Page 1 of 1

Anyone using the Tor service on the command line in Puppy?

Posted: Sat Dec 16, 2023 3:05 pm
by houndstooth

I installed it from the repository, then was compelled to add the torsocks package as it wasn't recognized.

This has you changing settings that produce a warning (skeptical):
https://justhackerthings.com/post/using ... mand-line/

here:
Dec 16 21:08:01.690 [warn] ControlPort is open, but no authentication method has been configured. This means that any program on your computer can reconfigure your Tor. That's bad! You should upgrade your Tor controller as soon as possible.

specifically for Fossa:
https://linuxconfig.org/install-tor-pro ... 0-04-linux

It might work in Ubuntu but figured Puppy might have special needs.

Why are Tor & a browser necessarily combined? I mean, shouldn't Tor Browser include the command line service by default?


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 7:38 am
by Jasper

I managed to get it working:

viewtopic.php?p=85236&hilit=tor#p85236


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 7:54 am
by houndstooth
Jasper wrote: Sun Dec 17, 2023 7:38 am

I managed to get it working:

viewtopic.php?p=85236&hilit=tor#p85236

I should try Fossa. These are my 32 Xenial results:

Code: Select all

root# torsocks on
Tor mode activated. Every command will be torified for this shell.
root# torsocks -a 135.148.52.158
BusyBox v1.24.2 (2016-05-06 19:02:43 BST) multi-call binary.

Usage: which [COMMAND]...

Locate a COMMAND
ERROR: -a cannot be found.
root# 

It's looking for -a which seems you're using as an option.

Code: Select all

root# torsocks ipet.sh
[Dec 17 16:09:36] ERROR torsocks[31536]: [socks5] Resolve destination buffer too small (in socks5_recv_resolve_reply() at socks5.c:690)

root# 

ipet.sh is just a cli script for my external IP.

[UPDATE]

magic! (different command) :idea:

Code: Select all

root# torify ipet.sh
95.211.210.103
root# 

That is not my IP.

The only thing I've done since reading your post is turn torsocks on.

[UPDATE, UPDATE]

That only worked once. :(

Code: Select all

root# torify ipet.sh
[Dec 17 16:54:39] ERROR torsocks[4658]: [socks5] Resolve destination buffer too small (in socks5_recv_resolve_reply() at socks5.c:690)

Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 11:22 am
by Jasper

@houndstooth

I have reinstalled the Pet files I uploaded previously and then updated Tor to their current release (tor-0.4.8.10).

Image

Then I opening up terminal I started up Tor and then Torsocks.

Finally tested it using UGet to download a podcast.

Image


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 11:58 am
by Jasper

.


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 3:02 pm
by houndstooth
Jasper wrote: Sun Dec 17, 2023 11:58 am

@houndstooth

Have you changed the values in the torrc file?

port?

much simpler output:

Code: Select all

root# tor --version
Tor version 0.2.9.14.
root# 

If we have version output we presume Tor is running?

Next I entered tor while terminal is not returning to prompt.

[last lines]:

Code: Select all

Dec 17 22:45:36.000 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
Dec 17 22:45:36.000 [notice] Bootstrapped 100%: Done

[hang]

Perhaps I needed & to background it.

Should I have entered a difference start command? tor on?

32 Xenial vs. 64 Fossa may be apples:oranges, but I have had luck running old versions of Tor Browser, oldest lately v7 up to v10. I have run v3.6 not too long ago (Tahr default) connected to the network. Connecting old at the terminal seems reasonable.

I expect a different experience in Fossa.


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 4:34 pm
by Jasper

@houndstooth

Which Puppy version are the responses from?

iie outputs

I am using FP95.

Ultimately, what are trying to achieve?

Would a VPN be useful?


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sun Dec 17, 2023 5:35 pm
by houndstooth

@Jasper

If I am not missing something basic, don't knock yourself out. I know everybody has a lot going on.

32-bit Xenial 7.5
Kernel 4.4.95

Like your podcast, just file transfer over Tor in a preferred distro. VPN works, though I am curious the speed differential. I will get to it somewhere eventually. It seems like an esoteric function only mentioned by you that a lot of users would appreciate.


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Sat Jan 27, 2024 4:56 am
by Subito Piano

Hi -- interesting to find this (so quickly!).

I'm wanting to run Thunderbird email through Tor. This can be done simply by changing a few settings in T-bird and running it with the Tor browser also running in the background; however, I'd like to minimize resources by NOT opening the browser -- just the Tor service. Reading the above, is this all I need to do?

  • Via PPM, install Tor and Torsocks

  • open a terminal and issue command "tor"

  • open another tab or terminal, issue command "torsocks on"

FYI, this is the terminal readout for each command:

Code: Select all

root# tor
ERROR: ld.so: object '/usr/lib/x86_64-linux-gnu/' from LD_PRELOAD cannot be preloaded (cannot read file data): ignored.
Jan 26 23:31:26.390 [notice] Tor 0.4.2.7 running on Linux with Libevent 2.1.11-stable, OpenSSL 1.1.1f, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.4.4.
Jan 26 23:31:26.390 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Jan 26 23:31:26.390 [notice] Read configuration file "/etc/tor/torrc".
Jan 26 23:31:26.391 [notice] Opening Socks listener on 127.0.0.1:9050
Jan 26 23:31:26.391 [notice] Opened Socks listener on 127.0.0.1:9050
Jan 26 23:31:26.000 [warn] You are running Tor as root. You don't need to, and you probably shouldn't.
Jan 26 23:31:26.000 [notice] Bootstrapped 0% (starting): Starting
Jan 26 23:31:26.000 [notice] Starting with guard context "default"
Jan 26 23:31:27.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Jan 26 23:31:27.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Jan 26 23:31:43.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Jan 26 23:31:43.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Jan 26 23:31:43.000 [notice] Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
Jan 26 23:31:43.000 [notice] Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
Jan 26 23:31:44.000 [notice] Bootstrapped 30% (loading_status): Loading networkstatus consensus
Jan 26 23:31:45.000 [notice] I learned some more directory information, but not enough to build a circuit: We have no usable consensus.
Jan 26 23:31:45.000 [notice] Bootstrapped 40% (loading_keys): Loading authority key certs
Jan 26 23:31:45.000 [notice] The current consensus has no exit nodes. Tor can only build internal paths, such as paths to onion services.
Jan 26 23:31:45.000 [notice] Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
Jan 26 23:31:45.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 0/7850, and can only build 0% of likely paths. (We have 0% of guards bw, 0% of midpoint bw, and 0% of end bw (no exits in consensus, using mid) = 0% of path bw.)
Jan 26 23:31:46.000 [notice] Bootstrapped 50% (loading_descriptors): Loading relay descriptors
Jan 26 23:31:47.000 [notice] The current consensus contains exit nodes. Tor can build exit and internal paths.
Jan 26 23:31:49.000 [notice] Bootstrapped 56% (loading_descriptors): Loading relay descriptors
Jan 26 23:31:49.000 [notice] Bootstrapped 62% (loading_descriptors): Loading relay descriptors
Jan 26 23:31:49.000 [notice] Bootstrapped 71% (loading_descriptors): Loading relay descriptors
Jan 26 23:31:49.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Jan 26 23:31:49.000 [notice] Bootstrapped 80% (ap_conn): Connecting to a relay to build circuits
Jan 26 23:31:49.000 [notice] Bootstrapped 85% (ap_conn_done): Connected to a relay to build circuits
Jan 26 23:31:49.000 [notice] Bootstrapped 89% (ap_handshake): Finishing handshake with a relay to build circuits
Jan 26 23:31:49.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Jan 26 23:31:49.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit

Code: Select all

root# torsocks on
ERROR: ld.so: object '/usr/lib/x86_64-linux-gnu/' from LD_PRELOAD cannot be preloaded (cannot read file data): ignored.
Tor mode activated. Every command will be torified for this shell.
root#

Of course, it should be no problem to write a script for these two commands and put it in startup.

So -- is this correct or am I missing something?

As always, thanks for the help!!

EDIT: I learned a little more. Thunderbird will not send messages or receive them if I issue the above commands; however, if I start the Tor browser, I do send and receive; I don't have to visit a website, just start the browser. However, IDK how to check to see if T-bird is actually going through Tor. I strongly suspect so, but would like to make certain. Thoughts/insight/suggestions appreciated.


Re: Anyone using the Tor service on the command line in Puppy?

Posted: Mon Jan 29, 2024 1:41 am
by Subito Piano

Ach! Silly me! Image I read too quickly and used the wrong port. All seems to be well now. So anyone wishing to run T-bird though Tor and not through the Tor browser -- using 90% less CPU -- the instructions are here. Just don't rush through it like I did at first....