Surely on more than one occasion you have heard about TOR since it is the perfect way to navigate and browse the Deep web.. With this software, Internet traffic is redirected through a network of servers or nodes created by volunteers and distributed all over the world in such a way that the anonymous browsing of the user himself is guaranteed while his location is hidden since, thanks This method makes it extremely difficult to track a user across the entire network.
If you are a TOR lover and you want to help the service to make it bigger and bigger, today I want to show you how to configure a Raspberry Pi to serve as a node within the network. If you are interested, tell you that, as previous steps, it is necessary to have at your disposal a Raspberry Pi (obviously), a power supply to be able to introduce electricity into the Raspberry Pi, a network cable, internet and an SD card with the software Raspbian already installed on the card.
Table of Contents
If you are an advanced unix user, you will surely know that it is not recommended to work as a user at all times «broken»Or super administrator, because of this we are going to carry out the following steps.
- We open a terminal and write the following orders.
apt-get install sudo
With these simple commands we create a user «Thu»And we set a password«Passwd«, Change this word for a much safer one, I recommend you at least 8 digits where you mix letters, numbers and some special character.
Once this step is done, we add the user account to the sweat list:
We add these lines.
Tor ALL = (ALL) ALL
Finally we finish this first step with an update of security patches and possible pending updates of the platform. This step must be done very regularly. Keep that in mind!
sudo update apt-get
sudo apt-get upgrade
Once we have made all the basic configuration and the user with whom we will work created, it is time to configure the network interface. For this we open a terminal again and write this command:
With this we will get the system to respond to us with the current configuration of our network. In my case something like this:
eth0 Link encap: Ethernet HWaddr 00:23:54:40:66:df inet addr:192.168.0.20 Bcast:192.168.0.255 Mask:255.255.255.0
Copy on a piece of paper two pieces of information from this query, inet addr y mask as we will need them later. Next we write:
sudo nano /etc/network/interfaces
In the response we must look for a line that looks like the following:
iface eth0 inet dhcp
As you can see, our Raspberry Pi gets its IP address from the local DHCP server. If we want a static IP we must make a few changes and leave the file as follows:
del iface eth0 inet static
TOR installation and configuration
This is one of the most important and easiest steps of this entire mini-tutorial. We begin:
sudo apt-get install tor
To carry out this step, bear in mind that you must be connected to the internet. The download and installation will start automatically, so this step will take you some time, it all depends on the speed of the network. Once this step is done, it is time to configure TOR, for this we must modify a file that is at the address / etc / tor / torrc and add or modify these lines:
Log notice file /var/log/tor/notices.log
ExitPolicy reject *:*
Nickname xxx (sustituye xxx por el nombre de usuario que quieras)
RelayBandwidthRate 100 KB # Throttle traffic to 100KB/s (800Kbps)
RelayBnadwidthBurst 200 KB # But allow bursts up to 200KB/s (1600Kbps)
Possible problems with the firewall
As with any server connected to the network, you can have problems with your firewall. To allow other nodes on the TOR network to contact your new server you must open ports 9030 and 9001. These directories have a very specific use since, for example, port 9030 is for the directory service while 9001 is for the operation of the server itself. To do this there are many tutorials on the net that tell you how to do it depending on your break and system.
We start the TOR server
After all the changes made in the system arrives element of restart TOR. For this, write the following line in a terminal:
sudo /etc/init.d/tor restart
With this TOR command you will restart the system and, if everything went well, when you open the log file:
you must find one entry similar to this:
Jul 24 22:59:21.104 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
With this already we would have our TOR node fully operational and working correctly. In order to browse the TOR network, you must install a TOR client that will be in charge of making you able to browse the TOR network completely anonymously.