As of version 0.2.2.1-alpha, Tor supports making its connections through a SOCKS 4 or 5 server. Some SSH clients can set up a SOCKS listener to perform dynamic port forwarding. This means that you might be able to get Tor to connect through your shell account, which could be useful if your ISP blocks Tor traffic in some way.
== Requirements ==
## Requirements
* Tor >= 0.2.2.1-alpha
* A shell account that supports port forwarding.
...
...
@@ -10,29 +10,29 @@ As of version 0.2.2.1-alpha, Tor supports making its connections through a SOCKS
Note: Some shell providers may disable port forwarding.
Note: You will need a secure browser to use with Tor to prevent Fingerprinting and attacks. See [https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers TorifyHOWTO/WebBrowsers] for instructions how Tor Browser can be used separately with custom proxy settings, without the bundled Tor/Vidalia.
Note: You will need a secure browser to use with Tor to prevent Fingerprinting and attacks. See [TorifyHOWTO/WebBrowsers](https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers) for instructions how Tor Browser can be used separately with custom proxy settings, without the bundled Tor/Vidalia.
== Using OpenSSH ==
## Using OpenSSH
The OpenSSH client available on most Unix systems supports dynamic port forwarding with the '''-D''' switch.
The OpenSSH client available on most Unix systems supports dynamic port forwarding with the **-D** switch.
This command will place SSH in the background while it listens for SOCKS requests on port 1080.
{{{
```
$ ssh -fN -D 1080 you@yourshell.net
}}}
```
== Using PuTTY on Windows ==
## Using PuTTY on Windows
To make PuTTY open a SOCKS listener on port 1080, do the following: