![]() Check that there are no errors in /var/log/tor/notices.log.Test itĪfter setting everything up, one should do the following in order to check that everything is working smoothly: Then, I started and enabled the tor service which was as simple as systemctl start tor.service and systemctl enable tor.service. 0.0 : 12346 ExtORPort auto ContactInfo Klaus Eisentraut Nickname nocensorship ExitPolicy reject * : * # no exits allowed ExitPolicy reject6 * : * RelayBandwidthRate 1000 KB # Throttle traffic to 100KB/s (800Kbps) RelayBandwidthBurst 2000 KB # But allow bursts up to 200KB/s (1600Kbps) AccountingMax 800 GB AccountingStart month 19 3 : 17 Log notice file / var / log / tor / notices. XXX : 12345 ORPort : 12345 BridgeRelay 1 ServerTransportPlugin obfs4 exec / usr / bin / obfs4proxy ServerTransportListenAddr obfs4 0.0. ![]() Then, I cloned the official repository and compiled obfs4proxy. ![]() It is written in the modern programming language go, so I installed it first with pacman -S go. Unfortunately, it is not in the official Arch Linux repository, so I decided to compile it myself. Obfs4proxy is an obfuscator which makes it impossible to distinguish traffic from random data without knowing the key of the obfs4proxy server. My tor relay has both an IPv4 and an IPv6 address, too. I chose 12345 as the tor ORPort and 12346 as the obfs4proxy port but you can choose any other ports. It was relatively straight-forward to set it up, but I didn't find an all-in-one instruction. Therefore, I decided to run a Tor bridge in order to help people in countries with censored internet. However, this server runs a low-traffic mailserver and I don't want to end up its IP address on blacklists. One of my servers is idling most of the time and one boring evening, I decided it can donate some of its capacity to the tor network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |