that your Firewall is on. Now we can establish a tunnel for TOR data to flow from our Ubuntu machine, through the Firewall, into your Windows guest machine. We need to establish two such tunne
  43. The first tunnel for port 9050 data, and the second tunnel for port 8118 data. When these two tunnels are set up, it will be possible for you to use your Ubuntu machine to access any website using TOR. Further, it is still completely impossible for your Ubuntu machine to access the Internet in any other way.
  44. 25. Your terminal window should still be open. Type in the following command exactly as shown (or copy paste it):
  45. ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.1
  46. 26. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not your Ubuntu password.
  47. After you hit enter, you will see the cursor go to a blank line and nothing else happens. This simply means the connection you requested is active. If the connection were to stop for any reason, you would return to a command prompt. If you want to termina
  48. 27. Now we are going to open the second tunnel. In your terminal window, go to "File" and "Open Tab". This will open up a tab for a second terminal without affecting the first.
  49. 28. Now, type exactly as shown below to open the second tunnel:
  50. ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.1
  51. 29. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.
  52. 30. Go to the URL: http://check.torproject.org
  53. If you see the text: "Congratulations. Your browser is configured to use Tor" then you are all set! Your Ubuntu virtual machine is now NOT connected to the internet in any way. However, you can browse any website using TOR, even Youtube.
  54. You do not have to be afraid of javascript or Flash. Any files you save onto your virtual machine will automatically be saved in the encrypted truecrypt volume you set up earlier. In fact, everything the virtual machine does will be contained within that
  55. Further, even if someone somehow managed to remotely gain full root access to your Ubuntu machine (absurdly unlikely to happen), they would still not be able to see *anything* about who you are, or what your real IP address is, or even that you are using a Virtual Machine.
  56. To them, it would appear that the Ubuntu machine is your main computer. They would be totally unable to compromise your identity based on this alone.
  57. However, keep the following in mind. If someone were to gain access to your Ubuntu machine, they WOULD be able to see anything you have used it for or any files you have saved. Therefore, I recommend for the sake of absolute security, do not store anything on your Ubuntu virtual machine that identifies you.
  58. This is just a precaution. It is virtually impossible that someone would manage to remotely gain access to your Ubuntu machine.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement