Using tor as a proxy. Transparent bypass of blocking and access to the Tor network

I think it's no secret that Tor Browser This is an excellent tool for anonymizing yourself on the Internet.
TOR BROWSER is the same Firefox, but quite well modified...
From the very beginning, a lot of things have already been improved, and unnecessary things have been sawed off.
At its core, it is already configured free browser to anonymity on the Internet!

But there is a downside to all this... Tor Browser forces us to work only with the TOR proxy. and this is not always convenient since Internet services shy away and block TOR users.

In general, in this article we will hack Tor Browser and make Firefox out of it to work with SSH

Download TOR BROWSER from the website.
https://www.torproject.org/

Install (installed as a portable version)
For the sake of curiosity, let's take a look at the WHOER.NET page

As you can see, the picture is not very good... with such an IP it is difficult to register anywhere, and indeed any paid services disown you. forcing you to either constantly enter captchas, or simply deny you registration or viewing certain pages.

We write the line about:preferences#advanced
go to the NETWORK menu -> SETUP

First of all, uncheck the "Remote DNS" box.
Secondly, we put the point “WITHOUT PROXY”.
Click OK.

We write the line about:addons
go in and disable TorLauncher

We write the line about:config

Finding the line
:tor
change to
browser.startup.homepage;about:home

Finding the value
extensions.torbutton.test_enabled;true
change
extensions.torbutton.test_enabled;false

All!
Now the browser works without a proxy. Later we will configure it to work with SSH. using the example of the SSH Tunnel Manager program!!!
(you can configure Bitvise or Plink.exe + Proxifier to work with the ssh tunnel) simply SSH Tunnel Manager includes all this and you only have to configure it once and then use it and easily move from server to server. In addition, SSH Tunnel Manager can work through the TOR network

Download the program
Download SSH Tunnel Manager
- Open ssh_list.txt in it we see ssh accounts in the form
login:password@ip:port
write yours there with a clean IP.
(If you don’t have your own SSH, then the Internet is full of sales advertisements: gross prices from 1 to 3 $, non-brutal prices 10 $)

Open SSHManager.exe (necessarily with admin rights) and find our entered SSH in the list.

Next, we need to connect the SSH Tunnel Manager with the browser that we have configured. Go to Options
1) check the box Proxify whait list only (by this we show that only those name processes that are in the list will be proxied)

2) click + and select the TorBrowser process (it has the name firefox.exe)
3) check the box next to Show Firewall Panel (turn on the firewall panel)
4) closing!

We see this picture

Next, we need to add again our firefox.exe process to the Firewall panel. Right-click on the panel and select firefox.exe again
The firewall panel is needed for protection and, above all, in case proxification suddenly ends abnormally and we have not leaked our real IP address to the network.

Next we see our program added to the firewall panel... but the rule has not yet been created and our icon is lit in red. which means the program is not blocked by Windows Firewall.
So that the icon becomes green we must block our program. This will prevent her from accessing the Internet without using SSH.

The icon is now green.
What we need. You can then launch the firefox process directly from the panel.

Now that's it... we have linked our TorBrowser with the SSH Tunnel Manager, but before using it we need to check whether our Windows browser Firewall.
To do this, open the browser and enter any working URL.
In my example, this is WHOER.NET.
As you can see from the screenshot, the page could not load... but this will happen until we connect to SSH. And what’s also important is that Windows Firewall can block applications from Win7 and higher. (XP will not work in this regard)

Now we have everything set up and there are little things left.
In SSH Tunnel Manager, check the box next to our SSH and click Run Socks

Next we see a successful connection

Now we launch TorBrowser again and enter whoer.net in the line (TorBrowser can be launched directly from the SSH Tunnel Manager firewall panel or from the place where you have it)
And we see something that already suits us, but not quite.... since there is a discrepancy in time. why Whoer.net gives us only 70% anonymity

It's okay... don't despair...
type in about:addons and look for the random agent spoofer plugin and install

After Installation it will appear on our panel. Loading the Whoer.net page again we will see a time discrepancy of 5 hours... I change this in the plugin.

After the change, we reload our Whoer.net page again and see the result.

Thanks everyone. I hope my article will be useful!

Here is another build for 100% anonymity for Firefox

You can turn your computer into a web proxy for other devices local network. Tor is suitable for hiding the real IP address. That is, in the settings of other devices you will need to specify your computer data as a proxy, and all devices that access the Internet through your proxy will mask their IP.

In this case, the computer from which the proxy is made can be used in normal mode. You can configure it so that other programs (web browser, for example) will also use a proxy to access the network, or access the Internet directly.

Alternatives

Obviously, for this to work, the computer acting as the proxy must be turned on at all times. And this, at a minimum, means electricity costs. As an alternative, we recommend using routers that have Tor support built-in. An example of such routers are Asus series RT-AC* with firmware Asuswrt-Merlin.

The screenshot shows an already outdated RT-N66U:

In such routers, it is enough to enable Tor and choose whether to use a connection through the Tor network for all devices, or only for certain ones.

It's really convenient. And if you need the function of redirecting traffic of all devices on the local network via Tor, but do not need additional features proxy server (traffic filtering, for example), then I recommend thinking about buying such an advanced router.

Another alternative to a proxy on Windows is a proxy on Linux. Although, this is probably a matter of personal preference.

Static IP in Windows and installing the Tor service

You need to make sure that the computer's IP does not change. You can read about how to make a permanent IP in Windows in the article “” - there is a lot of theory there and it describes in detail how to set up a static local IP for the system. If you do not configure a permanent local IP, then our “stone flower”, i.e. our proxy, after changing the IP address, will turn into a pumpkin.

Of course, you need to install the Tor service. How to do this is described in the article "". It's easy enough to install and run - no other steps are necessary.

Initial data

I will point to specific example. However, my local IP 192.168.0.49 , and the Tor service is running on its standard port 9050 . If you set up a proxy with me, then in subsequent commands/settings replace 192.168.0.49 with your local IP. Also, if you have changed the default Tor port, then replace 9050 in the following examples with your port. By the way, how to change the Tor port is described in.

Web proxy and SOCKS are not the same thing!

SOCKS by its function is also a proxy. But what distinguishes it from a web proxy is that it is a different technology, with a different implementation and slightly different functions.

The most important practical conclusion: if a device or application works only with a web proxy, then in its settings you can't just specify the Tor port- this will not work, because web proxy and SOCKS are different things.

SOCKS is one of the application protocols; other examples of application protocols are: HTTP, FTP, SMTP, RDP, SNMP, DHCP.

Unlike HTTP proxy servers, SOCKS transfers all the data from the client without adding anything from itself, that is, from the point of view of the end server, the data it receives from the SOCKS proxy is identical to the data that the client would transfer directly, without proxying . SOCKS is more universal, it does not depend on specific application layer protocols (layer 7 of the OSI model) and operates at the level of TCP connections (layer 4 of the OSI model). But the HTTP proxy caches data and can more carefully filter the content of the transmitted data.

Web proxies and SOCKS are like HDMI and VGA - they have similar functions, and yet you can't just plug VGA cable to HDMI socket - you need an adapter.

Same with Tor. If the application you are using supports SOCKS, then it can connect directly to Tor. If not, then you need to install an “adapter” program.

Such a program, for example, is Privoxy.

Installing and running Privoxy on Windows

Please note that the proxy is used by the browser and may not be used by other applications. Some applications have their own proxy settings - check them.

Setting up a proxy in Windows

Go to " Options", start writing " proxy" and select " Changing proxy server settings manually»:

Turn on " Use a proxy server", enter the IP and port, check the box " Do not use a proxy server for local (internal) addresses»:

Save your settings. Check in your browser https://suip.biz/ru/?act=myip:

And in other programs, for example, in command line Windows:

Curl suip.biz/ip/

Setting up a proxy on Linux

IN Linux settings proxy can be changed in different ways. For example, this can be done for individual applications or for the entire system; in the GUI or command line.

If you are using GUI then go Options-> Net. Click the gear where " Network proxy»:

Move the switch to " Manually" and enter your details:

For all IPs, enter the address of the computer where the proxy is running. As a port for HTTPS, HTTP, FTP enter the Privoxy port, and for Socks enter the Tor port (default is 9050 unless you change it).

After this, both web browsers and console utilities will use the proxy settings. But be careful with programs like Nmap, Masscan - they send raw packets, bypassing system calls - in other words, they do not use proxy settings.

Option without GUI, enter the commands into the console:

In them, replace 192.168.0.49 with the IP of your proxy, and ports 8118 and 9050 with the Privoxy and Tor port, respectively.

These settings are saved only until you reboot!

In order for the settings to be permanent and work after restarting the computer, add to the file /etc/bash.bashrc add these same lines (again, replace the IP and port numbers):

Export all_proxy="socks://192.168.0.49:9050/" export http_proxy="http://192.168.0.49:8118/" export https_proxy="http://192.168.0.49:8118/" export no_proxy="localhost ,127.0.0.1,::1,192.168.1.1,192.168.0.1"

Save the file.

Configuring the use of proxies by VirtualBox virtual machines

Be careful when setting up virtual machines! In the menu item " File» -> « Settings"there is a tab " Proxy" Be aware that this setting only works while VirtualBox is checking for and downloading updates.

For virtual machines you need to configure the proxy individually internally operating system each of them.

System-wide host machine proxy settings will not necessarily work for virtual machine, since it uses its own drivers and virtual network interfaces.

When surfing the Internet, not everything always goes smoothly. Sometimes they can pop out various errors, which interrupt access to the network. One of these is the case when the proxy server refuses to accept a connection to the Tor browser. The problem may appear in other clients as well.

What does the error mean?

This error message indicates that for some reason the browser does not have access to global network. In this case, the Internet connection itself does not disappear. So, for example, with this error, other programs may continue to work, the torrent will download files, and correspondence on Skype will continue.

Causes

As a rule, the browser gains access to the World Wide Web automatically using a wired or wireless connection. Only initial setup is required.

But it happens that the proxy server settings get lost, and then the network disappears. A proxy server is like an intermediary's computer through which all information passes. Its (server) address is indicated in the settings, and all requests go through it. But if it does not work, then the browser sends a signal without a response, which interrupts the Internet.

This problem can arise for various reasons. Proxy settings may be lost even if you shut down your computer incorrectly. Also, the presence of viruses or visiting unreliable sites can trigger such an error.

Read also:

All solutions

There are several ways to fix the “The proxy server refuses to accept the connection” error in the Tor browser. The same solutions can be used to resolve the same problem in other clients. It is recommended to perform all actions with account administrator.

Browser proxy settings

First you need to try changing the settings in your browser. To do this you need to do the following:

Proxy system settings

If after changing the browser settings nothing has changed, then it is worth checking the system ones. To do this you need to follow the instructions:

  1. Go to the search menu and enter "Proxy".
  2. Select in the search results "Network proxy settings".
  3. A window will open in which you need to set automatic proxy detection.

After saving the changes, the problem should go away.

Other solutions

If the previous options did not help, you should try the following:

  • Check if the network works through another browser. If everything is fine there, then the broken one should be reinstalled, having first removed it.
  • Disable all add-ons and plugins from the browser.
  • Scan Windows OS for viruses and remove them.
  • Clear the client's cache and cookies, and the Windows registry.

Conclusion

The occurrence of such an error while using the Tor browser is always unpleasant. But with timely action it can be quickly eliminated. If none of the methods worked, you should try to roll back the system to a point where it was still working.

Network files used to establish a connection may be infected or damaged by viruses, preventing either the browser or the proxy from accessing the required object. Therefore, we recommend scanning and further cleaning the system from malicious files using one of the available methods.

After this, it is advisable to restore system files, because, as mentioned above, they could be damaged due to infection. This is done using one of the built-in tools of the operating system. Detailed Guide To complete the task, read our other material at the following link.

Method 4: Scan and fix registry errors

Most Windows system settings are stored in the registry. Sometimes they get damaged or start to work incorrectly due to some kind of failure. We recommend scanning your registry for errors and, if possible, fixing them all. After restarting your computer, try setting up the connection again. Read more about cleaning further.

The Tor browser is one of the best life-saving tools in our Orwellian world. Have you ever wondered why you receive offers in your email that you Googled earlier? Why does the advertising on websites appear exactly the one you needed? The point is that modern browsers save your request history and, accordingly, your user preferences. That is, any advertising network already knows what you want - it is the request history that helps it with this.

Well, let’s not forget about scammers or the government - although these are different “structures,” they still have the same goal: to find the “weak” link, identify personal information about you and use it for their own purposes.

If you are tired of this total surveillance, if you want to surf sites on the Internet in complete anonymity, then you need to use the Tor browser and also purchase a couple of proxy servers. Anyway, let's talk about it.

Tor browser - what is it?

The Tor browser is a unique browser that supports proxy server technology. In general, every browser supports such technology, but it is here that the user visits sites and downloads in complete anonymity.

This is achieved by a huge network of encrypted communication nodes. Typically, there are three nodes registered in different points locations. In fact, even the authors of Tor do not know which communication nodes this or that client uses, since each time a new IP address is used.

From a security point of view, this browser really provides complete and multifunctional protection. With it you can:

  • create websites without advertising your (and their) location;
  • download files, surf websites without leaving any traces;
  • use electronic payment systems without the risk of hacking and theft of your personal data;
  • access sites that are blocked in your country.

Why do we need proxies for Tor?

So, we found out that Tor is an excellent and wonderful tool that gives us complete anonymity through its own proxy servers. However, there are a couple of problems here: 1 – low speed, 2 – blocking by the site administration.

The first is due to the fact that shared network servers are overloaded. Just try installing some VPN in your browser. Immediately after you go to YouTube, for example, you will feel the difference - the video will slow down ungodly. All this is due to the extended communication channel: your PC needs to send a signal to some Dutch server and receive a response, and this will take a lot of time.

The second problem is due to the popularity of the program; nevertheless, not only you and I know about the Torah. The administration of many sites simply blocks those visitors who use this browser.

In general, Thor is certainly suitable for our studies, but these two problems are quite serious. How to solve them? That's right - by purchasing your own proxy servers.

We can purchase, for example, Russian IP addresses, put them in the browser and enjoy comfortable work. You might think that there is no point in the Torah in this case, but, firstly, it is an incredibly convenient browser that is an improved Firefox version, and, secondly, with the help of separate proxies you can conduct safe work on the network, hiding behind someone else's IP. At the same time, you will not experience any need for additional speed.

What proxies are suitable for this browser?

In fact, any. You can use HTTP or SOCKS protocols - you can purchase IPv4 browsers and install them in the program settings.

Share