Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Container Registry
Model registry
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
The Tor Project
Core
Tor
Commits
16778795
Commit
16778795
authored
21 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
minor fixes; bump to 0.0.2pre10
svn:r551
parent
3d7463d2
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
6
Hide whitespace changes
Inline
Side-by-side
Showing
6 changed files
INSTALL
+21
-2
21 additions, 2 deletions
INSTALL
README
+1
-27
1 addition, 27 deletions
README
configure.in
+1
-1
1 addition, 1 deletion
configure.in
doc/CLIENTS
+5
-5
5 additions, 5 deletions
doc/CLIENTS
src/or/config.c
+2
-2
2 additions, 2 deletions
src/or/config.c
src/or/onion.c
+1
-1
1 addition, 1 deletion
src/or/onion.c
with
31 additions
and
38 deletions
INSTALL
+
21
−
2
View file @
16778795
...
@@ -11,6 +11,8 @@ Quickstart version for users:
...
@@ -11,6 +11,8 @@ Quickstart version for users:
6) point your browser to socks4 or socks5 proxy at localhost port
6) point your browser to socks4 or socks5 proxy at localhost port
9050. In mozilla, this is in edit|preferences|advanced|proxies. This
9050. In mozilla, this is in edit|preferences|advanced|proxies. This
allows you to test to make sure tor is installed correctly.
allows you to test to make sure tor is installed correctly.
(If you have a personal firewall, be sure to allow connections to
localhost port 9050.)
7) make sure you've set it up correctly: go to
7) make sure you've set it up correctly: go to
http://www.junkbusters.com/cgi-bin/privacy and see what IP it says
http://www.junkbusters.com/cgi-bin/privacy and see what IP it says
you're coming from. If it works, you should probably go on to step 8,
you're coming from. If it works, you should probably go on to step 8,
...
@@ -22,6 +24,23 @@ Quickstart version for users:
...
@@ -22,6 +24,23 @@ Quickstart version for users:
no socks proxy). This step will give you good html scrubbing as well.
no socks proxy). This step will give you good html scrubbing as well.
(See doc/CLIENTS for why direct socks gives you less anonymity.)
(See doc/CLIENTS for why direct socks gives you less anonymity.)
If this works for you, you can stop reading. Otherwise, see the README for
*****If this works for you, you can stop reading here******
more details.
If you got the source from cvs:
Run "./autogen.sh", which will run the various auto* programs and then
run ./configure for you. From there, start at step 3 in the quickstart
list above.
If the quickstart doesn't work for you:
If you have problems finding libraries, try
CPPFLAGS="-I/usr/local/include" LDFLAGS="-L/usr/local/lib" \
./configure
rather than simply ./configure.
Check out the list archives at http://archives.seul.org/or/dev/ and see
if somebody else has reported your problem. If not, please subscribe
and let us know what you did to fix it, or give us the details and
we'll see what we can do.
This diff is collapsed.
Click to expand it.
README
+
1
−
27
View file @
16778795
...
@@ -7,7 +7,7 @@ http://archives.seul.org/or/dev/.
...
@@ -7,7 +7,7 @@ http://archives.seul.org/or/dev/.
Is your question in the FAQ? Should it be?
Is your question in the FAQ? Should it be?
**************************************************************************
**************************************************************************
See the INSTALL file for a quickstart. Th
is
is all you will probably need.
See the INSTALL file for a quickstart. Th
at
is all you will probably need.
**************************************************************************
**************************************************************************
**************************************************************************
**************************************************************************
...
@@ -15,32 +15,6 @@ You only need to look beyond this point if the quickstart in the INSTALL
...
@@ -15,32 +15,6 @@ You only need to look beyond this point if the quickstart in the INSTALL
doesn't work for you.
doesn't work for you.
**************************************************************************
**************************************************************************
Dependencies:
For tor itself, you're going to need openssl (0.9.5 or later
-- including the dev stuff and includes). If you're on Linux,
everything will probably work fine. OS X and BSD (but see below under
troubleshooting) may work too. Let us know if you get it working
elsewhere.
If you got the source from cvs:
Run "./autogen.sh", which will run the various auto* programs and then
run ./configure for you. From there, start at step 3 in the quickstart
list above.
If the quickstart doesn't work for you:
If you have problems finding libraries, try
CPPFLAGS="-I/usr/local/include" LDFLAGS="-L/usr/local/lib" \
./configure
rather than simply ./configure.
Check out the list archives at http://archives.seul.org/or/dev/ and see
if somebody else has reported your problem. If not, please subscribe
and let us know what you did to fix it, or give us the details and
we'll see what we can do.
Do you want to run a tor server?
Do you want to run a tor server?
First, set up a config file for your node (start with sample-orrc and
First, set up a config file for your node (start with sample-orrc and
...
...
This diff is collapsed.
Click to expand it.
configure.in
+
1
−
1
View file @
16778795
AC_INIT
AC_INIT
AM_INIT_AUTOMAKE(tor, 0.0.2pre
9
)
AM_INIT_AUTOMAKE(tor, 0.0.2pre
10
)
AM_CONFIG_HEADER(orconfig.h)
AM_CONFIG_HEADER(orconfig.h)
CFLAGS="-Wall -O2 -I/usr/kerberos/include"
CFLAGS="-Wall -O2 -I/usr/kerberos/include"
...
...
This diff is collapsed.
Click to expand it.
doc/CLIENTS
+
5
−
5
View file @
16778795
...
@@ -43,15 +43,15 @@ socks server is a tor process (running either locally or elsewhere).
...
@@ -43,15 +43,15 @@ socks server is a tor process (running either locally or elsewhere).
In general this works quite well for command-line processes like finger,
In general this works quite well for command-line processes like finger,
ssh, etc. But there are a couple of catches: A) tsocks doesn't intercept
ssh, etc. But there are a couple of catches: A) tsocks doesn't intercept
calls to gethostbyname. So unless you specify an IP rather than hostname,
calls to gethostbyname. So unless you specify an IP rather than hostname,
you'll be giving yourself away. B) Programs which are suid
root (or
you'll be giving yourself away. B) Programs which are suid
don't let you
anybody else) don't let you
intercept the system calls -- ssh falls into
intercept the system calls -- ssh falls into
this category. But you can
this category. But you can
make a local copy of ssh and use that. C)
make a local copy of ssh and use that. C)
Probably tsocks doesn't behave
Probably tsocks doesn't behave
well for behemoths like Mozilla.
well for behemoths like Mozilla.
Part three: applications which support tor correctly
Part three: applications which support tor correctly
http: Mozilla: set your socks4 proxy to be the onion proxy
http: Mozilla: set your socks4 proxy to be the onion proxy
(but see above)
privoxy: set your socks4a proxy to be the onion proxy
privoxy: set your socks4a proxy to be the onion proxy
ssh: tsocks ssh arma@18.244.0.188
ssh: tsocks ssh arma@18.244.0.188
ftp: tsocks wget ftp://18.244.0.188/quux.tar --passive
ftp: tsocks wget ftp://18.244.0.188/quux.tar --passive
...
...
This diff is collapsed.
Click to expand it.
src/or/config.c
+
2
−
2
View file @
16778795
...
@@ -197,7 +197,7 @@ int getconfig(int argc, char **argv, or_options_t *options) {
...
@@ -197,7 +197,7 @@ int getconfig(int argc, char **argv, or_options_t *options) {
/* give reasonable values for each option. Defaults to zero. */
/* give reasonable values for each option. Defaults to zero. */
memset
(
options
,
0
,
sizeof
(
or_options_t
));
memset
(
options
,
0
,
sizeof
(
or_options_t
));
options
->
LogLevel
=
"
debug
"
;
options
->
LogLevel
=
"
info
"
;
options
->
loglevel
=
LOG_DEBUG
;
options
->
loglevel
=
LOG_DEBUG
;
options
->
DataDirectory
=
NULL
;
options
->
DataDirectory
=
NULL
;
options
->
CoinWeight
=
0
.
1
;
options
->
CoinWeight
=
0
.
1
;
...
@@ -243,7 +243,7 @@ int getconfig(int argc, char **argv, or_options_t *options) {
...
@@ -243,7 +243,7 @@ int getconfig(int argc, char **argv, or_options_t *options) {
if
(
options
->
LogLevel
)
{
if
(
options
->
LogLevel
)
{
if
(
!
strcmp
(
options
->
LogLevel
,
"err"
))
if
(
!
strcmp
(
options
->
LogLevel
,
"err"
))
options
->
loglevel
=
LOG_ERR
;
options
->
loglevel
=
LOG_ERR
;
else
if
(
!
strcmp
(
options
->
LogLevel
,
"warn
ing"
))
else
if
(
!
str
n
cmp
(
options
->
LogLevel
,
"warn
"
,
4
))
options
->
loglevel
=
LOG_WARNING
;
options
->
loglevel
=
LOG_WARNING
;
else
if
(
!
strcmp
(
options
->
LogLevel
,
"info"
))
else
if
(
!
strcmp
(
options
->
LogLevel
,
"info"
))
options
->
loglevel
=
LOG_INFO
;
options
->
loglevel
=
LOG_INFO
;
...
...
This diff is collapsed.
Click to expand it.
src/or/onion.c
+
1
−
1
View file @
16778795
...
@@ -220,7 +220,7 @@ static unsigned int *new_route(double cw, routerinfo_t **rarray, int rarray_len,
...
@@ -220,7 +220,7 @@ static unsigned int *new_route(double cw, routerinfo_t **rarray, int rarray_len,
oldchoice
=
rarray_len
;
oldchoice
=
rarray_len
;
for
(
i
=
0
;
i
<*
routelen
;
i
++
)
{
for
(
i
=
0
;
i
<*
routelen
;
i
++
)
{
log_fn
(
LOG_DEBUG
,
"Choosing hop %u."
,
i
);
//
log_fn(LOG_DEBUG,"Choosing hop %u.",i);
if
(
CRYPTO_PSEUDO_RAND_INT
(
choice
))
{
if
(
CRYPTO_PSEUDO_RAND_INT
(
choice
))
{
free
((
void
*
)
route
);
free
((
void
*
)
route
);
return
NULL
;
return
NULL
;
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment