Customize

How to setup a Tor relay or Tor bridge

Discussion in 'Keeping Your Anonymity In Iran' started by DanX, Jun 18, 2009.

  1. DanX Member

    How to setup a Tor relay or Tor bridge

    What is Tor? (from https://www.torproject.org/)

    Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

    This is something of great value to our friends in Iran.

    Get Tor
    (all found at https://www.torproject.org/easy-download.html.en)

    Os X: https://www.torproject.org/dist/vidalia-bundles/vidalia-bundle-0.2.0.34-0.1.10-universal.dmg
    Windows: https://www.torproject.org/dist/vidalia-bundles/vidalia-bundle-0.2.0.34-0.1.10.exe
    Linux/Unix/src: https://www.torproject.org/download-unix.html.en

    and install (detailed instructions Windows, Os X) (short version: double click install file)

    Relay or Bridge?

    A relay will be a proxy in the Tor network and help speed up the network for the people using it a bridge, on the other hand, will enable people to reach the Tor network if the relays are blacklisted. If you setup a bridge, you will need to get its address to the people that are going to use it (more on that later. Short: do not post it publicly).

    IMPORTANT: Were going to need both sorts (mostly relays though), so please answer the poll (at the end) on which type youve set up. And if the type doesnt matter to you, please check the poll to see how others have chosen and balance it up.

    Relay:
    (from https://www.torproject.org/docs/tor-doc-relay.html.en#setup)

    * Right click on the Vidalia icon in your task bar. Choose Control Panel.
    * Click Setup Relaying.
    * Choose Relay Traffic for the Tor network.
    * Enter a nickname for your relay. (Optional, enter contact information.)
    * Change ports from the default ports (needs to be >1024 on Os X and Linux/Unix)
    * If you have UPnP: Choose Attempt to automatically configure port forwarding. Push the Test button to see if it works. If it does work, great. If not, see Firewall/router below.
    * Choose the Bandwidth Limits tab. Select how much bandwidth you want to provide for Tor users like yourself.
    * Choose the Exit Policies tab. If you want to allow others to use your relay for these services, dont change anything. Un-check the services you dont want to allow through your relay. If you want to be a non-exit relay, un-check all services.
    * Click the Ok button. See Check if it works below for confirmation that the relay is working correctly.

    Firewall/Router:
    If you are using a firewall, open a hole in your firewall/router so incoming connections can reach the ports you configured (Relay Port (plus Directory Port if you enabled it)). Make sure you allow all outgoing connections, so your relay can reach the other Tor relays.

    Check if it works:
    Restart your relay. If it logs any warnings, address them.

    As soon as your relay manages to connect to the network, it will try to determine whether the ports you configured are reachable from the outside. This may take up to 20 minutes. Look for a log entry like Self-testing indicates your ORPort is reachable from the outside. Excellent. If you dont see this message, it means that your relay is not reachable from the outside you should re-check your firewalls, check that its testing the IP and port you think it should be testing, etc.

    And now what?
    Well, congratulations, this is it. People can now surf the internet without fear of filtering/blocking or surveillance. Collect your karma points and continue following https://twitter.com/#search?q=#IranElection or http://www.huffingtonpost.com/2009/06/13/iran-demonstrations-viole_n_215189.html

    Bridge:

    * Right click on the Vidalia icon in your task bar. Choose Control Panel.
    * Click Setup Relaying.
    * Click Help censored users reach the Tor network
    * Enter a nickname for your relay. (Optional, enter contact information.)
    * Change ports from the default ports (needs to be >1024 on Os X and Linux/Unix)
    * If you have UPnP: Choose Attempt to automatically configure port forwarding. Push the Test button to see if it works. If it does work, great. If not, see Firewall/router below.
    * Choose the Bandwidth Limits tab. Select how much bandwidth you want to provide for Tor users like yourself.
    * Click the Ok button. See Check if it works below for confirmation that the bridge is working correctly.

    Firewall/Router:
    If you are using a firewall, open a hole in your firewall/router so incoming connections can reach the ports you configured (Relay Port (plus Directory Port if you enabled it)). Make sure you allow all outgoing connections, so your relay can reach the other Tor relays.

    Check if it works:
    Restart your bridge. If it logs any warnings, address them.

    As soon as your bridge manages to connect to the network, it will try to determine whether the ports you configured are reachable from the outside. This may take up to 20 minutes. Look for a log entry like Self-testing indicates your ORPort is reachable from the outside. Excellent. If you dont see this message, it means that your relay is not reachable from the outside you should re-check your firewalls, check that its testing the IP and port you think it should be testing, etc.

    Get that address to those that need it (IMPORTANT)
    Your bridge address is not posted publicly, you need to get it to those that need it. DirectMessage (in Twitter) or email @austinheap (me@austinheap.com), @protesterhelp (protesterhelp@gmail.com), @persiankiwi, @stopahmadi or @iran09

    And now what?
    Well, congratulations, this is it. People can now surf the internet without fear of filtering/blocking or surveillance. Collect your karma points and continue following https://twitter.com/#search?q=#IranElection or http://www.huffingtonpost.com/2009/06/13/iran-demonstrations-viole_n_215189.html
  2. echo-IRAN Member

    Bumping myself. TOR relay is installed and setup by a few clicks. Same forum here:
    Point and click instructions in pictures.

    I suppose no bridges unless you know somebody ask for it, otherwise you can be an exit node that is more useful.
  3. I believe a bridge can also be used for exit policies. Here's what I got (I haven't tested yet though, but it comes up on that port):

    Code:
    ################ This section is just for bridge relays ##############
    #
    ## Bridge relays (or "bridges" ) are Tor relays that aren't listed in the
    ## main directory. Since there is no complete public list of them, even if an
    ## ISP is filtering connections to all the known Tor relays, they probably
    ## won't be able to block all the bridges. Unlike running an exit relay,
    ## running a bridge relay just passes data to and from the Tor network --
    ## so it shouldn't expose the operator to abuse complaints.
    
    ORPort 443
    BridgeRelay 1
    RelayBandwidthRate 500KBytes
    ExitPolicy accept *:*
    
  4. echo-IRAN Member

    The reason I think that is because Vidalia grey out the exit options when a bridge is selected. You can see on one of the TOR status sites whether your node is listed as exit node (after some delay).
  5. Caden34 Member

    I was looking at the config file for Privoxy. It doesn't seem to restrict the allowed inbound IP addresses to Iran. Can you post an updated config file that restricts access?
    Also, the proxy port seems to be 8118. Can you just confirm that?
  6. fuperizator Member

    I started a Tor relay in June 2009 to let people from Iran get out of the country safely. I know that anybody can use it but I guess that it is really useful for people who are threatened by their government, including Iranians.
    It is still running... :) 1.30 TiB per month. My subscription doesn't allow me to provide higher bandwidth but I would like to provide more. Maybe I'll double it someday.

    I just hope it is not mostly used for P2P and Usenet binary downloads :)

    When I run a "grep "Bandwidth soft limit reached\|Hibernation period ended" /var/log/tor/log" I get this:
    Mar 11 00:00:59.402 [notice] Hibernation period ended. Resuming normal activity.
    Mar 11 05:47:27.000 [notice] Bandwidth soft limit reached; commencing hibernation.

    The allowed bandwidth of the day is consumed 6 hours after resuming hibernation. Incredible ! And it does let me think that it proves so useful for all those people in need of privacy.

    vnstat is useful to monitor the bandwidth used and this is what I use to get basic statistics about traffic.
    # vnstat --days
    month rx | tx | total
    -------------------------+--------------+--------------------------------------
    ...
    11.03. 21.22 GiB | 21.56 GiB | 42.78 GiB

    To all Tor hosters, keep up the good work !
  7. ICE/Tor Hazards

    I got raided by ICE for running a Tor Exit Node. Of course, they didn't find anything illegal. Instead of caving in to the Federal pigs, I have since setup nearly a dozen new exit nodes.

    I wish someone could write a worm that would create Tor Exit nodes automatically (you would think spammers would have jumped all over this by now).
  8. That would include hacking router and forwarding the ports.
  9. This caek is a lie. A big fat fucking lie.
    What you are asking by what you think is a cute method is for someone to actually write a work for you, or give you a version of one that would do what you want.

    Not our first rodeo dickhead.
  10. ICE wouldn't raid for that either caek lie caek lie.

Share This Page

Customize Theme Colors

Close

Choose a color via Color picker or click the predefined style names!

Primary Color :

Secondary Color :
Predefined Skins