项目作者: itshaadi

项目描述 :
Container-based Tor access point (Anonymizing Middlebox).
高级语言: Shell
项目地址: git://github.com/itshaadi/torbox.git
创建时间: 2019-09-22T21:58:27Z
项目社区:https://github.com/itshaadi/torbox

开源协议:MIT License

下载



Tor Box


Container-based Tor access point (Anonymizing Middlebox).








how it works

How it works

  1. Tor Box is a script for Setting up a Tor wireless access point using docker containers.
  2. it's aimed to be used as an Always-On anti-censorship BACKUP gateway.
  3. This script enables you to directly route traffic of connected devices to the Tor network
  4. Currently Tor Box only supports IPv4, and only traffic from TCP/DNS/DHCP is allowed
  5. any non-local traffic from other protocols are blocked.
  6. this script is not optimized for visiting .onion addresses. please use Tor Browser instead.
  7. Tor Box is to be used only as a BACKUP for situations where popular solutions (such as OpenVPN)
  8. are temporarily blocked by a state firewall.
  9. This isolation is achived by sharing a Network Namespace between the containers.

Requirements:

  • wireless network card/adapter (with proper drivers already installed).
  • following packages must be installed: iw, iptables, docker

Defaults:

  • Gateway: 192.168.162.1/24
  • SSID: Tor Box
  • Passphrase: torbox12345

note: edit templates/torrc.template according to your needs but do not touch TransPort and DNSPort

Installation

Tested on:

  • Debian 10 with RT5370 Wireless Adapter
  • Raspberry Pi 3
  1. git clone https://github.com/itshaadi/torbox.git
  2. cd torbox
  3. chmod +x torbox

useful documentations:

Usage

  1. ./torbox help
  2. Usage:
  3. <start|stop> <interface>
  4. <log> <container>
  5. eg: ./torbox start wlan0
  6. ./torbox log torbox-tor
  7. ./torbox stop wlan0

nmap results

  1. sudo nmap -sU -p 10558 38.84.132.167 # us1.freeopenvpn.org (non-local UDP connection is dropped)
  2. Starting Nmap 7.80 ( https://nmap.org ) at XXXXXX
  3. Nmap scan report for 38.84.132.167
  4. Host is up (0.00085s latency).
  5. PORT STATE SERVICE
  6. 10558/udp filtered unknown
  7. sudo nmap -sU -p 5353 192.168.162.1 # DNS (which uses UDP) is allowed
  8. Starting Nmap 7.80 ( https://nmap.org ) at XXXXX
  9. Nmap scan report for 192.168.162.1
  10. Host is up (0.00053s latency).
  11. PORT STATE SERVICE
  12. 5353/udp open zeroconf
  13. MAC Address: XXXXXXXX (Tenda Technology)

Filtered means that a firewall, filter, or other network obstacle is blocking the port so that Nmap cannot tell whether it is open or closed. source