Running the Tor client on Mac OS X



Similar documents
Aspera Connect User Guide

Aspera Connect User Guide

Introduction to Computer Security Benoit Donnet Academic Year

MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server

Other documents in this series are available at: servernotes.wazmac.com

Proxies. Chapter 4. Network & Security Gildas Avoine

Installation Guide For Choic Enterprise Edition

IIS, FTP Server and Windows

WhatsUp Gold v16.3 Installation and Configuration Guide

Working With Your FTP Site

isupplier PORTAL ACCESS SYSTEM REQUIREMENTS

What Is Ad-Aware Update Server?

System Administration Training Guide. S100 Installation and Site Management

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Computer Science and Engineering MacOS Cisco VPN Client Installation and Setup Guide

Sentral servers provide a wide range of services to school networks.

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Installation and Deployment

Imaging License Server User Guide

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Intego Enterprise Software Deployment Guide

Streaming Media System Requirements and Troubleshooting Assistance

Local Caching Servers (LCS): User Manual

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1

Configuration Manual English version

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server

Kaspersky Security Center Web-Console

MERLIN SERVER. The Quick Start Guide for collaborative project management ProjectWizards GmbH, Melle, Germany. All rights reserved.

Troubleshooting / FAQ

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

ez Agent Administrator s Guide

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Setting Up Your FTP Server

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Stealth OpenVPN and SSH Tunneling Over HTTPS

Table of Contents. Requirements and Options 1. Checklist for Server Installation 5. Checklist for Importing from CyberAudit

EZblue BusinessServer The All - In - One Server For Your Home And Business

Configuration Guide. BES12 Cloud

How to set up popular firewalls to work with Web CEO

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

FortKnox Personal Firewall

FAQ: troubleshooting Java for Saba Web Access

Citrix Receiver 11.8 for Macintosh OS X

WhatsUp Gold v16.1 Installation and Configuration Guide

Sophos Endpoint Security and Control standalone startup guide

Installation Notes for Outpost Network Security (ONS) version 3.2

Sharing Files Over Internet With Thecus NAS Device. Thecus TME

PREFACE iss.01 -

HOW TO RETRIEVE FILES FROM THE TARGET ANALYTICS FTP SITE

RLM Server Guide. For Macintosh and Windows

Citrix : Remediation - MAC

SSL Enforcer Documentation

Aspera Connect Linux 32/64-bit. Document Version: 1

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

EZblue BusinessServer The All - In - One Server For Your Home And Business

Quick Installation Guide for BrainTrading System 7.0

OnCommand Performance Manager 1.1

Configuring your client to connect to your Exchange mailbox

Network/Floating License Installation Instructions

NAS 107 Introduction to Control Center

Xerox 700 Digital Color Press with Integrated Fiery Color Server. Utilities

How to deploy SurveilStar PC/Internet Monitoring Software

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

WhatsUp Gold v16.2 Installation and Configuration Guide

How to recover IE Client

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

Installation Guide for Pulse on Windows Server 2012

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

READYNAS INSTANT STORAGE. Quick Installation Guide

Installation Guide for Pulse on Windows Server 2008R2

CTERA Agent for Mac OS-X

RLP Citrix Setup Guide

Signiant Agent installation

MoneyWorks Datacentre. Administrators' Guide

FileMaker Server 10. Getting Started Guide

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

How To Set Up Dataprotect

Installing and Configuring vcloud Connector

Aspera Connect User Guide

It is recommended that you use a clean installation of Lion client before upgrading to Lion Server.

Kaspersky Security Center Web-Console

VERSION 9.02 INSTALLATION GUIDE.

Magaya Software Installation Guide

Macintosh General Help

ManageEngine IT360. Professional Edition Installation Guide.

NetSpective Global Proxy Configuration Guide

Receiver Updater for Windows 4.0 and 3.x

BlackArmor NAS 110 User Guide

Remote Administration

Setting up an icap Server for ISG- 1000/2000 AV Support

(1) Network Camera

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

École des Ponts Paristech DSI. Installing OpenVPN

Optional Mainserver Setup Instructions for OS X Support

CommuniTake Remote Support (CRS) Technical FAQs

Transcription:

Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do), read the Configuring a server guide. Step One: Download and Install Tor The latest stable and experimental releases of Tor for Macintosh OS X bundle Tor, Vidalia (a GUI for Tor), and Privoxy (a filtering web proxy) into one package, preconfigured to work together. Download one from the download page. Our Tor installer should make everything pretty simple. Below is a screenshot of the setup page: When the installer is finished, you can start Vidalia by selecting its icon from your Applications folder. A dark onion with a red X in your dock means Tor is not currently running. You can start Tor by selecting Start from the "Tor" menu at the top of your screen. When Tor is running, Vidalia's dock icon will look like the following:

Privoxy is installed as part of the Tor bundle package installer. Once it is installed, it will start automatically when your computer is restarted. You do not need to configure Privoxy to use Tor a custom Privoxy configuration for Tor has been installed as part of the installer package. Step Two: Configure your applications to use Tor After installing Tor and Privoxy, you need to configure your applications to use them. The first step is to set up web browsing. If you're using Firefox (we recommend it), simply install the Torbutton plugin, restart your Firefox, and you're all set: (Learn more about Torbutton here. If you plan to run Firefox on a different computer than Tor, see the FAQ entry for running Tor on a different computer. If you need to use a browser other than Firefox, you'll have to configure its proxy settings yourself.) Apple Safari If you want to use Tor with Safari, you need to change your Network Settings. Select your Network Preferences from the Apple Location menu:

Select the Network Interface on which you want to enable Tor. If you use more than one Interface you must change the proxy settings for each individually. Select and enter 127.0.0.1 and port 8118 for both Web Proxy (HTTP) and your Secure Web Proxy (HTTPS). You should also do this for "FTP Proxy" and "Gopher Proxy"; see this note about Tor and ftp proxies. Leave your Use Passive FTP Mode (PASV) setting as is.

Using privoxy is necessary because browsers leak your DNS requests when they use a SOCKS proxy directly, which is bad for your anonymity. Privoxy also removes certain dangerous headers from your web requests, and blocks obnoxious ad sites like Doubleclick. To Torify other applications that support HTTP proxies, just point them at Privoxy (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at connect or socat. For information on how to Torify other applications, check out the Torify HOWTO. Step Three: Make sure it's working Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not. (If that site is down, see this FAQ entry for more suggestions on how to test your Tor.)

If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443, and then see this FAQ entry. If it's still not working, look at this FAQ entry for hints. Step Four: Configure it as a server The Tor network relies on volunteers to donate bandwidth. The more people who run servers, the faster the Tor network will be. If you have at least 20 kilobytes/s each way, please help out Tor by configuring your Tor to be a server too. We have many features that make Tor servers easy and convenient, including rate limiting for bandwidth, exit policies so you can limit your exposure to abuse complaints, and support for dynamic IP addresses. Having servers in many different places on the Internet is what makes Tor users secure. You may also get stronger anonymity yourself, since remote sites can't know whether connections originated at your computer or were relayed from others. Read more at our Configuring a server guide. How To Uninstall Tor and Privoxy The Tor 0.1.0.x series and beyond have a command line or Terminal-based uninstaller. If you want to remove Tor on OSX, here's how: Change your application proxy settings back to their original values. If you just want to stop using Tor, you can end at this point. If you want to completely remove Tor, and your account has Admin Privileges, then proceed as follows: 1. Open up a Terminal or x-term session. 2. cd /Library/Tor 3. sudo -s 4../uninstall_tor_bundle.sh Tor and Privoxy are now completely removed from your system. If you're using a version of the Tor installer that doesn't come with the uninstall_tor_bundle script, you will need to manually delete the following: /Library/Tor /Library/Privoxy /usr/bin/tor /usr/bin/tor_resolve /var/log/tor /usr/share/man/man1/tor.1

/usr/share/man/man1/tor-resolve.1 /usr/share/man/man1/torify.1 /Library/Receipts/Privoxy.pkg/ /Library/Receipts/privoxyconf.pkg/ /Library/Receipts/Tor.pkg/ /Library/Receipts/torstartup.pkg/