Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/szorfein/spior
(Spider|Tor) A tool to make TOR your default gateway.
https://github.com/szorfein/spior
anonymity anonymize iptables privacy ruby tor
Last synced: about 2 months ago
JSON representation
(Spider|Tor) A tool to make TOR your default gateway.
- Host: GitHub
- URL: https://github.com/szorfein/spior
- Owner: szorfein
- License: mit
- Created: 2020-04-26T15:17:07.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-10-22T06:48:20.000Z (2 months ago)
- Last Synced: 2024-10-23T02:56:07.070Z (2 months ago)
- Topics: anonymity, anonymize, iptables, privacy, ruby, tor
- Language: Ruby
- Homepage:
- Size: 191 KB
- Stars: 4
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
Awesome Lists containing this project
README
# Spior
[![Gem Version](https://badge.fury.io/rb/spior.svg)](https://badge.fury.io/rb/spior)
![GitHub Workflow Status (branch)](https://img.shields.io/github/workflow/status/szorfein/spior/Rubocop/devel)
[![Ruby Style Guide](https://img.shields.io/badge/code_style-rubocop-brightgreen.svg)](https://github.com/rubocop/rubocop)
![GitHub](https://img.shields.io/github/license/szorfein/spior)(Spider|Tor) A tool to redirect all your local traffic to the [Tor](https://www.torproject.org/) network.
## Install
Spior is cryptographically signed, so add my public key (if you haven’t already) as a trusted certificate.$ gem cert --add <(curl -Ls https://raw.githubusercontent.com/szorfein/spior/master/certs/szorfein.pem)
And install the gem:
$ gem install spior -P MediumSecurity
Or user wide (Spior will use `sudo`, `doas` will be supported in next release)
$ gem install --user-install spior
## Requirements
Spior use `iptables` and `tor`, which can be installed with (if your distro is supported):$ spior --install
## Configuration
Spior look the /etc/tor/torrc for any of:```conf
DNSPort 9061
TransPort 9040
VirtualAddrNetworkIpv4 10.192.0.0/10
```You can customize any of theses variables.
When using `spior -c | --clearnet`, if you want Spior load custom iptables rules, place
them at `/etc/iptables/simple_firewall.rules`.## Usage
$ spior -h
### Examples
Redirect traffic through TOR:$ spior --tor
Change your ip address by reloading the TOR circuit:
$ spior --reload
Look informations about your current ip address:
$ spior --status
Return to clearnet navigation
$ spior --clearnet
## Left Over
### [Check for Leak](https://github.com/brainfucksec/kalitorify#checking-for-leaks)
### Troubleshoooting
When you enable the `--persist` mode, Spior try to block ipv6 with sysctl. It can fail on some system, so you may need to manually disable ipv6 via kernel argument.
An exemple with GRUB, edit `/etc/default/grub.cfg` and change the line bellow:```
GRUB_CMDLINE_LINUX_DEFAULT="ipv6.disable=1 quiet"
```Reload grub after that `grub-mkconfig -o /boot/grub/grub.cfg`
### Issues
For any questions, comments, feedback or issues, submit a [new issue](https://github.com/szorfein/spior/issues/new).### links
+ https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy
+ https://github.com/epidemics-scepticism/writing/blob/master/misconception.md
+ [in perl - Nipe](https://github.com/htrgouvea/nipe)
+ [in bash - Kalitorify](https://github.com/brainfucksec/kalitorify)