Silk Road forums
Discussion => Security => Topic started by: bbatbbright on May 30, 2012, 09:48 am
-
Hey guys,
I have come so far and it's killing me!... I want Ubuntu to connect to Tor only through a firewall (using a Oracle VM) after setting up and then doing the following as instructed (in short) -
1.Start TorBrowser Bundle.
2. Click "Firewall" to highlight it, and then click on "Snapshots (1)" in the top right.
3. Right click on "Snapshot 1" and then select "Restore Snapshot". Select "Restore" if prompted.
4. Right click "Firewall" and click "Start"
5. Right click "Primary" and click Start. Log in as normal.
6. Go to "Applications" -> "Accessories" -> "Terminal"
7. Type in: sudo bash (and hit enter)
8. Type in the following commands exactly as shown below (or copy paste them):
ifconfig eth0 10.0.3.2
9. Your terminal window should still be open. Type in the following command exactly as shown (or copy paste it):
ssh -N -L 9050:10.0.2.2:9050 root@10.0.3.1
10. Type "yes" if prompted. When prompted for the password, give your Firewall password. Not your Ubuntu password.
11. In your terminal window, go to "File" and "Open Tab".
12. Now, type exactly as shown below to open the second tunnel:
ssh -N -L 8118:10.0.2.2:8118 root@10.0.3.1
13. Return to Firefox. Go to the "File" menu and uncheck "Work Offline" if it is checked.
14. Go to the URL: http://check.torproject.org
I then get the following error while trying to go to the above URL in Firefox
The connection was reset
The connection to the server was reset while the page was loading.
The site could be temporarily unavailable or too busy. Try again in a few
moments.
If you are unable to load any pages, check your computer's network
connection.
If your computer or network is protected by a firewall or proxy, make sure
that Firefox is permitted to access the Web.
And in my terminal i get -
channel 2: open failed: connect failed: Connection timed out
channel 3: open failed: connect failed: Connection timed out
Can someone help an IT illiterate?
Thanks
-
not quite sure what you are aiming for but if you want Ubuntu in the oracle VM to only be able to send through Tor, do the following:
Step One: In the virtualbox networking section of your VM, select 'host only'
Step Two: In the virtualbox manager, go to file -> preferences -> network -> [virtual adapter #] and click on the edit icon. It will show you the internal IP address of the virtual adapter, which is probably 192.168.56.1
Step Three: In your Torrc file, uncomment the line #SocksListenAddress 192.168.0.1:9100 and replace 192.168.0.1 with the internal IP address of your virtual adapter...192.168.56.1:9100 most likely is what you want
Step Four: In the VM go to System -> Preferences -> Network Proxy. Select 'Manual proxy configuration' and go down to Socks host. Enter your virtual adapters internal IP address (192.168.56.1 most likely) in the address box and 9100 in the port box. Click 'Apply System-wide' and enter your root password when it asks. Click close after you have done this.
From there you can configure Firefox to use Tor as normal, Tor should be listening on 127.0.0.1:9100
It seems like this is probably not what you want though. Please restate your goal in a more clear manner. I don't follow why you are restoring VM snapshots, where you are clicking Firewall or Primary, where those internal IP addresses are coming from, why you are sshing to Tor and then to privoxy which you shouldn't even be using anyway, or pretty much anything that you are saying including exactly wtf you are trying to do. are you behind a restrictive firewall and need to get around it with Tor?
-
not quite sure what you are aiming for but if you want Ubuntu in the oracle VM to only be able to send through Tor, do the following:
Step One: In the virtualbox networking section of your VM, select 'host only'
Step Two: In the virtualbox manager, go to file -> preferences -> network -> [virtual adapter #] and click on the edit icon. It will show you the internal IP address of the virtual adapter, which is probably 192.168.56.1
Step Three: In your Torrc file, uncomment the line #SocksListenAddress 192.168.0.1:9100 and replace 192.168.0.1 with the internal IP address of your virtual adapter...192.168.56.1:9100 most likely is what you want
Step Four: In the VM go to System -> Preferences -> Network Proxy. Select 'Manual proxy configuration' and go down to Socks host. Enter your virtual adapters internal IP address (192.168.56.1 most likely) in the address box and 9100 in the port box. Click 'Apply System-wide' and enter your root password when it asks. Click close after you have done this.
From there you can configure Firefox to use Tor as normal, Tor should be listening on 127.0.0.1:9100
It seems like this is probably not what you want though. Please restate your goal in a more clear manner. I don't follow why you are restoring VM snapshots, where you are clicking Firewall or Primary, where those internal IP addresses are coming from, why you are sshing to Tor and then to privoxy which you shouldn't even be using anyway, or pretty much anything that you are saying including exactly wtf you are trying to do. are you behind a restrictive firewall and need to get around it with Tor?
I was following the following instructions - http://4eiruntyxxbgfv7o.onion/paste/show.php?id=d1d879e959bcc020
got to step 16 number 30 on line 1094 and was getting an error saying the connection was reset in Firefox.
Yes, I'm behind a firewall and need to get through to Tor.
-
Would it not be easier just to configure your firewall?