Sorry for the late reply, I couldn't get to the forums all day today. Anyway, here is a rough draft of an SME7 tor/privoxy howto. Suggestions/corrections/comments are welcome.
SME 7 Tor/Privoxy HowToThe recommended way to run tor is to use it in combination with privoxy. The benefit of this combination is that not only do you get a degree of anonymity when browsing the web on the tor network, you can enjoy an ad free experience as well with privoxy.
1. Download the privoxy RPM from
http://sourceforge.net/project/showfiles.php?group_id=11118 . As of this writing privoxy 3.0.5 is in beta, I use the stable 3.0.3 RPM for Fedora Core 1.
2. Download the latest tor Red Hat RPM from
http://tor.eff.org/download-unix.html.en. Currently tor is at version 0.1.1.24.
3. Download the libevent RPM from the Dag repository. Tor 0.1.1.24 requires libevent 1.1b, so look for libevent-1.1b-1.el4.rf.i386.rpm.
http://dag.wieers.com/packages/libevent/4. Put all of the RPMs into an empty directory, cd into the directory and run
yum localinstall *.rpm
5. This howto assumes you will NOT be running a tor server; that is, configuring your server to be a middleman or exit node on the tor network. If you don't know what this means, don't worry. Some of the following instructions were taken from here
http://tor.eff.org/docs/tor-doc-unix.html.en.
Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out the following two lines by inserting a # before the line. In section 1.5 comment out the line
logfile logfile
and in section 1.6 comment out the line
jarfile jarfile
The instructions on the Tor page assume that we're installing tor on the same machine we use for web browsing. In our case, we're installing it on our SME server for use by the whole network. So we need to modify the listen address. Find section 4.1 in the privoxy config file and change the listen-address line to, assuming your server's internal IP is 192.168.1.1, this:
listen-address 192.168.1.1:8118
Then scroll down to section 5.2 and add the line
forward-socks4a / localhost:9050 .
at the bottom of the section. Don't forget to add the dot at the end.
Save /etc/privoxy/config .
6. Now we need to make some changes to SME so that tor and privoxy run automatically at startup. From the command line:
config set privoxy service status enabled
config set tor service status enabled
then
ln -s /etc/rc.d/init.d/e-smith-service /etc/rc7.d/S84privoxy
ln -s /etc/rc.d/init.d/e-smith-service /etc/rc7.d/S90tor
7. Then we reboot the server like this:
signal-event post-upgrade
signal-event reboot
8. When our SME server comes back online, tor and privoxy should be running. Now a critical step; we can not use SME's built in HTTP proxy, squid, if we want to preserve our anonymity. More information can be found here
http://wiki.noreply.org/noreply/TheOnionRouter/SquidWarning. I've tested this myself and they're not kidding. So, in the server-manager we need to disable the HTTP proxy in the Security > Proxy settings pane.
9. Now we need to set up our web browser. Information about torifying other applications can be found here
http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO.
Assuming we're using firefox, click on Edit > Preferences > General > Connection Settings > Manual proxy configuration and enter your server's internal IP address in the HTTP, SSL, FTP, Gopher, and SOCKS host fields. In the port field of HTTP, SSL, FTP, and Gopher enter 8118. IN the port field of SOCKS, enter 9050. Then select the SOCKS v5 radio button. Other web browsers can be easily set up using the this information.
10. Finally, we're ready to surf anonymously. To make sure that we're set up correctly, browse over to
http://ipid.shat.net. You should see an IP address that is NOT your own external IP address. Also browse over to
http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1. Assuming that the exit node you're connected to is registered properly on the tor network, you should see a page confirming that you are on the tor network.
----------
Notes:
1. The tor network tends to be slow. Sometimes connections don't complete at all. If you want to be a part of the solution to this problem, consider running a tor server. Info here:
http://tor.eff.org/docs/tor-doc-server.html.en2. You should not assume that the tor/privoxy combination makes you totally anonymous on the internet; it doesn't. Other steps that one can take are beyond the scope of this howto.
3. For tor related discussion, consider subscribing to the or-talk mailing list here:
http://archives.seul.org/or/talk/