Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor.
Tor runs your traffic through 3 hops and multiple nodes to mask your IP via their onion-routing system. But, let's face it, Tor is slow. Having that many hops makes our ping delay increase dramatically. Moxie Marlinspike has created a nifty little tool that can send your traffic through a single Tor exit node called Tortunnel. Tortunnel is a partial onion proxy implementation that's designed to build single-hop circuits through Tor exit nodes. This is useful in cases where you might want a very low level of anonymity, and don't want to deal with the performance implications of using Tor's full three-hop circuits.
In this Null Byte, we are going to set up Tortunnel to push our traffic through, giving ourselves a light layer of anonymity and protection.
- Root privelages
Let's get started!
Step 1 Download & Install Tortunnel
All writing in bold means it is intended to be entered in a terminal emulator.
Let's start by downloading and configuring our Tortunnel software.
- Download Totunnel from its official mirror:
- Extract the archive:
tar zxvf tortunnel-0.3.tar.gz
- Change to the new directory:
- Configure the files:
- Compile and install the program:
sudo make && sudo make install
Step 2 Set Up Our Tunnel
Now let's set up our Tortunnel to be ready to have traffic run through it.
- Let's put a SOCKS interface on localhost port 5060:
torproxy -p 5060 -r
- That's all you need to do, but if you have a specific exit node you want to tunnel through, use this:
torproxy -p 5060 -n <ip of exit node>
- Open your browser (or another internet program) and change your network/proxy settings to: