Facebook
From Zerosetup, 4 Years ago, written in Plain Text.
Embed
Download Paste or View Raw
Hits: 207
  1. # Make sure your /etc/tor/torrc has these
  2. # ( then restart tor service using
  3. #     sudo systemctl stop tor.service;
  4. #     sudo systemctl start tor.service;
  5. #     sudo systemctl enable tor.service;
  6.  
  7.  
  8. # Put zeronet in the tor group ( it's tor on arch, might be debian-tor or whatever for you )
  9. # Then the control port will be acceessable to those users in the tor group
  10.  
  11. # Below goes in your /etc/tor/torrc:
  12.  
  13. ## The directory for keeping all the keys/etc. By default, we store
  14. ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
  15. DataDirectory /var/lib/tor
  16. DataDirectoryGroupReadable 1
  17.  
  18. ## The port on which Tor will listen for local connections from Tor
  19. ## controller applications, as documented in control-spec.txt.
  20. ControlPort 9051
  21. ## If you enable the controlport, be sure to enable one of these
  22. ## authentication methods, to prevent attackers from accessing it.
  23. #HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053
  24. EC4C
  25. CookieAuthentication 1
  26. CookieAuthFileGroupReadable 1
  27. CookieAuthFile /var/lib/tor/control_auth_cookie
  28.  
  29. ## TRANSPARENT PROXY
  30. ## This is to allow tor to proxy dns  ( if you're limiting the zeronet user to only use tor you need to be able to use dns via this )
  31. ## - it's not strictly necessary but combined with these firewall rules: (see https://pastebin.pl/view/88b4a8f4 ) it can save your ass from
  32. ## misconfigurations since with tor-only configured in firewall even if zeronet tries to access clearnet, it will be reidrected to tor.
  33. VirtualAddrNetworkIPv4 10.192.0.0/10
  34. AutomapHostsOnResolve 1
  35. TransPort 9040
  36. DNSPort 5353
  37.  
  38.  
  39.  
  40.  
  41.