wk TOR list find blog view edit


SocksPort 9050
# SocksBindAddress

# entry, exit, introduction
AllowUnverifiedNodes middle,rendezvous

Log notice syslog

#RunAsDaemon 0
#User tor

DataDirectory /var/lib/tor

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80

# enable transparent dns proxy
AutomapHostsOnResolve 1
# public onion dns server
DNSPort 53

Each service is associated to an onion address. Check /var/lb/tor/hidden_service/* to know your address and get the RSA key.

accelerate connections... probably insecure
CircuitBuildTimeout 10

Configure tsocks

$ cat /etc/tor/tor-tsocks.conf
server =
server_port = 9050
tordns_enable = true

local =
local =
local =

Remember to use your local DNS resolver if you don't want to leak DNS resolutions to your ISP or Google ;)

echo nameserver > /etc/resolv.conf

Use $ torify <your-program> to use the tor network... remember to edit your /etc/resolv.conf to resolve DNS using the tor foo

Use this pac file to configure your browser.
on iPhone settings->wireless->Auto->url


$ curl http://radare.org/tor.pac
function FindProxyForURL(url, host) {
var ip = dnsResolve(host);
if (isInNet (ip, "","")) {
return "SOCKS";
return "DIRECT";

install tor package for this cydia repo:


Some useful urls:

search onion sites: http://ahmia.fi
duck duck go: http://3g2upl4pq6kufc4m.onion/

[h2]Configure exit node[/h2]

Bridge relays (or "bridges" for short) are Tor relays that aren't listed in the main Tor directory.

# Plain Bridge Configuration
 SocksPort 0
 ORPort 443
 BridgeRelay 1
 Exitpolicy reject *:*

Strict exit nodes

ExitNodes server1, server2, server3
StrictExitNodes 1