forked from ParrotSec/anonsurf
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtorrc
executable file
·67 lines (51 loc) · 2.35 KB
/
torrc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
## Set the username
User tor
##define virtual network mask
VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
AutomapHostsSuffixes .exit,.onion
#define tor ports and explicitly declare some security flags
TransPort 127.0.0.1:9040 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr
SocksPort 127.0.0.1:9050 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr
ControlPort 9051
HashedControlPassword 16:FDE8ED505C45C8BA602385E2CA5B3250ED00AC0920FEC1230813A1F86F
#use tor to resolve domain names
DNSPort 127.0.0.1:53
#daemonize
#RunAsDaemon 1
## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
DataDirectory /var/lib/tor
#move log to /tmp to prevent digital evidences to be stored on disk ;)
Log notice file /tmp/anonsurf-tor.log
#use hardware accaleration when possible for crypto
HardwareAccel 1
#socket safety hacks
TestSocks 1
AllowNonRFC953Hostnames 0
WarnPlaintextPorts 23,109,110,143,80
#dns safety hacks
ClientRejectInternalAddresses 1
#circuit hacks
NewCircuitPeriod 40
MaxCircuitDirtiness 600
MaxClientCircuitsPending 48
UseEntryGuards 1
UseEntryGuardsAsDirGuards 1
EnforceDistinctSubnets 1
# ok, it is a bit complex, so i will spend more words here:
# this option means that tor will try to use the previously used
# exit node for these domains, this is helpful in case of
# websites with sessions related to your IP that may change
# their behavior if your ip changes, but this option may help
# websites to associate all your actions to a single
# navigation session, by watching your IP.
#
# We decided to use it for the following addresses
# because they track you anyway by using cookies
# (so they will know who you are even if you
# change IP), so we decided to use the IP of the
# same exit node in order to not let these services
# map your exit nodes pool, so they will know
# only one of the exit nodes in your pool.
TrackHostExits .facebook.com,.facebook.net,.twitter.com,.fbcdn.com,.fbcdn.net,.akamaihd.com,.google.com,.google.it,.google.fr,.google.de,.google.br,.google.no,.google.se,.yandex.ru,.yandex.com,.gmail.com,.googleapis.com,.gstatic.com,.adform.net,.google-analitics.com,.googletagservices.com,.cloudflare.com,.akamaihd.com,.akamai.com,.cloudfront.net,.cloudfront.com,.cloudflare.com