TOR SSH

To connect to a server using ssh through Tor from a computer that does not have proxychains, tsocks or torify installed, you can run:

ssh -o ProxyCommand='nc -x [tor_server]:[tor_port] %h %p' [ssh_server]

For example, if you have a standard install of Tor on your own computer and want to log in to example.com, you can run:

ssh -o ProxyCommand='nc -x 0:9050 %h %p' example.com

or use TorSocks

http://code.google.com/p/torsocks/

NOTE : You may have to change the port for TOR from 9050 to match your TOR’s SOCKS address or need to edit it’s config

 

I’m on OSX or Linux and I want to run another application through the Tor launched by Tor Browser Bundle. How do I predict my Socks port?

Typically Tor listens for Socks connections on port 9050. TBB on OSX and Linux has an experimental feature where Tor listens on random unused ports rather than a fixed port each time. The goal is to avoid conflicting with a “system” Tor install, so you can run a system Tor and TBB at the same time. We’re working on a feature where Tor will try the usual ports first and then back off to a random choice if they’re already in use. Until then, if you want to configure some other application to use Tor as a Socks proxy, here’s a workaround:

In Vidalia, go to Settings->Advanced and uncheck the box that says ‘Configure ControlPort automatically’. Click OK and restart TBB. Your Socks port will then be on 9050.