Exploring the SelekTOR front end for the Tor anonymity tool
Hiding from Spies
If you want to exploit protection through the anonymous Tor router fully, you need to delve deep into the underlying technologies. The SelekTOR front end saves you much of that effort.
Tor, which was originally known as "The Onion Router," [1] is an anonymous networking solution that has recently gained popularity as a means to avoid government snooping and commercial behavior tracking. A Tor client, running on a desktop system, routes traffic to an anonymous network consisting of Tor nodes.
Tor relies on the onion principle (Figure 1) and redirects the traffic through three nodes, changing the route every 10 minutes. The Tor Browser Bundle comes with a preconfigured combination of the Firefox web browser, the Tor client, and Tor Launcher.
The complete Tor package lets you surf the web in relative anonymity and use services such as email, instant messaging, IRC, SSH, and P2P. Although the Tor project offers its own user interface for its anonymous router in the form of Vidalia, the alternative SelekTOR front end provides some functions that Vidalia lacks. For example, SelekTOR offers semi-automatic configuration of the Tor client, as well as a choice of exit nodes sorted by country.
In this article, I show how to configure and use the SelekTOR front end. I'll assume you have some basic familiarity with Tor. For an introduction to the Tor anonymity solution, see the project website [2]. The developer points out that SelekTOR is only an interface for the Tor client and launcher, not a substitute for the Tor browser.
Requirements
SelekTOR supports Firefox or its offshoot Pale Moon, as well as Opera and Chrome or Chromium, with no additional plugins. The program does require an installed Java runtime environment (JRE) 7 or its free implementation, OpenJRE 1.7. Only the next version of the software will have Java 8 support.
If Vidalia is already installed, you must remove it before using SelekTOR. You also need to remove any existing older version of SelekTOR before installing the new version. The current SelekTOR 3 (November 2014 version) release has a version number of 3.12-11.
Although the software was written in Java, separate versions exist for Linux and Windows, and only the Windows version comes with the Tor software (see the "Installing SelekTOR" box). The software works with all major desktop environments on Linux.
Installing SelekTOR
SelekTOR naturally requires Tor as a basis. Most distributions have Tor in their repositories, so you can set it up normally through the package manager. Otherwise, download Tor from the project site [3].
Debian and Debian-derivative users now have a ready-made .deb
package that handles the dependencies of the tor and tor-geoipdb packages. SelekTOR's own internal network functions now go over Tor, preventing any possible DNS leakage.
Because SelekTOR will take over the task of starting Tor, you should disable the onion router's start mechanism. To do so, replace RUN_DAEMON="yes"
with RUN_DAEMON="no"
in the /etc/default/tor
file. Then, stop the service by typing sudo service tor stop
.
SelekTOR usually appears in the menu of the respective desktop after installation. Alternatively, you can run it as a normal user in the console using the selektor
command.
Defining Exit Nodes
After starting the SelekTOR GUI, first make sure that Tor has started correctly. After restarting the browser, you can visit the Tor check site to do so [4]. You can then see whether you are visiting the site with or without Tor. You should also see an IP address that differs from the external address otherwise allocated for this connection.
SelekTOR is suitable for several applications. In addition to its role as a Tor launcher, it offers you the option of defining the exit nodes yourself. Exit nodes are the Tor servers through which the packets leave the Tor network and enter the normal Internet ("clearnet"). They are a vulnerability in the Tor system, because if you use an unencrypted connection, an attacker can crack your anonymity by sniffing the exit nodes, provided they have sufficient resources and perseverance. However, they have to do so in less than 10 minutes, because Tor then automatically switches the route.
With SelekTOR, you can select the exit node from a list sorted by country (Figure 2). Additionally, the software offers a selective routing based on URL patterns. These patterns rely on PAC files (proxy auto-config) [5] for different websites to use the most appropriate proxy automatically.
Put simply, a proxy is a broker that routes requests through its own address before passing them on to their actual origin in order to obfuscate the original source. The PACs include the hostname and the port number of a proxy in a few lines of Java code. They are mostly on servers on the Internet but can also be operated locally. This setup allows users in countries whose governments block certain websites to use them anyway. SelekTOR includes a Proxy Pattern Editor (under Menu) that lets you create, edit, import, and export PAC files.
SelekTOR also tries to optimize the function of the Tor client by continuously monitoring the connections and using the exit nodes with the best response times. The software integrates the WHOIS protocol for querying information about Internet domains and IP addresses and their owners (Figure 3). With the release of version 3.12-11, whois
became an integrated web application; therefore, like Atlas [6], which visualizes information on Tor relays (Figure 4), it can be initiated in the browser and sent via Tor.
Conclusions
SelekTOR simplifies use of the Tor client in many ways and makes using Tor more transparent for the user. Additionally, the software lets you bypass restrictions of a political or commercial nature when accessing web pages. In doing so, SelekTOR handles the configuration for most applications unobtrusively in the background, instead of overwhelming the user with what can be a difficult task.
During testing in the lab, SelekTOR provided its service perfectly after resolving some troubles caused by bugs. If problems occur during use, contact the friendly and helpful developer [7]. While researching this article, I collaborated with the developer on removing some minor bugs.
Infos
- Onion routing: http://en.wikipedia.org/wiki/Onion_routing
- SelekTOR: http://www.dazzleships.net/?page_id=71
- Downloading Tor: https://www.torproject.org/download/download-unix.html.en
- Tor check: https://check.torproject.org
- PAC: http://en.wikipedia.org/wiki/Proxy_auto-config
- Atlas: https://atlas.torproject.org
- Contact: http://www.dazzleships.net/?page_id=247
Buy this article as PDF
(incl. VAT)