Tor Router allow you to use TOR as a transparent proxy and send all your trafic under TOR INCLUDING DNS REQUESTS, the only that you need is: a system using systemd (if you want to use the service) and tor.
TOR router doesn’t touch system files as the rest of tools for routing your taffic does and the reason is: there isn’t needed to move files for routing traffic, also moving files is a bad idea since that a fail in the script/tool can break your system connection without you knowing what has happened.
Note: Tor-router doesn’t route UDP packets because TOR doesn’t support it: https://2019.www.torproject.org/docs/faq.html.en#TransportIPnotTCP
Script to install on distros using SystemD only
If you are using BlackArch Linux (https://blackarch.org) you can install the script from the repos using the following command:
To install from source:
Note that you need BASH, not sh
In distros using systemd, you should consideer using the install.sh script, anyways the process to install/configure tor-router is described here.
It script require root privileges
- Open a terminal and clone the script using the following command:
- Put the following lines at the end of /etc/tor/torrc
- Restart the tor service
- Execute the tor-router script as root
- Now all your traffic is under TOR, you can check that in the following pages: https://check.torproject.org and for DNS tests: https://dnsleaktest.com
- In order to automate the process of the script, you should add it to the SYSTEM autostart scripts according that the init that you are using, for systemd we have a .service file in the files folder.
Delete the tor-router configuration lines in /etc/tor/torrc, disable the tor-router.service using systemctl (if you used the install.sh script), remove /usr/bin/tor-router, /etc/systemd/system/tor-router.service and restart your computer.
- Tor-router actually only support IPv4 traffic, support for IPv6 traffic will be added soon. (See https://github.com/Edu4rdSHL/tor-router/issues/1)
Proof of concept
After of run the script, follow the next steps to ensure that all is working as expected:
- Ip hidden and TOR network configured: Visit https://check.torproject.org, you should see a message like it:
- Checking DNS Leaks: Visit https://dnsleaktest.com and make a extended test to see what are your DNS. You shloud get some like it: