mirror of
				https://github.com/antitree/private-tor-network
				synced 2025-06-26 18:16:51 +00:00 
			
		
		
		
	Initial push containing dockerfile and scripts to build image
This commit is contained in:
		
							parent
							
								
									f85233493d
								
							
						
					
					
						commit
						f876a87690
					
				
							
								
								
									
										81
									
								
								Dockerfile
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										81
									
								
								Dockerfile
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,81 @@
 | 
			
		||||
#
 | 
			
		||||
# Dockerfile for the Private Tor Network 
 | 
			
		||||
#
 | 
			
		||||
# This is a dockerfile to build a Debian host and
 | 
			
		||||
# compile a version of tor from the Tor apt repos.
 | 
			
		||||
# NOTE: This is a modification of chriswayg's solid
 | 
			
		||||
# base.  
 | 
			
		||||
#
 | 
			
		||||
# Usage:
 | 
			
		||||
#   This works best using a docker compose command so you can run the
 | 
			
		||||
#   necessary other servers for it to talk to. But if you want o run
 | 
			
		||||
#   manually:
 | 
			
		||||
#   
 | 
			
		||||
#   docker run --rm -it -e ROLE=DA antitree/tor-server /bin/bash
 | 
			
		||||
 | 
			
		||||
FROM debian:jessie
 | 
			
		||||
MAINTAINER Antitree antitree@protonmail.com
 | 
			
		||||
 | 
			
		||||
# Sets the nickname if you didn't set one, default ports, and the path
 | 
			
		||||
#  where to mount the key material used by the clients. 
 | 
			
		||||
ENV TOR_NICKNAME=Tor4 \
 | 
			
		||||
    TERM=xterm \
 | 
			
		||||
    TOR_ORPORT=7000 \
 | 
			
		||||
    TOR_DIRPORT=9030 \
 | 
			
		||||
    TOR_DIR=/tor 
 | 
			
		||||
 | 
			
		||||
# Add the official torproject.org Debian Tor repository
 | 
			
		||||
# - this will always build/install the latest stable version
 | 
			
		||||
COPY ./config/tor-apt-sources.list /etc/apt/sources.list.d/
 | 
			
		||||
 | 
			
		||||
# Build & Install:
 | 
			
		||||
# - add the gpg key used to sign the packages
 | 
			
		||||
# - install build dependencies (and nano)
 | 
			
		||||
# - add a 'builder' user for compiling the package as a non-root user
 | 
			
		||||
# - build Tor in ~/debian-packages and install the new Tor package
 | 
			
		||||
# - backup torrc & cleanup all dependencies and caches
 | 
			
		||||
# - adds only 13 MB to the Debian base image (without obfsproxy, which adds another 60 MB)
 | 
			
		||||
# TODO: Allow selection of which version of tor to build
 | 
			
		||||
RUN gpg --keyserver keys.gnupg.net --recv 886DDD89 && \
 | 
			
		||||
    gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add - && \
 | 
			
		||||
    apt-get update && \
 | 
			
		||||
    build_deps="build-essential fakeroot devscripts quilt libssl-dev zlib1g-dev libevent-dev \
 | 
			
		||||
        asciidoc docbook-xml docbook-xsl xmlto dh-apparmor libseccomp-dev dh-systemd \
 | 
			
		||||
        libsystemd-dev pkg-config dh-autoreconf hardening-includes" && \
 | 
			
		||||
    DEBIAN_FRONTEND=noninteractive apt-get -y --no-install-recommends install $build_deps \
 | 
			
		||||
        obfsproxy \
 | 
			
		||||
        tor-geoipdb \
 | 
			
		||||
        init-system-helpers \
 | 
			
		||||
        pwgen \
 | 
			
		||||
        nano && \ 
 | 
			
		||||
    adduser --disabled-password --gecos "" builder && \
 | 
			
		||||
    su builder -c 'mkdir -v ~/debian-packages; cd ~/debian-packages && \
 | 
			
		||||
    apt-get -y source tor && \
 | 
			
		||||
    cd tor-* && \
 | 
			
		||||
    debuild -rfakeroot -uc -us' && \
 | 
			
		||||
    dpkg -i /home/builder/debian-packages/tor_*.deb && \
 | 
			
		||||
    mv -v /etc/tor/torrc /etc/tor/torrc.default && \
 | 
			
		||||
    deluser --remove-home builder && \
 | 
			
		||||
    apt-get -y purge --auto-remove $build_deps && \
 | 
			
		||||
    apt-get clean && rm -r /var/lib/apt/lists/*
 | 
			
		||||
 | 
			
		||||
# Copy the base tor configuration file
 | 
			
		||||
COPY ./config/torrc* /etc/tor/
 | 
			
		||||
 | 
			
		||||
# Copy docker-entrypoint and the fingerprint script
 | 
			
		||||
COPY ./scripts/ /usr/local/bin/
 | 
			
		||||
 | 
			
		||||
# Persist data (Usually don't want this)
 | 
			
		||||
#VOLUME /etc/tor /var/lib/tor
 | 
			
		||||
 | 
			
		||||
# Create the shared directory
 | 
			
		||||
RUN mkdir ${TOR_DIR}
 | 
			
		||||
 | 
			
		||||
# ORPort, DirPort, ObfsproxyPort
 | 
			
		||||
# TODO make these match the env variables
 | 
			
		||||
# TODO is this necessary anymore?
 | 
			
		||||
EXPOSE 9001 9030 54444
 | 
			
		||||
 | 
			
		||||
ENTRYPOINT ["docker-entrypoint"]
 | 
			
		||||
 | 
			
		||||
CMD ["tor", "-f", "/etc/tor/torrc"]
 | 
			
		||||
							
								
								
									
										340
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										340
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,340 @@
 | 
			
		||||
                    GNU GENERAL PUBLIC LICENSE
 | 
			
		||||
                       Version 2, June 1991
 | 
			
		||||
 | 
			
		||||
 Copyright (C) 1989, 1991 Free Software Foundation, Inc., <http://fsf.org/>
 | 
			
		||||
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
 | 
			
		||||
 Everyone is permitted to copy and distribute verbatim copies
 | 
			
		||||
 of this license document, but changing it is not allowed.
 | 
			
		||||
 | 
			
		||||
                            Preamble
 | 
			
		||||
 | 
			
		||||
  The licenses for most software are designed to take away your
 | 
			
		||||
freedom to share and change it.  By contrast, the GNU General Public
 | 
			
		||||
License is intended to guarantee your freedom to share and change free
 | 
			
		||||
software--to make sure the software is free for all its users.  This
 | 
			
		||||
General Public License applies to most of the Free Software
 | 
			
		||||
Foundation's software and to any other program whose authors commit to
 | 
			
		||||
using it.  (Some other Free Software Foundation software is covered by
 | 
			
		||||
the GNU Lesser General Public License instead.)  You can apply it to
 | 
			
		||||
your programs, too.
 | 
			
		||||
 | 
			
		||||
  When we speak of free software, we are referring to freedom, not
 | 
			
		||||
price.  Our General Public Licenses are designed to make sure that you
 | 
			
		||||
have the freedom to distribute copies of free software (and charge for
 | 
			
		||||
this service if you wish), that you receive source code or can get it
 | 
			
		||||
if you want it, that you can change the software or use pieces of it
 | 
			
		||||
in new free programs; and that you know you can do these things.
 | 
			
		||||
 | 
			
		||||
  To protect your rights, we need to make restrictions that forbid
 | 
			
		||||
anyone to deny you these rights or to ask you to surrender the rights.
 | 
			
		||||
These restrictions translate to certain responsibilities for you if you
 | 
			
		||||
distribute copies of the software, or if you modify it.
 | 
			
		||||
 | 
			
		||||
  For example, if you distribute copies of such a program, whether
 | 
			
		||||
gratis or for a fee, you must give the recipients all the rights that
 | 
			
		||||
you have.  You must make sure that they, too, receive or can get the
 | 
			
		||||
source code.  And you must show them these terms so they know their
 | 
			
		||||
rights.
 | 
			
		||||
 | 
			
		||||
  We protect your rights with two steps: (1) copyright the software, and
 | 
			
		||||
(2) offer you this license which gives you legal permission to copy,
 | 
			
		||||
distribute and/or modify the software.
 | 
			
		||||
 | 
			
		||||
  Also, for each author's protection and ours, we want to make certain
 | 
			
		||||
that everyone understands that there is no warranty for this free
 | 
			
		||||
software.  If the software is modified by someone else and passed on, we
 | 
			
		||||
want its recipients to know that what they have is not the original, so
 | 
			
		||||
that any problems introduced by others will not reflect on the original
 | 
			
		||||
authors' reputations.
 | 
			
		||||
 | 
			
		||||
  Finally, any free program is threatened constantly by software
 | 
			
		||||
patents.  We wish to avoid the danger that redistributors of a free
 | 
			
		||||
program will individually obtain patent licenses, in effect making the
 | 
			
		||||
program proprietary.  To prevent this, we have made it clear that any
 | 
			
		||||
patent must be licensed for everyone's free use or not licensed at all.
 | 
			
		||||
 | 
			
		||||
  The precise terms and conditions for copying, distribution and
 | 
			
		||||
modification follow.
 | 
			
		||||
 | 
			
		||||
                    GNU GENERAL PUBLIC LICENSE
 | 
			
		||||
   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
 | 
			
		||||
 | 
			
		||||
  0. This License applies to any program or other work which contains
 | 
			
		||||
a notice placed by the copyright holder saying it may be distributed
 | 
			
		||||
under the terms of this General Public License.  The "Program", below,
 | 
			
		||||
refers to any such program or work, and a "work based on the Program"
 | 
			
		||||
means either the Program or any derivative work under copyright law:
 | 
			
		||||
that is to say, a work containing the Program or a portion of it,
 | 
			
		||||
either verbatim or with modifications and/or translated into another
 | 
			
		||||
language.  (Hereinafter, translation is included without limitation in
 | 
			
		||||
the term "modification".)  Each licensee is addressed as "you".
 | 
			
		||||
 | 
			
		||||
Activities other than copying, distribution and modification are not
 | 
			
		||||
covered by this License; they are outside its scope.  The act of
 | 
			
		||||
running the Program is not restricted, and the output from the Program
 | 
			
		||||
is covered only if its contents constitute a work based on the
 | 
			
		||||
Program (independent of having been made by running the Program).
 | 
			
		||||
Whether that is true depends on what the Program does.
 | 
			
		||||
 | 
			
		||||
  1. You may copy and distribute verbatim copies of the Program's
 | 
			
		||||
source code as you receive it, in any medium, provided that you
 | 
			
		||||
conspicuously and appropriately publish on each copy an appropriate
 | 
			
		||||
copyright notice and disclaimer of warranty; keep intact all the
 | 
			
		||||
notices that refer to this License and to the absence of any warranty;
 | 
			
		||||
and give any other recipients of the Program a copy of this License
 | 
			
		||||
along with the Program.
 | 
			
		||||
 | 
			
		||||
You may charge a fee for the physical act of transferring a copy, and
 | 
			
		||||
you may at your option offer warranty protection in exchange for a fee.
 | 
			
		||||
 | 
			
		||||
  2. You may modify your copy or copies of the Program or any portion
 | 
			
		||||
of it, thus forming a work based on the Program, and copy and
 | 
			
		||||
distribute such modifications or work under the terms of Section 1
 | 
			
		||||
above, provided that you also meet all of these conditions:
 | 
			
		||||
 | 
			
		||||
    a) You must cause the modified files to carry prominent notices
 | 
			
		||||
    stating that you changed the files and the date of any change.
 | 
			
		||||
 | 
			
		||||
    b) You must cause any work that you distribute or publish, that in
 | 
			
		||||
    whole or in part contains or is derived from the Program or any
 | 
			
		||||
    part thereof, to be licensed as a whole at no charge to all third
 | 
			
		||||
    parties under the terms of this License.
 | 
			
		||||
 | 
			
		||||
    c) If the modified program normally reads commands interactively
 | 
			
		||||
    when run, you must cause it, when started running for such
 | 
			
		||||
    interactive use in the most ordinary way, to print or display an
 | 
			
		||||
    announcement including an appropriate copyright notice and a
 | 
			
		||||
    notice that there is no warranty (or else, saying that you provide
 | 
			
		||||
    a warranty) and that users may redistribute the program under
 | 
			
		||||
    these conditions, and telling the user how to view a copy of this
 | 
			
		||||
    License.  (Exception: if the Program itself is interactive but
 | 
			
		||||
    does not normally print such an announcement, your work based on
 | 
			
		||||
    the Program is not required to print an announcement.)
 | 
			
		||||
 | 
			
		||||
These requirements apply to the modified work as a whole.  If
 | 
			
		||||
identifiable sections of that work are not derived from the Program,
 | 
			
		||||
and can be reasonably considered independent and separate works in
 | 
			
		||||
themselves, then this License, and its terms, do not apply to those
 | 
			
		||||
sections when you distribute them as separate works.  But when you
 | 
			
		||||
distribute the same sections as part of a whole which is a work based
 | 
			
		||||
on the Program, the distribution of the whole must be on the terms of
 | 
			
		||||
this License, whose permissions for other licensees extend to the
 | 
			
		||||
entire whole, and thus to each and every part regardless of who wrote it.
 | 
			
		||||
 | 
			
		||||
Thus, it is not the intent of this section to claim rights or contest
 | 
			
		||||
your rights to work written entirely by you; rather, the intent is to
 | 
			
		||||
exercise the right to control the distribution of derivative or
 | 
			
		||||
collective works based on the Program.
 | 
			
		||||
 | 
			
		||||
In addition, mere aggregation of another work not based on the Program
 | 
			
		||||
with the Program (or with a work based on the Program) on a volume of
 | 
			
		||||
a storage or distribution medium does not bring the other work under
 | 
			
		||||
the scope of this License.
 | 
			
		||||
 | 
			
		||||
  3. You may copy and distribute the Program (or a work based on it,
 | 
			
		||||
under Section 2) in object code or executable form under the terms of
 | 
			
		||||
Sections 1 and 2 above provided that you also do one of the following:
 | 
			
		||||
 | 
			
		||||
    a) Accompany it with the complete corresponding machine-readable
 | 
			
		||||
    source code, which must be distributed under the terms of Sections
 | 
			
		||||
    1 and 2 above on a medium customarily used for software interchange; or,
 | 
			
		||||
 | 
			
		||||
    b) Accompany it with a written offer, valid for at least three
 | 
			
		||||
    years, to give any third party, for a charge no more than your
 | 
			
		||||
    cost of physically performing source distribution, a complete
 | 
			
		||||
    machine-readable copy of the corresponding source code, to be
 | 
			
		||||
    distributed under the terms of Sections 1 and 2 above on a medium
 | 
			
		||||
    customarily used for software interchange; or,
 | 
			
		||||
 | 
			
		||||
    c) Accompany it with the information you received as to the offer
 | 
			
		||||
    to distribute corresponding source code.  (This alternative is
 | 
			
		||||
    allowed only for noncommercial distribution and only if you
 | 
			
		||||
    received the program in object code or executable form with such
 | 
			
		||||
    an offer, in accord with Subsection b above.)
 | 
			
		||||
 | 
			
		||||
The source code for a work means the preferred form of the work for
 | 
			
		||||
making modifications to it.  For an executable work, complete source
 | 
			
		||||
code means all the source code for all modules it contains, plus any
 | 
			
		||||
associated interface definition files, plus the scripts used to
 | 
			
		||||
control compilation and installation of the executable.  However, as a
 | 
			
		||||
special exception, the source code distributed need not include
 | 
			
		||||
anything that is normally distributed (in either source or binary
 | 
			
		||||
form) with the major components (compiler, kernel, and so on) of the
 | 
			
		||||
operating system on which the executable runs, unless that component
 | 
			
		||||
itself accompanies the executable.
 | 
			
		||||
 | 
			
		||||
If distribution of executable or object code is made by offering
 | 
			
		||||
access to copy from a designated place, then offering equivalent
 | 
			
		||||
access to copy the source code from the same place counts as
 | 
			
		||||
distribution of the source code, even though third parties are not
 | 
			
		||||
compelled to copy the source along with the object code.
 | 
			
		||||
 | 
			
		||||
  4. You may not copy, modify, sublicense, or distribute the Program
 | 
			
		||||
except as expressly provided under this License.  Any attempt
 | 
			
		||||
otherwise to copy, modify, sublicense or distribute the Program is
 | 
			
		||||
void, and will automatically terminate your rights under this License.
 | 
			
		||||
However, parties who have received copies, or rights, from you under
 | 
			
		||||
this License will not have their licenses terminated so long as such
 | 
			
		||||
parties remain in full compliance.
 | 
			
		||||
 | 
			
		||||
  5. You are not required to accept this License, since you have not
 | 
			
		||||
signed it.  However, nothing else grants you permission to modify or
 | 
			
		||||
distribute the Program or its derivative works.  These actions are
 | 
			
		||||
prohibited by law if you do not accept this License.  Therefore, by
 | 
			
		||||
modifying or distributing the Program (or any work based on the
 | 
			
		||||
Program), you indicate your acceptance of this License to do so, and
 | 
			
		||||
all its terms and conditions for copying, distributing or modifying
 | 
			
		||||
the Program or works based on it.
 | 
			
		||||
 | 
			
		||||
  6. Each time you redistribute the Program (or any work based on the
 | 
			
		||||
Program), the recipient automatically receives a license from the
 | 
			
		||||
original licensor to copy, distribute or modify the Program subject to
 | 
			
		||||
these terms and conditions.  You may not impose any further
 | 
			
		||||
restrictions on the recipients' exercise of the rights granted herein.
 | 
			
		||||
You are not responsible for enforcing compliance by third parties to
 | 
			
		||||
this License.
 | 
			
		||||
 | 
			
		||||
  7. If, as a consequence of a court judgment or allegation of patent
 | 
			
		||||
infringement or for any other reason (not limited to patent issues),
 | 
			
		||||
conditions are imposed on you (whether by court order, agreement or
 | 
			
		||||
otherwise) that contradict the conditions of this License, they do not
 | 
			
		||||
excuse you from the conditions of this License.  If you cannot
 | 
			
		||||
distribute so as to satisfy simultaneously your obligations under this
 | 
			
		||||
License and any other pertinent obligations, then as a consequence you
 | 
			
		||||
may not distribute the Program at all.  For example, if a patent
 | 
			
		||||
license would not permit royalty-free redistribution of the Program by
 | 
			
		||||
all those who receive copies directly or indirectly through you, then
 | 
			
		||||
the only way you could satisfy both it and this License would be to
 | 
			
		||||
refrain entirely from distribution of the Program.
 | 
			
		||||
 | 
			
		||||
If any portion of this section is held invalid or unenforceable under
 | 
			
		||||
any particular circumstance, the balance of the section is intended to
 | 
			
		||||
apply and the section as a whole is intended to apply in other
 | 
			
		||||
circumstances.
 | 
			
		||||
 | 
			
		||||
It is not the purpose of this section to induce you to infringe any
 | 
			
		||||
patents or other property right claims or to contest validity of any
 | 
			
		||||
such claims; this section has the sole purpose of protecting the
 | 
			
		||||
integrity of the free software distribution system, which is
 | 
			
		||||
implemented by public license practices.  Many people have made
 | 
			
		||||
generous contributions to the wide range of software distributed
 | 
			
		||||
through that system in reliance on consistent application of that
 | 
			
		||||
system; it is up to the author/donor to decide if he or she is willing
 | 
			
		||||
to distribute software through any other system and a licensee cannot
 | 
			
		||||
impose that choice.
 | 
			
		||||
 | 
			
		||||
This section is intended to make thoroughly clear what is believed to
 | 
			
		||||
be a consequence of the rest of this License.
 | 
			
		||||
 | 
			
		||||
  8. If the distribution and/or use of the Program is restricted in
 | 
			
		||||
certain countries either by patents or by copyrighted interfaces, the
 | 
			
		||||
original copyright holder who places the Program under this License
 | 
			
		||||
may add an explicit geographical distribution limitation excluding
 | 
			
		||||
those countries, so that distribution is permitted only in or among
 | 
			
		||||
countries not thus excluded.  In such case, this License incorporates
 | 
			
		||||
the limitation as if written in the body of this License.
 | 
			
		||||
 | 
			
		||||
  9. The Free Software Foundation may publish revised and/or new versions
 | 
			
		||||
of the General Public License from time to time.  Such new versions will
 | 
			
		||||
be similar in spirit to the present version, but may differ in detail to
 | 
			
		||||
address new problems or concerns.
 | 
			
		||||
 | 
			
		||||
Each version is given a distinguishing version number.  If the Program
 | 
			
		||||
specifies a version number of this License which applies to it and "any
 | 
			
		||||
later version", you have the option of following the terms and conditions
 | 
			
		||||
either of that version or of any later version published by the Free
 | 
			
		||||
Software Foundation.  If the Program does not specify a version number of
 | 
			
		||||
this License, you may choose any version ever published by the Free Software
 | 
			
		||||
Foundation.
 | 
			
		||||
 | 
			
		||||
  10. If you wish to incorporate parts of the Program into other free
 | 
			
		||||
programs whose distribution conditions are different, write to the author
 | 
			
		||||
to ask for permission.  For software which is copyrighted by the Free
 | 
			
		||||
Software Foundation, write to the Free Software Foundation; we sometimes
 | 
			
		||||
make exceptions for this.  Our decision will be guided by the two goals
 | 
			
		||||
of preserving the free status of all derivatives of our free software and
 | 
			
		||||
of promoting the sharing and reuse of software generally.
 | 
			
		||||
 | 
			
		||||
                            NO WARRANTY
 | 
			
		||||
 | 
			
		||||
  11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
 | 
			
		||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.  EXCEPT WHEN
 | 
			
		||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
 | 
			
		||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
 | 
			
		||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 | 
			
		||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS
 | 
			
		||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE
 | 
			
		||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
 | 
			
		||||
REPAIR OR CORRECTION.
 | 
			
		||||
 | 
			
		||||
  12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
 | 
			
		||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
 | 
			
		||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
 | 
			
		||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
 | 
			
		||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
 | 
			
		||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
 | 
			
		||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
 | 
			
		||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
 | 
			
		||||
POSSIBILITY OF SUCH DAMAGES.
 | 
			
		||||
 | 
			
		||||
                     END OF TERMS AND CONDITIONS
 | 
			
		||||
 | 
			
		||||
            How to Apply These Terms to Your New Programs
 | 
			
		||||
 | 
			
		||||
  If you develop a new program, and you want it to be of the greatest
 | 
			
		||||
possible use to the public, the best way to achieve this is to make it
 | 
			
		||||
free software which everyone can redistribute and change under these terms.
 | 
			
		||||
 | 
			
		||||
  To do so, attach the following notices to the program.  It is safest
 | 
			
		||||
to attach them to the start of each source file to most effectively
 | 
			
		||||
convey the exclusion of warranty; and each file should have at least
 | 
			
		||||
the "copyright" line and a pointer to where the full notice is found.
 | 
			
		||||
 | 
			
		||||
    {description}
 | 
			
		||||
    Copyright (C) {year}  {fullname}
 | 
			
		||||
 | 
			
		||||
    This program is free software; you can redistribute it and/or modify
 | 
			
		||||
    it under the terms of the GNU General Public License as published by
 | 
			
		||||
    the Free Software Foundation; either version 2 of the License, or
 | 
			
		||||
    (at your option) any later version.
 | 
			
		||||
 | 
			
		||||
    This program is distributed in the hope that it will be useful,
 | 
			
		||||
    but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
			
		||||
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
			
		||||
    GNU General Public License for more details.
 | 
			
		||||
 | 
			
		||||
    You should have received a copy of the GNU General Public License along
 | 
			
		||||
    with this program; if not, write to the Free Software Foundation, Inc.,
 | 
			
		||||
    51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 | 
			
		||||
 | 
			
		||||
Also add information on how to contact you by electronic and paper mail.
 | 
			
		||||
 | 
			
		||||
If the program is interactive, make it output a short notice like this
 | 
			
		||||
when it starts in an interactive mode:
 | 
			
		||||
 | 
			
		||||
    Gnomovision version 69, Copyright (C) year name of author
 | 
			
		||||
    Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
 | 
			
		||||
    This is free software, and you are welcome to redistribute it
 | 
			
		||||
    under certain conditions; type `show c' for details.
 | 
			
		||||
 | 
			
		||||
The hypothetical commands `show w' and `show c' should show the appropriate
 | 
			
		||||
parts of the General Public License.  Of course, the commands you use may
 | 
			
		||||
be called something other than `show w' and `show c'; they could even be
 | 
			
		||||
mouse-clicks or menu items--whatever suits your program.
 | 
			
		||||
 | 
			
		||||
You should also get your employer (if you work as a programmer) or your
 | 
			
		||||
school, if any, to sign a "copyright disclaimer" for the program, if
 | 
			
		||||
necessary.  Here is a sample; alter the names:
 | 
			
		||||
 | 
			
		||||
  Yoyodyne, Inc., hereby disclaims all copyright interest in the program
 | 
			
		||||
  `Gnomovision' (which makes passes at compilers) written by James Hacker.
 | 
			
		||||
 | 
			
		||||
  {signature of Ty Coon}, 1 April 1989
 | 
			
		||||
  Ty Coon, President of Vice
 | 
			
		||||
 | 
			
		||||
This General Public License does not permit incorporating your program into
 | 
			
		||||
proprietary programs.  If your program is a subroutine library, you may
 | 
			
		||||
consider it more useful to permit linking proprietary applications with the
 | 
			
		||||
library.  If this is what you want to do, use the GNU Lesser General
 | 
			
		||||
Public License instead of this License.
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2
									
								
								config/tor-apt-sources.list
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								config/tor-apt-sources.list
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,2 @@
 | 
			
		||||
deb http://deb.torproject.org/torproject.org jessie main
 | 
			
		||||
deb-src http://deb.torproject.org/torproject.org jessie main
 | 
			
		||||
							
								
								
									
										86
									
								
								config/torr.working
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								config/torr.working
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,86 @@
 | 
			
		||||
### /etc/torrc ### 
 | 
			
		||||
# see /etc/torrc/torrc.default and https://www.torproject.org/docs/tor-manual.html.en
 | 
			
		||||
 | 
			
		||||
# Server's public IP Address (usually automatic)
 | 
			
		||||
#Address 10.10.10.10
 | 
			
		||||
 | 
			
		||||
# Port to advertise for incoming Tor connections. 
 | 
			
		||||
# common ports are 9001, 443
 | 
			
		||||
#ORPort 9001
 | 
			
		||||
 | 
			
		||||
# Mirror directory information for others (optional)
 | 
			
		||||
# common ports are 9030, 80
 | 
			
		||||
#DirPort 9030 
 | 
			
		||||
 | 
			
		||||
# Run as a relay only (not as an exit node)
 | 
			
		||||
#ExitPolicy reject *:*         # no exits allowed
 | 
			
		||||
 | 
			
		||||
# Set limits
 | 
			
		||||
#RelayBandwidthRate 1024 KB   # Throttle traffic to
 | 
			
		||||
#RelayBandwidthBurst 2048 KB  # But allow bursts up to
 | 
			
		||||
#MaxMemInQueues 512 MB        # Limit Memory usage to
 | 
			
		||||
 | 
			
		||||
# Run Tor as obfuscated bridge
 | 
			
		||||
#ServerTransportPlugin obfs3 exec /usr/bin/obfsproxy managed
 | 
			
		||||
#ServerTransportListenAddr obfs3  0.0.0.0:54444
 | 
			
		||||
#BridgeRelay 1
 | 
			
		||||
 | 
			
		||||
# Run Tor only as a server (no local applications)
 | 
			
		||||
SocksPort 0
 | 
			
		||||
 | 
			
		||||
# Run Tor as a regular user (do not change this)
 | 
			
		||||
User debian-tor
 | 
			
		||||
# If no Nickname or ContactInfo is set, docker-entrypoint will use 
 | 
			
		||||
# the environment variables to add Nickname/ContactInfo here 
 | 
			
		||||
#Nickname Tor4                 # only use letters and numbers
 | 
			
		||||
#ContactInfo email@example.org
 | 
			
		||||
 | 
			
		||||
# Private tor network configuration
 | 
			
		||||
TestingTorNetwork 1
 | 
			
		||||
RunAsDaemon 0
 | 
			
		||||
ConnLimit 60
 | 
			
		||||
ShutdownWaitLength 0
 | 
			
		||||
PidFile /var/lib/tor/pid
 | 
			
		||||
Log notice stdout
 | 
			
		||||
 | 
			
		||||
ProtocolWarnings 1
 | 
			
		||||
SafeLogging 0
 | 
			
		||||
DisableDebuggerAttachment 0
 | 
			
		||||
 | 
			
		||||
# An exit policy that allows exiting to IPv4 LAN
 | 
			
		||||
#ExitPolicy accept *:*
 | 
			
		||||
 | 
			
		||||
# An exit policy that allows exiting to IPv6 localhost
 | 
			
		||||
#ExitPolicy accept [::1]:*
 | 
			
		||||
#IPv6Exit 1
 | 
			
		||||
 | 
			
		||||
ServerDNSAllowBrokenConfig 1
 | 
			
		||||
DirAllowPrivateAddresses 1
 | 
			
		||||
EnforceDistinctSubnets 0
 | 
			
		||||
AssumeReachable 1
 | 
			
		||||
AuthDirMaxServersPerAddr 0
 | 
			
		||||
AuthDirMaxServersPerAuthAddr 0
 | 
			
		||||
ClientDNSRejectInternalAddresses 0
 | 
			
		||||
ClientRejectInternalAddresses 0
 | 
			
		||||
CountPrivateBandwidth 1
 | 
			
		||||
ExitPolicyRejectPrivate 0
 | 
			
		||||
ExtendAllowPrivateAddresses 1
 | 
			
		||||
V3AuthVotingInterval 5 minutes
 | 
			
		||||
V3AuthVoteDelay 20 seconds
 | 
			
		||||
V3AuthDistDelay 20 seconds
 | 
			
		||||
MinUptimeHidServDirectoryV2 0 seconds
 | 
			
		||||
TestingEstimatedDescriptorPropagationTime 0 minutes
 | 
			
		||||
TestingServerDownloadSchedule 0, 0, 0, 5, 10, 15, 20, 30, 60
 | 
			
		||||
TestingClientDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
 | 
			
		||||
TestingServerConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
 | 
			
		||||
TestingClientConsensusDownloadSchedule 0, 0, 5, 10, 15, 20, 30, 60
 | 
			
		||||
TestingBridgeDownloadSchedule 60, 30, 30, 60
 | 
			
		||||
TestingClientMaxIntervalWithoutRequest 5 seconds
 | 
			
		||||
TestingDirConnectionMaxStall 30 seconds
 | 
			
		||||
TestingConsensusMaxDownloadTries 80
 | 
			
		||||
TestingDescriptorMaxDownloadTries 80
 | 
			
		||||
TestingMicrodescMaxDownloadTries 80
 | 
			
		||||
TestingCertMaxDownloadTries 80
 | 
			
		||||
TestingEnableConnBwEvent 1
 | 
			
		||||
TestingEnableCellStatsEvent 1
 | 
			
		||||
TestingEnableTbEmptyEvent 1
 | 
			
		||||
							
								
								
									
										49
									
								
								config/torrc
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										49
									
								
								config/torrc
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,49 @@
 | 
			
		||||
# Run Tor as a regular user (do not change this)
 | 
			
		||||
User debian-tor
 | 
			
		||||
 | 
			
		||||
TestingTorNetwork 1
 | 
			
		||||
 | 
			
		||||
## Comprehensive Bootstrap Testing Options ##
 | 
			
		||||
# These typically launch a working minimal Tor network in 25s-30s,
 | 
			
		||||
# and a working HS Tor network in 40-45s.
 | 
			
		||||
# See authority.tmpl for a partial explanation
 | 
			
		||||
#AssumeReachable 0
 | 
			
		||||
#Default PathsNeededToBuildCircuits 0.6
 | 
			
		||||
#Disable TestingDirAuthVoteExit
 | 
			
		||||
#Disable TestingDirAuthVoteHSDir
 | 
			
		||||
#Default V3AuthNIntervalsValid 3
 | 
			
		||||
 | 
			
		||||
## Rapid Bootstrap Testing Options ##
 | 
			
		||||
# These typically launch a working minimal Tor network in 6s-10s
 | 
			
		||||
# These parameters make tor networks bootstrap fast,
 | 
			
		||||
# but can cause consensus instability and network unreliability
 | 
			
		||||
# (Some are also bad for security.)
 | 
			
		||||
AssumeReachable 1
 | 
			
		||||
PathsNeededToBuildCircuits 0.25
 | 
			
		||||
TestingDirAuthVoteExit *
 | 
			
		||||
TestingDirAuthVoteHSDir *
 | 
			
		||||
V3AuthNIntervalsValid 2
 | 
			
		||||
 | 
			
		||||
## Always On Testing Options ##
 | 
			
		||||
# We enable TestingDirAuthVoteGuard to avoid Guard stability requirements
 | 
			
		||||
TestingDirAuthVoteGuard *
 | 
			
		||||
# We set TestingMinExitFlagThreshold to 0 to avoid Exit bandwidth requirements
 | 
			
		||||
TestingMinExitFlagThreshold 0
 | 
			
		||||
# VoteOnHidServDirectoriesV2 needs to be set for HSDirs to get the HSDir flag
 | 
			
		||||
#Default VoteOnHidServDirectoriesV2 1
 | 
			
		||||
 | 
			
		||||
## Options that we always want to test ##
 | 
			
		||||
Sandbox 1
 | 
			
		||||
 | 
			
		||||
# Private tor network configuration
 | 
			
		||||
RunAsDaemon 0
 | 
			
		||||
ConnLimit 60
 | 
			
		||||
ShutdownWaitLength 0
 | 
			
		||||
#PidFile /var/lib/tor/pid
 | 
			
		||||
Log info stdout
 | 
			
		||||
ProtocolWarnings 1
 | 
			
		||||
SafeLogging 0
 | 
			
		||||
DisableDebuggerAttachment 0
 | 
			
		||||
 | 
			
		||||
DirPortFrontPage /usr/share/doc/tor/tor-exit-notice.html
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										40
									
								
								config/torrc.da
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										40
									
								
								config/torrc.da
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,40 @@
 | 
			
		||||
AuthoritativeDirectory 1
 | 
			
		||||
V3AuthoritativeDirectory 1
 | 
			
		||||
 | 
			
		||||
# Speed up the consensus cycle as fast as it will go
 | 
			
		||||
# Voting Interval can be:
 | 
			
		||||
#   10, 12, 15, 18, 20, 24, 25, 30, 36, 40, 45, 50, 60, ...
 | 
			
		||||
# Testing Initial Voting Interval can be:
 | 
			
		||||
#    5,  6,  8,  9, or any of the possible values for Voting Interval,
 | 
			
		||||
# as they both need to evenly divide 30 minutes.
 | 
			
		||||
# If clock desynchronisation is an issue, use an interval of at least:
 | 
			
		||||
#   18 * drift in seconds, to allow for a clock slop factor
 | 
			
		||||
TestingV3AuthInitialVotingInterval 300
 | 
			
		||||
#V3AuthVotingInterval 15
 | 
			
		||||
# VoteDelay + DistDelay must be less than VotingInterval
 | 
			
		||||
TestingV3AuthInitialVoteDelay 5
 | 
			
		||||
V3AuthVoteDelay 5
 | 
			
		||||
TestingV3AuthInitialDistDelay 5
 | 
			
		||||
V3AuthDistDelay 5
 | 
			
		||||
# This is autoconfigured by chutney, so you probably don't want to use it
 | 
			
		||||
#TestingV3AuthVotingStartOffset 0
 | 
			
		||||
 | 
			
		||||
# Work around situations where the Exit, Guard and HSDir flags aren't being set
 | 
			
		||||
# These flags are all set eventually, but it takes Guard up to ~30 minutes
 | 
			
		||||
# We could be more precise here, but it's easiest just to vote everything
 | 
			
		||||
# Clients are sensible enough to filter out Exits without any exit ports,
 | 
			
		||||
# and Guards and HSDirs without ORPorts
 | 
			
		||||
# If your tor doesn't recognise TestingDirAuthVoteExit/HSDir,
 | 
			
		||||
# either update your chutney to a 2015 version,
 | 
			
		||||
# or update your tor to a later version, most likely 0.2.6.2-final
 | 
			
		||||
 | 
			
		||||
# These are all set in common.i in the Comprehensive/Rapid sections
 | 
			
		||||
# Work around Exit requirements
 | 
			
		||||
#TestingDirAuthVoteExit *
 | 
			
		||||
# Work around bandwidth thresholds for exits
 | 
			
		||||
#TestingMinExitFlagThreshold 0
 | 
			
		||||
# Work around Guard uptime requirements
 | 
			
		||||
#TestingDirAuthVoteGuard *
 | 
			
		||||
# Work around HSDir uptime and ORPort connectivity requirements
 | 
			
		||||
#TestingDirAuthVoteHSDir *
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										50
									
								
								docker-compose.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										50
									
								
								docker-compose.yml
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,50 @@
 | 
			
		||||
version: '2'
 | 
			
		||||
services:
 | 
			
		||||
 da:
 | 
			
		||||
  image: antitree/tor-server
 | 
			
		||||
  #restart: always
 | 
			
		||||
  expose:
 | 
			
		||||
    - "7000"
 | 
			
		||||
    - "9030"
 | 
			
		||||
    - "54444"
 | 
			
		||||
  environment:
 | 
			
		||||
    ## set your Nickname here (only use letters and numbers)
 | 
			
		||||
    #TOR_NICKNAME: DA1
 | 
			
		||||
    ROLE: DA
 | 
			
		||||
    ## an email address to contact you
 | 
			
		||||
    #CONTACT_EMAIL: email@example.org
 | 
			
		||||
  volumes:
 | 
			
		||||
    ## mount custom torrc / secret_id_key here
 | 
			
		||||
    - ./tor:/tor
 | 
			
		||||
 relay:
 | 
			
		||||
  image: antitree/tor-server
 | 
			
		||||
  expose:
 | 
			
		||||
    - "7000"
 | 
			
		||||
    - "9030"
 | 
			
		||||
  environment:
 | 
			
		||||
    ROLE: RELAY
 | 
			
		||||
  volumes:
 | 
			
		||||
    - ./tor:/tor
 | 
			
		||||
  depends_on:
 | 
			
		||||
    - da
 | 
			
		||||
 exit:
 | 
			
		||||
  image: antitree/tor-server
 | 
			
		||||
  expose:
 | 
			
		||||
    - "7000"
 | 
			
		||||
    - "9030"
 | 
			
		||||
  environment:
 | 
			
		||||
    ROLE: EXIT
 | 
			
		||||
  volumes:
 | 
			
		||||
    - ./tor:/tor
 | 
			
		||||
  depends_on:
 | 
			
		||||
    - da
 | 
			
		||||
 client:
 | 
			
		||||
  image: antitree/tor-server
 | 
			
		||||
  ports:
 | 
			
		||||
    - "9050:9050"
 | 
			
		||||
  volumes:
 | 
			
		||||
    - ./tor:/tor
 | 
			
		||||
  environment:
 | 
			
		||||
    ROLE: CLIENT
 | 
			
		||||
  depends_on: 
 | 
			
		||||
    - da
 | 
			
		||||
							
								
								
									
										12
									
								
								scripts/da_fingerprint
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										12
									
								
								scripts/da_fingerprint
									
									
									
									
									
										Executable file
									
								
							@ -0,0 +1,12 @@
 | 
			
		||||
#!/bin/sh
 | 
			
		||||
# version 2
 | 
			
		||||
TOR_NICK=$(grep "^Nick" /etc/tor/torrc | awk -F ' ' '{print $2}')
 | 
			
		||||
AUTH=$(grep "fingerprint" $TOR_DIR/$TOR_NICK/keys/* | awk -F " " '{print $2}')
 | 
			
		||||
NICK=$(cat $TOR_DIR/$TOR_NICK/fingerprint| awk -F " " '{print $1}')
 | 
			
		||||
RELAY=$(cat $TOR_DIR/$TOR_NICK/fingerprint|awk -F " " '{print $2}')
 | 
			
		||||
SERVICE=$(grep "dir-address" $TOR_DIR/$TOR_NICK/keys/* | awk -F " " '{print $2}')
 | 
			
		||||
IPADDR=$(ip addr | grep 'state UP' -A2 | tail -n1 | awk '{print $2}' | cut -f1  -d'/')
 | 
			
		||||
 | 
			
		||||
TORRC="DirAuthority $NICK orport=${TOR_ORPORT} no-v2 v3ident=$AUTH $SERVICE  $RELAY"
 | 
			
		||||
 | 
			
		||||
echo $TORRC
 | 
			
		||||
							
								
								
									
										117
									
								
								scripts/docker-entrypoint
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										117
									
								
								scripts/docker-entrypoint
									
									
									
									
									
										Executable file
									
								
							@ -0,0 +1,117 @@
 | 
			
		||||
#!/bin/bash
 | 
			
		||||
set -o errexit
 | 
			
		||||
 | 
			
		||||
# Fudge the sleep to try and keep the consensus
 | 
			
		||||
#FUDGE=$(( ( RANDOM % 100) + 20 ))
 | 
			
		||||
FUDGE=10
 | 
			
		||||
 | 
			
		||||
echo -e "\n========================================================"
 | 
			
		||||
# If DataDirectory or secret_id_key is mounted here, it must be owned by the debian-tor user
 | 
			
		||||
chown -Rv debian-tor:debian-tor ${TOR_DIR}
 | 
			
		||||
 | 
			
		||||
if [ ! -e /tor-config-done ]; then
 | 
			
		||||
    touch /tor-config-done   # only run this once
 | 
			
		||||
 | 
			
		||||
    # Set appropriate network information
 | 
			
		||||
    
 | 
			
		||||
 | 
			
		||||
    # Add a Nickname, if none has been set in torrc
 | 
			
		||||
    if ! grep -q '^Nickname ' /etc/tor/torrc; then
 | 
			
		||||
        if [ ${TOR_NICKNAME} == "Tor4" ]; then
 | 
			
		||||
            # if user did not change the default Nickname, genetrate a random pronounceable one
 | 
			
		||||
            RPW=$(pwgen -0A 10)
 | 
			
		||||
            export TOR_NICKNAME=${ROLE}${RPW}
 | 
			
		||||
            echo "Setting random Nickname: ${TOR_NICKNAME}"
 | 
			
		||||
        else
 | 
			
		||||
            echo "Setting chosen Nickname: ${TOR_NICKNAME}"
 | 
			
		||||
        fi
 | 
			
		||||
        echo -e "\nNickname ${TOR_NICKNAME}" >> /etc/tor/torrc
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Add ContactInfo from env variable, if none has been set in torrc
 | 
			
		||||
    if ! grep -q '^ContactInfo ' /etc/tor/torrc; then
 | 
			
		||||
        if [  -n "${CONTACT_EMAIL}" ]; then
 | 
			
		||||
            echo "Setting Contact Email: ${CONTACT_EMAIL}"
 | 
			
		||||
            echo -e "\nContactInfo ${CONTACT_EMAIL}" >> /etc/tor/torrc
 | 
			
		||||
        fi
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc
 | 
			
		||||
 | 
			
		||||
    case ${ROLE} in
 | 
			
		||||
      DA)
 | 
			
		||||
        echo "Setting role to DA"
 | 
			
		||||
	cat /etc/tor/torrc.da >> /etc/tor/torrc
 | 
			
		||||
	#if [ -n "${TOR_ORPORT}" ]; then
 | 
			
		||||
	#  TOR_ORPORT=${TOR_ORPORT}
 | 
			
		||||
        #else
 | 
			
		||||
	#  TOR_ORPORT=7000
 | 
			
		||||
 	#fi
 | 
			
		||||
	echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc
 | 
			
		||||
	echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc
 | 
			
		||||
	#echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc
 | 
			
		||||
	echo -e "ExitPolicy accept *:*" >> /etc/tor/torrc
 | 
			
		||||
	KEYPATH=${TOR_DIR}/${TOR_NICKNAME}/keys
 | 
			
		||||
	mkdir -p ${KEYPATH}
 | 
			
		||||
	TOR_IP=$(ip addr | grep 'state UP' -A2 | tail -n1 | awk '{print $2}' | cut -f1 -d'/')
 | 
			
		||||
	echo "Address ${TOR_IP}" >> /etc/tor/torrc
 | 
			
		||||
	chown -Rv debian-tor:debian-tor ${TOR_DIR}
 | 
			
		||||
	echo "password" | tor-gencert --create-identity-key -m 12 -a ${TOR_IP}:${TOR_DIRPORT} \
 | 
			
		||||
            -i ${KEYPATH}/authority_identity_key \
 | 
			
		||||
            -s ${KEYPATH}/authority_signing_key \
 | 
			
		||||
            -c ${KEYPATH}/authority_certificate \
 | 
			
		||||
	    --passphrase-fd 0
 | 
			
		||||
	chown -Rv debian-tor:debian-tor ${TOR_DIR}
 | 
			
		||||
	tor --list-fingerprint --orport 1 \
 | 
			
		||||
    	    --dirserver "x 127.0.0.1:1 ffffffffffffffffffffffffffffffffffffffff" \
 | 
			
		||||
	    --datadirectory ${TOR_DIR}/${TOR_NICKNAME}
 | 
			
		||||
	echo "Saving DA fingerprint to shared path"
 | 
			
		||||
	da_fingerprint >> ${TOR_DIR}/torrc.da
 | 
			
		||||
	echo "Waiting for other DA's to come up..."
 | 
			
		||||
	sleep $FUDGE
 | 
			
		||||
	cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc
 | 
			
		||||
        ;;
 | 
			
		||||
      RELAY)
 | 
			
		||||
        echo "Setting role to RELAY"
 | 
			
		||||
 	echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc
 | 
			
		||||
        echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc
 | 
			
		||||
        #echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc
 | 
			
		||||
        echo -e "ExitPolicy accept 172.18.0.0/16:*" >> /etc/tor/torrc
 | 
			
		||||
 | 
			
		||||
        echo "Waiting for other DA's to come up..."
 | 
			
		||||
        sleep $FUDGE
 | 
			
		||||
        cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc
 | 
			
		||||
	;;
 | 
			
		||||
      EXIT)
 | 
			
		||||
        echo "Setting role to EXIT"
 | 
			
		||||
        echo -e "OrPort ${TOR_ORPORT}" >> /etc/tor/torrc
 | 
			
		||||
        echo -e "Dirport ${TOR_DIRPORT}" >> /etc/tor/torrc
 | 
			
		||||
        #echo -e "DataDirectory ${TOR_DIR}/${TOR_NICKNAME}" >> /etc/tor/torrc
 | 
			
		||||
        echo -e "ExitPolicy accept *:*" >> /etc/tor/torrc
 | 
			
		||||
	 echo "Waiting for other DA's to come up..."
 | 
			
		||||
        sleep $FUDGE
 | 
			
		||||
        cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc
 | 
			
		||||
        ;;
 | 
			
		||||
      CLIENT)
 | 
			
		||||
        echo "Setting role to CLIENT"
 | 
			
		||||
	echo -e "SOCKSPort 0.0.0.0:9050" >> /etc/tor/torrc
 | 
			
		||||
	#chown -Rv debian-tor:debian-tor ${TOR_DIR}
 | 
			
		||||
	sleep $FUDGE
 | 
			
		||||
	cat ${TOR_DIR}/torrc.da >> /etc/tor/torrc
 | 
			
		||||
        ;;
 | 
			
		||||
      *)
 | 
			
		||||
        echo "Role variable missing"
 | 
			
		||||
        exit 1
 | 
			
		||||
        ;;
 | 
			
		||||
    esac
 | 
			
		||||
 | 
			
		||||
fi
 | 
			
		||||
 | 
			
		||||
echo -e "\n========================================================"
 | 
			
		||||
# display Tor version & torrc in log
 | 
			
		||||
tor --version
 | 
			
		||||
cat /etc/tor/torrc
 | 
			
		||||
echo -e "========================================================\n"
 | 
			
		||||
 | 
			
		||||
# else default to run whatever the user wanted like "bash"
 | 
			
		||||
exec "$@"
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user