>> (p.1)
    Author Topic: Advanced Tor Browser Bundle config. - Anti-Spying - Anti-ECHELON - Anti-FiveEyes  (Read 51613 times)
    BitcoinFX (OP)
    Legendary
    *
    Offline Offline

    Activity: 2646
    Merit: 1723


    https://youtu.be/DsAVx0u9Cw4 ... Dr. WHO < KLF


    View Profile WWW
    November 11, 2013, 07:24:09 PM
    Last edit: March 18, 2015, 04:56:54 PM by BitcoinFX
     #1

    xeronet Torrc - v4.0.4 - 'Anti-FiveEyes'. xeronet Torrc is a Client Only configuration. - for the Tor Browser Bundle.

    It will not work for Tor Relays, Bridge Nodes or Exit Nodes and nor is it designed to be used for that purpose.

    See: https://www.torproject.org/download/download-easy.html

    On my xeronet proxy websites I publish a custom torrc configuration which aims to make Tor faster, safer and more secure for regular Tor users.

    (I've recently lost my web hosting account with the full config. explanations. New website coming soon!)

    I'm working on the latest release, as an update is long overdue, however I've decided to publish this version here for some feedback.

    This version helps to prevent FiveEyes spying by avoiding Tor servers located in USA, UK, Australia, Canada and New Zealand.

    It also helps to avoid censorship by filtering countries that have been found to be using mass censorship of the internet.

    The configuration does this by including only the fastest, most stable and secure Tor servers.

    UPDATED: 18th March 2015 - Added new fast nodes and revised Exclude nodes. New censorship resistant config. (see latest post below)

    Revised country code restriction recommendations: https://bt.irlbtc.com/view/331077.msg10803165#msg10803165

    TBB Firefox advised about:config options: https://bt.irlbtc.com/view/331077.msg10804048#msg10804048

    The Tor Browser Bundle 3.5 upwards has no Vidalia and uses some new Torrc settings:

    DirReqStatistics , DataDirectory and GeoIPFile locations are now written to the torrc on first run.

    New torrc-defaults file should remain unedited i.e.

    Quote
    # If non-zero, try to write to disk less frequently than we would otherwise.
    AvoidDiskWrites 1
    # Where to send logging messages.  Format is minSeverity[-maxSeverity]
    # (stderr|stdout|syslog|file FILENAME).
    Log notice stdout
    # Bind to this address to listen to connections from SOCKS-speaking
    # applications.
    SocksListenAddress 127.0.0.1
    SocksPort 9150
    ControlPort 9151
    CookieAuthentication 1

    See below posts for info. This is the preferred recommended config. for most users.

    Replace the existing torrc file in your Tor Browser Bundle > Data > Tor (folder).

    Code:
    ClientOnly 1

    EnforceDistinctSubnets 0

    EntryNodes AccessNow000,AccessNow001,AccessNow002,AccessNow003,AccessNow004,AccessNow005,AccessNow006,AccessNow007,AccessNow008,AccessNow009,AccessNow010,AccessNow011,AccessNow012,AccessNow013,AccessNow014,AccessNow015,AccessNow016,AccessNow017,AccessNow018,AccessNow019,spfTOR3,spfTOR1e1,spfTOR1e2,spfTOR1e3,spfTOR4e1,spfTOR4e2,spfTOR4e3,spfTOR5e1,spfTOR5e2,spfTOR5e3,orion,orilla,destiny,chulak,aurora,assk,assk2,sofia,amartysen,lumumba,ethanzuckerman,politkovskaja,politkovskaja2,edwardsnowden0,edwardsnowden1,edwardsnowden2,hessel0,hessel1,hessel2,ekumen,marcuse1,marcuse2,marylou1,marylou2,chaoscomputerclub27,chaoscomputerclub28,chaoscomputerclub29,chaoscomputerclub30,atticus,blanqui,thoreau,enjolras,luxemburg,bakunin,jaures,DFRI0,DFRI1,DFRI3,DFRI4,hviv103,hviv104,hviv105,wagtail,toreffiorg

    ExcludeNodes Unnamed,default,{af},{dz},{ao},{am},{az},{bh},{by},{bj},{bn},{mm},{bf},{bi},{kh},{cm},{cf},{td},{cn},{co},{km},{cd},{ci},{cu},{dj},{eg},{gq},{er},{et},{ga},{gm},{ge},{gn},{hn},{hk},{in},{id},{ir},{iq},{jo},{kz},{kw},{kg},{la},{ly},{mo},{mg},{my},{mr},{yt},{mx},{md},{ma},{ng},{ne},{kp},{om},{pk},{ps},{qa},{ru},{rw},{sa},{sn},{sl},{sg},{so},{kr},{lk},{sd},{sz},{sy},{tw},{tj},{th},{tg},{tn},{tr},{tm},{ua},{ae},{uz},{ve},{vn},{ye},{zw},{gb},{ie},{je},{gg},{im},{ai},{bm},{aq},{io},{vg},{ky},{fk},{gi},{ms},{sh},{gs},{tc},{us},{mp},{pr},{vi},{as},{ht},{fm},{gu},{gl},{ca},{au},{cc},{nf},{nz},{tk},{ck},{nu},{cy},{al},{ar},{bt},{bo},{cg},{ec},{fj},{gt},{gw},{il},{ke},{lb},{ls},{lr},{mk},{mw},{mv},{np},{ni},{py},{sc},{ug},{zm},{??}

    ExcludeExitNodes {ag},{bb},{bz},{bw},{bg},{dm},{gh},{gd},{gy},{jm},{ki},{mu},{me},{na},{nr},{pg},{kn},{lc},{vc},{ws},{sb},{so},{sr},{tz},{to},{tt},{tv},{??}

    ExitNodes AccessNow000,AccessNow001,176.10.99.200,AccessNow002,AccessNow003,176.10.99.201,AccessNow004,AccessNow005,176.10.99.202,AccessNow006,AccessNow007,176.10.99.203,AccessNow008,AccessNow009,176.10.99.204,AccessNow010,AccessNow011,176.10.99.205,AccessNow012,AccessNow013,176.10.99.206,AccessNow014,AccessNow015,176.10.99.207,AccessNow016,AccessNow017,176.10.99.208,AccessNow018,AccessNow019,176.10.99.209,spfTOR3,62.220.135.129,spfTOR1e1,77.109.141.138,spfTOR1e2,77.109.141.139,spfTOR1e3,77.109.141.140,spfTOR4e1,77.109.138.42,spfTOR4e2,77.109.138.43,spfTOR4e3,77.109.138.44,spfTOR5e1,77.109.139.26,spfTOR5e2,77.109.139.27,spfTOR5e3,77.109.139.28,orion,94.242.246.24,orilla,94.242.252.41,destiny,94.242.246.23,chulak,176.126.252.11,aurora,176.126.252.12,assk,78.108.63.46,assk2,78.108.63.44,sofia,77.247.181.162,amartysen,lumumba,77.247.181.163,ethanzuckerman,77.247.181.164,politkovskaja,politkovskaja2,77.247.181.165,edwardsnowden0,109.163.234.7,edwardsnowden1,109.163.234.8,edwardsnowden2,109.163.234.9,hessel0,109.163.234.2,hessel1,109.163.234.4,hessel2,109.163.234.5,ekumen,95.142.161.63,marcuse1,178.20.55.16,marcuse2,178.20.55.18,marylou1,marylou2,89.234.157.254,chaoscomputerclub27,77.244.254.227,chaoscomputerclub28,77.244.254.228,chaoscomputerclub29,77.244.254.229,chaoscomputerclub30,77.244.254.230,atticus,46.239.117.180,blanqui,thoreau,46.165.221.166,enjolras,81.89.96.88,luxemburg,81.89.96.89,bakunin,178.16.208.56,jaures,178.16.208.57,DFRI0,171.25.193.20,DFRI1,171.25.193.77,DFRI3,171.25.193.235,DFRI4,171.25.193.78,hviv103,178.162.193.213,hviv104,192.42.116.16,hviv105,79.98.107.90,wagtail,77.109.139.87

    LongLivedPorts 21, 22, 80, 443, 706, 1863, 5050, 5190, 5222, 5223, 6523, 6667, 6697, 8080, 8300, 9001, 9030


    N.B. config. may pause connection if imported before the first run. Just Exit and restart if this happens.

    UseEntryGuards (no longer required - as bundle default).

    StrictNodes (is auto removed from the conf. if 0 - see below).

    FascistFirewall 1 (is recommended for the xeronet Torrc if you can reach the Tor network without using a proxy, as the focus is now on the fastest and safest settings for browsing i.e. using only ports 80 and 443 and corresponding entry and exit servers).

    A detailed explanation of the selected settings was published on my old website which is now offline due to the web host closing down.

    ExcludeNodes are selected from: http://torstatus.blutmagie.de/ 'bad nodes' and country blocks from: https://wikipedia.org/wiki/Internet_censorship

    Many other factors have also been considered with the aim of making Tor faster including excluding relays in countries with slow internet backbone connections etc.

    Entry and Exit nodes have been selected based on numerous factors. These are the 'best', fastest and most secure Tor servers available for browsing via ports 80 and 443. They have again been selected from http://torstatus.blutmagie.de/ The nodes are run by the following Privacy focused organizations, who can be trusted with your data, perhaps over and above other miscellaneous Tor nodes.

    http://privacyfoundation.ch/ - Swiss Privacy Foundation

    https://riseup.net/en - riseup.net

    https://www.ccc.de/en/?language=en - Chaos Computer Club (CCC)

    https://www.torservers.net/ - torservers.net Partners ...

    https://www.accessnow.org/ - Access

    https://www.koumbit.org/ - Koumbit

    https://effi.org/ - Electronic Frontier Finland

    https://nos-oignons.net/ - Nos oignons

    https://calyxinstitute.org/ - The Calyx Institute

    https://www.dfri.se/dfri/?lang=en - DRFI: "Föreningen för Digitala Fri- och Rättigheter" - DFRI is a nonprofit organisation working for digital rights.

    https://www.hartvoorinternetvrijheid.nl/eng.html - Hart voor Internetvrijheid (Heart for Internet freedom).

    http://www.enn.lu/ - Frënn vun der Ënn A.S.B.L.

    http://icetor.is/ - Icetor - Freedom from the frozen north.

    and others ...

    Remember that Tor will still select random servers and middle nodes etc. This example config. just helps to enuse the fastest circuits. If you don't like a setting in this example config. then please change it yourself.


    Here are the important options from the Tor manual:

    Use StrictNodes 1 to enforce the server selection. Currently set to 0 'default'.

    "If StrictNodes is set to 1, Tor will treat the ExcludeNodes option as a requirement to follow for all the circuits you generate, even if doing so will break functionality for you. If StrictNodes is set to 0, Tor will still try to avoid nodes in the ExcludeNodes list, but it will err on the side of avoiding unexpected errors. Specifically, StrictNodes 0 tells Tor that it is okay to use an excluded node when it is necessary to perform relay reachability self-tests, connect to a hidden service, provide a hidden service to a client, fulfil a .exit request, upload directory information, or download directory information. (Default: 0)"

    You can set StrictNodes to 1 to make browsing faster and completely avoid 'FiveEyes' and internet censored countries, but it will 'break' hidden services if they are located in one of those blocked countries. ~ Ever wondered how the security services locate Tor 'hidden services' ... hummm.

    Use FascistFirewall 1 to force port 80 (http) and port 443 (https) access.

    "If 1, Tor will only create outgoing connections to ORs running on ports that your firewall allows (defaults to 80 and 443; see FirewallPorts). This will allow you to run Tor as a client behind a firewall with restrictive policies, but will not allow you to run as a server behind such a firewall. If you prefer more fine-grained control, use ReachableAddresses instead."

    When using this option do make sure that your selected Nodes use port 80 and/or port 443 Also, if your firewall does allow other ports (or you want to connect other applications to Tor) then we do recommend changing FascistFirewall back to 0, as this will automatically 'unlock' additional fast entry nodes already included in the xeronet Torrc list.

    Use UseEntryGuards 1 for increased security.

    "If this option is set to 1, we pick a few long-term entry servers, and try to stick with them. This is desirable because constantly changing servers increases the odds that an adversary who owns some servers will observe a fraction of your paths. (Defaults to 1 anyway)"

    Use ClientOnly 1 for the Tor Browser Bundle.

    "If set to 1, Tor will under no circumstances run as a server or serve directory requests. The default is to run as a client unless ORPort is configured. (Usually, you don’t need to set this; Tor is pretty smart at figuring out whether you are reliable and high-bandwidth enough to be a useful server.) (Default: 0)"

    Using additional LongLivedPorts 80, 443, 9001 and 9030.

    "A list of ports for services that tend to have long-running connections (e.g. chat and interactive shells). Circuits for streams that use these ports will contain only high-uptime nodes, to reduce the chance that a node will go down before the stream is finished. Note that the list is also honoured for circuits (both client and service side) involving hidden services whose virtual port is in this list. (Default: 21, 22, 706, 1863, 5050, 5190, 5222, 5223, 6523, 6667, 6697, 8300)"

    These additions are somewhat experimental, however the overall configuration does seem to work better when including these port settings; especially in relation to the StrictNodes option above where the configuration was found to be much faster overall than when enforcing StrictNodes 1. Thus, we have reverted to using the 'default' StrictNodes 0.

    xeronet Torrc - v4.0.4 - 'Anti-FiveEyes'

    Requires the latest Tor Browser Bundle for correct operation.

    N.B. Save as 'torrc' only and not 'torrc.txt' or just copy paste into your existing torrc file.

    Replace the existing torrc file in your Tor Browser Bundle > Data > Tor (folder).

    The Tor software must not be running when you install our configuration. Start Tor. Done.

    Enjoy super fast Tor !

    xeronet Torrc is a Client Only configuration. - for the Tor Browser Bundle.

    It will not work for Tor Relays, Bridge Nodes or Exit Nodes and nor is it designed to be used for that purpose.

    P.S. I'm looking to set-up some fast Tor servers in censorship resistant countries. If you like this custom Tor configuration please consider a donation until I'm able to set-up a full concept donations page or crowdfunding project.

    Thanks!

    "Tor" and the "Onion Logo" are registered trademarks of The Tor Project, Inc.

    Always Read the Manual: https://www.torproject.org/docs/tor-manual.html > CLIENT OPTIONS

    "Bitcoin OG" 1JXFXUBGs2ZtEDAQMdZ3tkCKo38nT2XSEp | Bitcoin logo™ Enforcer? | Bitcoin is BTC | CSW is NOT Satoshi Nakamoto | I Mine BTC, LTC, ZEC, XMR and GAP | BTC on Tor addnodes Project | Media enquiries : Wu Ming | Enjoy The Money Machine | "You cannot compete with Open Source" and "Cryptography != Banana" | BSV and BCH are COUNTERFEIT.
Page 1
Viewing Page: 1