You are not logged in.
Hello,
Someone can add this mode to Bunsenlabs?
https://forums.kali.org/showthread.php? … -linux-OS)
Cheers.
Last edited by Head_on_a_Stick (2016-12-04 11:09:14)
Offline
Someone can add this mode to Bunsenlabs?
Yes, you can add it yourself
I do not recommend following the advice in that link but it should work with BunsenLabs.
The source line to be added should be:
deb http://deb.torproject.org/torproject.org jessie main
Rather than the "wheezy" source quoted in your link.
EDIT: Ah, sorry, I see this is in Development & Suggestions...
I would rather that options such as this be added by the user.
Last edited by Head_on_a_Stick (2016-12-02 07:32:40)
Offline
^Agreed.
Of course tutorials and How-To's are always welcome.
...elevator in the Brain Hotel, broken down but just as well...
( a boring Japan blog (currently paused), now on Bluesky, there's also some GitStuff )
Offline
Someone can add this mode to Bunsenlabs?
Yes, you can add it yourself
I do not recommend following the advice in that link but it should work with BunsenLabs.
The source line to be added should be:
deb http://deb.torproject.org/torproject.org jessie main
Rather than the "wheezy" source quoted in your link.
EDIT: Ah, sorry, I see this is in Development & Suggestions...
I would rather that options such as this be added by the user.
Thanks! Nice advice.
I will try it.
Offline
Installing and starting tor and backbox seem to work fine. However traffic was not possible after starting backbox.
Offline
not working...
Offline
not working...
Your post does not contain enough information to allow anybody to help you.
Please read the "How to report a problem" link in my signature for further guidance and supply more information.
Did you enable forwarding?
cat /proc/sys/net/ipv4/ip_forward
If the output is zero (0) then add the necessary line to the BA script:
sudo tee -a /usr/bin/backbox-anonymous <<!
# enable forwarding
echo 1 > /proc/sys/net/ipv4/ip_forward
!
Last edited by Head_on_a_Stick (2016-12-02 23:57:47)
Offline
Thread moved to System Administration.
Offline
Thank you for the solution!
Using this set-up for browsing, one should be careful with webrtc leaks though.
Offline
^ Thanks for the feedback martix
I will go ahead and mark this one [SOLVED] as the OP appears to have lost interest.
Offline
The tor daemon seems to start after reboot automatically. After starting backbox it takes a bit time, but basically the configuration works.
However there is permanent dns leak. On default configuration it connects to the dns server set by the ISP. It looks like there is a culprit in the dns part of the script. Although I can see the connection to the dns server on net monitor, but sites like ipleak.net does not show the ip of the dns server at all.
Last edited by martix (2016-12-04 14:35:47)
Offline
It looks like there is a culprit in the dns part of the script.
I'm not familiar with torified connections but can you use that with a nameserver on the localhost?
I use unbound(8) & nsd(8) on my OpenBSD laptop, Debian has packages for them as well:
https://packages.debian.org/jessie/unbound
https://packages.debian.org/jessie/nsd
Also, the Tor project website has a page about this problem:
Offline
@HoaS Thank you, that's a good idea anyway I suppose to have the nameserver on localhost.
After I found this: https://trac.torproject.org/projects/to … sifyingTor
This might be the better way in comparison to backbox to have a torified system. Did not yet try this tutorial though.
Edit: I'm wondering though regarding backbox: Making a custom unit file would be the proper way to make it autostart?
Last edited by martix (2016-12-10 20:26:04)
Offline