/os/ - Online Security

News, techniques and methods for computer network security.

Posting mode: Reply

Check to confirm you're not a robot
Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Board Rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Magrathea | Catalog | Bottom


Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Expand All Images


Compile Thread Anonymous 11/27/2016 (Sun) 20:44:39 [Preview] No. 692
Endwall guy should keep irrelevant compile instructions in this thread by editing the OP or edit the Sticky thread before purging said irrelevant posts in various threads. Just remind them to compile from source and redirect them to this thread.


Anonymous 11/27/2016 (Sun) 21:59:20 [Preview] No. 697 del
where's "irrelevant compile instructions"?


Anonymous 11/27/2016 (Sun) 22:26:11 [Preview] No. 698 del
>>697
Endwall guy always posts compile instructions that takes up so much space that it gets too distracting while he doesn't always explain himself the context of why he's posting how to compile specific programs from source although it is implied, besides his posts in the news thread, he pretty much posts such instructions in multiple threads in every Tor update or some other program that gets updated. I'd figured that everything would look better if he just slap them all here and just redirect people to the new compile instructions to the posts in this thread in a centralized location so that people don't have to look at all the threads, or simply state that he had updated the instructions.


Endwall 11/27/2016 (Sun) 22:39:41 [Preview] No. 699 del
That sounds reasonable. I'll do that next Friday/Saturday. Thanks for the feedback.


Build tor from source Endwall 12/04/2016 (Sun) 05:57:37 [Preview] No.707 del
STEP 1) Get the source tar, check it and upack it
$ cd ~/
$ mkdir tor
$ cd tor
$ torsocks wget https://www.torproject.org/dist/tor-0.2.8.10.tar.gz
$ torsocks wget https://www.torproject.org/dist/tor-0.2.8.10.tar.gz.asc
$ torsocks wget https://www.torproject.org/dist/tor-0.2.9.6-rc.tar.gz
$ torsocks wget https://www.torproject.org/dist/tor-0.2.9.6-rc.tar.gz.asc

https://www.torproject.org/dist/tor-0.2.8.10.tar.gz
https://www.torproject.org/dist/tor-0.2.9.6-rc.tar.gz

NOTICE
The following .onions have been flagged as Phishing links by http://7cbqhjnlkivmigxf.onion/
Do not get files from the following onion sites:
e5qcqoax4chithot.onion (2016-02-27) (Phishing link)
zgfgvob256pffy62.onion (2014-12-29) (Phishing link)
torprowdd64ytmyk.onion (2016-05-22) (Phishing link)
gaobjvqqrlotey4d.onion (2016-07-30) (Phishing link)
NOTICE

$ gpg --keyserver hkp://pool.sks-keyservers.net --recv-keys 0x4E2C6E8793298290 0x910397D88D29319A

$ gpg --verify tor-0.2.8.10.tar.gz.asc tor-0.2.8.10.tar.gz
$ gpg --verify tor-0.2.9.6-rc.tar.gz.asc tor-0.2.9.6-rc.tar.gz

If the signatures are good continue or check the sha256sum:

$ sha256sum tor-0.2.8.10.tar.gz
$ sha256sum tor-0.2.9.6-rc.tar.gz

If this matches then unpack the files:

$ tar -xvf tor-0.2.8.10.tar.gz
$ tar -xvf tor-0.2.9.6-rc.tar.gz

$ mv tor-0.2.8.10 tor_stable
$ mv tor-0.2.9.6-rc tor_alpha

$ cd tor_stable

Step 2) configure , make, link

$ ./configure
$ make
$ mkdir ~/bin
export PATH=$PATH:/homeUSER/bin
$ cd ~/bin
$ ln -s ~/tor/tor_stable/src/or/tor tor_stable
!
New versions of tor >0.3.5.x build and link the binary in ~/tor/src/app/ as ~/tor/src/app/tor

$ ln -s ~/tor/tor_stable/src/app/tor tor_stable

$ cd ~/tor/src/config

$ su
# mkdir /usr/local/etc/tor
# mkdir /usr/local/share/tor
# cp torr.sample /usr/local/etc/tor/torrc
# cp geoip /usr/local/share/geoip
# cp geoip6 /usr/local/share/geoip6
# cd /usr/local/etc/tor
# tor_stable &
# torsocks wget https://raw.githubusercontent.com/endwall2/endware/master/endtorrc
# mv endtorrc torrc-defaults
# nano torrc-defaults

modify to your liking

# fg 1
# ^C (Ctrl + C)
# exit
$ cd ~/tor/tor_alpha

STEP 3) repeat configure, make, link

$ ./configure
$ make
$ cd ~/bin
$ ln -s ~/tor/tor_alpha/src/or/tor tor_alpha
$ cd ~
$ tor_alpha &
$ fg 1
$ ^C (Ctrl + C)
Edited last time by Endwall on 03/09/2019 (Sat) 06:59:06.


Compile Links 2 from source Endwall 12/04/2016 (Sun) 05:59:01 [Preview] No. 708 del
Install Links 2 from source

http://links.twibright.com
$ cd ~/
$ mkdir src
$ cd src
$ torsocks wget http://links.twibright.com/download/links-2.14.tar.gz
$ tar -xzvf links-2.14.tar.gz
$ cd links-2.14
$ ./configure --help
$ ./configure --enable-graphics --with-x --with-ssl --without-grx --without-windows
$ make
$ su
# make install
# exit
$ links -g

Also the default user agent is found in the file http.c , which you can edit with nano.
$ grep "Mozilla" http.c
$ nano http.c
^W Mozilla , edit line ^X then recompile.

### DONE
Edited last time by Endwall on 12/12/2016 (Mon) 03:18:48.


Tor mods Endwall 12/04/2016 (Sun) 06:01:18 [Preview] No.709 del
tor/src/or OR tor/src/core/or
or.h
#define DEFAULT_ROUTE_LEN 3
change this to
#define DEFAULT_ROUTE_LEN 6

routerparse.c
digest_algorithm_t alg = DIGEST_SHA1;
digest_algorithm_t alg = DIGEST_SHA256;
Leave this alone it will break tor if you change it.


/src/core/or/circuitstats.h

#define CBT_DEFAULT_RECENT_CIRCUITS 20
change to
#define CBT_DEFAULT_RECENT_CIRCUITS 10

#define CBT_MAX_RECENT_CIRCUTS 1000
change to
#define CBT_MAX_RECENT_CIRCUITS 100

circuituse.c

Also change this

else if (build_state && build_state -> desired_path_len >= 4)

to be:

else if (build_state && build_state -> desired_path_len >= 7)


New versions of tor >0.3.5.x build and link the binary in tor/src/app/ as src/app/tor

If you know of any other good mods for tor post below or in the tor/vpn thread.

Thanks.
Edited last time by Endwall on 03/09/2019 (Sat) 07:00:25.


Install torsocks from source Endwall 12/04/2016 (Sun) 06:01:50 [Preview] No. 710 del
Install Torsocks from source

$ su
# pacman -S git
# apt-get install git
$ mkdir -p ~/git
$ cd ~/git
$ git clone https://git.torproject.org/torsocks.git

or if tor is already running with previous version of torsocks
$ torsocks git clone https://git.torproject.org/torsocks.git

$ mkdir -p ~/tor
$ mv torsocks ~/tor
$ cd ~/tor
$ cd torsocks
$ ./autogen.sh
$ ./configure --help
$ ./configure
$ make
$ su
# make install
# exit
$ cd /src/bin
$ chmod u+rwx torsocks
$ cd ~/bin
$ ln -s ~/tor/torsocks/src/bin/torsocks torsocks
$ export PATH=$HOME/bin:$PATH
$ torsocks --version


youtube-dl from git Endwall 12/04/2016 (Sun) 06:02:28 [Preview] No. 711 del
Install Youtube-dl from source git

$ cd ~/
$ mkdir -p git
$ cd git
$ torsocks git clone https://github.com/rg3/youtube-dl.git
$ cd youtube-dl
$ su
# torsocks pacman -S zip pandoc
# pacman -Rc youtube-dl
# exit
$ make
$ ls
$ cd ~/bin
$ ln -s ~/git/youtube-dl/youtube-dl youtube-dl
$ cd ~
$ export PATH=$HOME/bin:$PATH
$ echo "PATH=$HOME/bin:$PATH" >> .bashrc
$ youtube-dl --version


Tor from git repo Endwall 12/04/2016 (Sun) 06:03:18 [Preview] No. 712 del
Clone tor from git repo

Clone
https://git.torproject.org/tor.git
http://dccbbv6cooddgcrq.onion/tor.git

$ mkdir ~/git
$ cd ~/git
$ torsocks -i git clone http://dccbbv6cooddgcrq.onion/tor.git
$ cd tor
$ cd src
$ cd or
$ nano or.h
$ nano routerparse.c
$ nano circuituse.c
$ cd ..
$ sudo su
# torsocks pacman -S asciidoc
# cd config
# cp geoip geoip6 /usr/local/share/tor/
# exit
$ cd ..
$ ./autogen.sh
$ ./configure
$ make
$ cd ..
$ mv tor ~/tor/tor_git
$ cd ~/bin
$ ln -s ~/tor/tor_git/src/or/tor tor_git
$ cd ~
$ tor_git &
$ fg 1
$ (CNTRL + C) ^C


Anonymous 01/15/2017 (Sun) 22:04:32 [Preview] No. 797 del
is there reason to use torsocks over git's builtin socks5 proxy?

wouldn't it be better if you just register 127.0.0.1:your_tor_port as http.proxy and https.proxy variable by git config?

Not sure what revision of git your distro ships with but using torsocks should be considered depreciated hack for applications with builtin socks5 proxy support.


Reop from source Endwall 08/09/2017 (Wed) 22:53:08 [Preview] No. 999 del
Install REOP from Source
###############################################
$ mkdir -p ~/src
$ cd ~/src
$ endget --no-check-certificate https://www.tedunangst.com/flak/files/reop-3.0-snapshot.tar.gz
$ tar -xvf reop-3.0-snapshot.tar.gz
$ cd reop
$ ./configure
$ make
$ ./reop --help
$ cd ~/bin
$ ln -s ~/src/reop/reop reop
$ export PATH=$HOME/bin:$PATH
$ reop --help

Generate a key pair
$ cd ~
$ mkdir -p crypto
$ cd crypto
$ mkdir -p reop
$ cd reop
$ pwd
~/crypto/reop
$ reop -G -i endwall
Enter a passphrase:

$ ls ~/.reop
pubkey seckey

Encrypt / Decrypt
$ cd ~/crypto/reop
$ echo "This is the message" >> message
$ reop -E -i endwall -p ~/.reop/pubkey -m message
passphrase:
$ ls
message message.enc
$ reop -D -p ~/.reop/pubkey -m decrypt -x message.enc
passphrase:
$ ls
message message.enc decrypt
$ cat message
$ cat message.enc
$ cat decrypt

Useful for encrypting passwords.txt file on an air gap for passwords generated using passgen

#########################################################
Edited last time by Endwall on 08/09/2017 (Wed) 22:57:34.


newfag 01/20/2018 (Sat) 11:21:06 [Preview] No.1102 del
>>707
do i need to run tor as:
tor_stable -f /usr/local/etc/torrc-defaults ?
or does it do that automatically?


Endwall 01/22/2018 (Mon) 07:47:47 [Preview] No.1104 del
>>1102

It should just work automatically. Start tor like this and read the console output

$ tor_stable &

It should say where it is reading the torrc and torrc-defaults from in the console output lines.


Anonymous 02/15/2018 (Thu) 04:28:39 [Preview] No.1127 del
>>1102
>>1104
Neat trick if you don't want your desktop littered with shells:

$ tor_stable &disown; exit;



Top | Catalog | Post a reply | Magrathea | Return