Forward port patches/07_log_to_file_by_default
[tor.git] / doc / tor-doc-unix.html
blob1bb9b7c1147c7a4e60103381f609745df4de2fc4
1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
2 "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
4 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
5 <head>
6 <title>Tor Linux/BSD/Unix Install Instructions</title>
7 <meta name="Author" content="Roger Dingledine" />
8 <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
9 <link rel="stylesheet" type="text/css" href="stylesheet.css" />
10 <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" />
11 </head>
13 <body>
15 <!-- TITLE BAR & NAVIGATION -->
17 <table class="banner" border="0" cellpadding="0" cellspacing="0">
18 <tr>
19 <td class="banner-left"></td>
20 <td class="banner-middle">
21 <a href="/">Home</a>
22 <a href="/overview">Overview</a>
23 <a href="/download">Download</a>
24 <a href="/documentation">Docs</a>
25 <a href="/volunteer">Volunteer</a>
26 <a href="/people">People</a>
27 <a href="/donate">Donate!</a>
28 </td>
29 <td class="banner-right"></td>
30 </tr>
31 </table>
33 <!-- END TITLE BAR & NAVIGATION -->
35 <div class="center">
37 <div class="main-column">
39 <h1>Running the <a href="http://tor.eff.org/">Tor</a> client on Linux/BSD/Unix</h1>
40 <br />
42 <p>
43 <b>Note that these are the installation instructions for running a Tor
44 client. If you want to relay traffic for others to help the network grow
45 (please do), read the <a
46 href="tor-doc-server.html">Configuring a server</a> guide.</b>
47 </p>
49 <hr />
50 <a id="installing"></a>
51 <h2><a class="anchor" href="#installing">Step One: Download and Install Tor</a></h2>
52 <br />
54 <p>
55 The latest release of Tor can be found on the <a
56 href="/download.html">download</a> page. We have packages for Debian,
57 Red Hat, Gentoo, *BSD, etc there too.
58 </p>
60 <p>If you're building from source, first install <a
61 href="http://www.monkey.org/~provos/libevent/">libevent</a>, and
62 make sure you have openssl and zlib (including the -devel packages if
63 applicable). Then Run <tt>tar xzf tor-0.1.0.15.tar.gz;
64 cd tor-0.1.0.15</tt>. Then <tt>./configure &amp;&amp; make</tt>. Now you
65 can run tor as <tt>src/or/tor</tt>, or you can run <tt>make install</tt>
66 (as root if necessary) to install it into /usr/local/, and then you can
67 start it just by running <tt>tor</tt>.
68 </p>
70 <p>Tor comes configured as a client by default. It uses a built-in
71 default configuration file, and most people won't need to change any of
72 the settings. Tor is now installed.
73 </p>
75 <hr />
76 <a id="privoxy"></a>
77 <h2><a class="anchor" href="#privoxy">Step Two: Install Privoxy for Web Browsing</a></h2>
78 <br />
80 <p>After installing Tor, you need to configure your applications to use it.
81 </p>
83 <p>
84 The first step is to set up web browsing. Start by installing <a
85 href="http://www.privoxy.org/">Privoxy</a>: click on 'recent releases'
86 and pick your favorite package or install from source. Privoxy is a
87 filtering web proxy that integrates well with Tor.
88 </p>
90 <p>You need to configure Privoxy to use Tor.
91 Open Privoxy's "config" file (look in /etc/privoxy/ or /usr/local/etc/)
92 and add the line <br>
93 <tt>forward-socks4a / localhost:9050 .</tt><br>
94 to the top of the config file. Don't forget to add the dot at the end.
95 </p>
97 <p>Privoxy keeps a log file of everything passed through it. In
98 order to stop this you will need to comment out two lines by inserting a
99 # before the line. The two lines are:<br>
100 <tt>logfile logfile</tt><br>
101 and the line <br>
102 <tt>jarfile jarfile</tt><br>
103 </p>
105 <p>You'll need to restart Privoxy for the changes to take effect.</p>
107 <hr />
108 <a id="using"></a>
109 <h2><a class="anchor" href="#using">Step Three: Configure your applications to use Tor</a></h2>
110 <br />
112 <p>After installing Tor and Privoxy, you need to configure your
113 applications to use them. The first step is to set up web browsing.</p>
115 <p>If you're using Firefox (we recommend it), check out our <a
116 href="tor-switchproxy.html">Tor SwitchProxy howto</a> to set up
117 a plugin that makes it easy to switch between using Tor and using a
118 direct connection.</p>
120 <p>Otherwise, you need to manually configure your browser to HTTP proxy
121 at localhost port 8118.
122 (That's where Privoxy listens.)
123 In Mozilla, this is in Edit|Preferences|Advanced|Proxies.
124 In Opera 7.5x it's Tools|Preferences|Network|Proxy servers.
125 You should click the "use the same proxy server for all protocols"
126 button; but see <a
127 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FtpProxy">this
128 note</a> about Tor and ftp proxies.
130 <p>Using privoxy is <strong>necessary</strong> because <a
131 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">browsers
132 leak your DNS requests when they use a SOCKS proxy directly</a>, which
133 is bad for your anonymity. Privoxy also removes certain dangerous
134 headers from your web requests, and blocks obnoxious ad sites like
135 Doubleclick.</p>
137 <p>To Torify other applications that support HTTP proxies, just
138 point them at Privoxy (that is, localhost port 8118). To use SOCKS
139 directly (for instant messaging, Jabber, IRC, etc), you can point
140 your application directly at Tor (localhost port 9050), but see <a
141 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS">this
142 FAQ entry</a> for why this may be dangerous. For applications
143 that support neither SOCKS nor HTTP, take a look at <a
144 href="http://tsocks.sourceforge.net/">tsocks</a> or <a
145 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#socat">socat</a>.
146 </p>
148 <p>For information on how to Torify other applications, check out the
149 <a href="http://wiki.noreply.org/wiki/TheOnionRouter/TorifyHOWTO">Torify
150 HOWTO</a>.
151 </p>
153 <hr />
154 <a id="verify"></a>
155 <h2><a class="anchor" href="#verify">Step Four: Make sure it's working</a></h2>
156 <br />
159 Next, you should try using your browser with Tor and make
160 sure that your IP address is being anonymized. Click on the <a
161 href="http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1">Tor
162 detector</a> and see whether it thinks you're using Tor or not.
163 (If that site is down, see <a
164 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#IsMyConnectionPrivate">this
165 FAQ entry</a> for more suggestions on how to test your Tor.)
166 </p>
168 <p>If you have a personal firewall that limits your computer's
169 ability to connect to itself (this includes something like SELinux on
170 Fedora Core 4), be sure to allow connections from
171 your local applications to Privoxy (local port 8118) and Tor (local port
172 9050). If
173 your firewall blocks outgoing connections, punch a hole so
174 it can connect to at least TCP ports 80 and 443, and then see <a
175 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#FirewalledClient">this
176 FAQ entry</a>. If your SELinux config is not allowing tor or privoxy to
177 run correctly, create a file named booleans.local in the directory
178 /etc/selinux/targeted. Edit this file in your favorite text editor and
179 insert "allow_ypbind=1". Restart your machine for this change to take
180 effect.
181 </p>
183 <p>If it's still not working, look at <a
184 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ItDoesntWork">this
185 FAQ entry</a> for hints.</p>
187 <hr />
188 <a id="server"></a>
189 <h2><a class="anchor" href="#server">Step Five: Configure it as a server</a></h2>
190 <br />
192 <p>The Tor network relies on volunteers to donate bandwidth. The more
193 people who run servers, the faster the Tor network will be. If you have
194 at least 20 kilobytes/s each way, please help out Tor by configuring your
195 Tor to be a server too. We have many features that make Tor servers easy
196 and convenient, including rate limiting for bandwidth, exit policies so
197 you can limit your exposure to abuse complaints, and support for dynamic
198 IP addresses.</p>
200 <p>Having servers in many different places on the Internet is what
201 makes Tor users secure. <a
202 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity">You
203 may also get stronger anonymity yourself</a>,
204 since remote sites can't know whether connections originated at your
205 computer or were relayed from others.</p>
207 <p>Read more at our <a href="tor-doc-server.html">Configuring a server</a>
208 guide.</p>
210 <hr />
212 <p>If you have suggestions for improving this document, please post
213 them on <a href="http://bugs.noreply.org/tor">our bugtracker</a> in the
214 website category. Thanks!</p>
216 </div><!-- #main -->
217 </div>
218 <div class="bottom" id="bottom">
219 <i><a href="/contact"
220 class="smalllink">Webmaster</a></i> - $Id$
221 </div>
222 </body>
223 </html>