Это старая версия документа!
Squid+Privoxy+Tor
squid
nano /etc/squid/squid.conf
check_hostnames off acl localnet src 0.0.0.1-0.255.255.255 # RFC 1122 "this" network (LAN) acl localnet src 10.0.0.0/8 # RFC 1918 local private network (LAN) acl localnet src 100.64.0.0/10 # RFC 6598 shared address space (CGN) acl localnet src 169.254.0.0/16 # RFC 3927 link-local (directly plugged) machines acl localnet src 172.16.0.0/12 # RFC 1918 local private network (LAN) acl localnet src 192.168.0.0/16 # RFC 1918 local private network (LAN) #acl localnet src fc00::/7 # RFC 4193 local private network range #acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines ### acl russia_block_list url_regex "/etc/squid/eais.list" acl i2p_list url_regex -i .*://.*\.i2p\/.* acl onion_list url_regex -i .*://.*\.onion\/.* # i2p cache_peer localhost parent 4444 4444 no-digest allow-miss no-query cache_peer_access localhost allow i2p_list # privoxy cache_peer 192.168.1.131 parent 8118 8118 no-digest allow-miss no-query cache_peer_access 192.168.1.131 allow onion_list cache_peer_access 192.168.1.131 allow russia_block_list never_direct allow onion_list never_direct allow i2p_list never_direct allow russia_block_list never_direct deny localnet always_direct deny onion_list always_direct deny i2p_list always_direct deny russia_block_list always_direct allow localnet http_access allow localnet hosts_file /etc/squid/hosts ### acl SSL_ports port 443 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http acl CONNECT method CONNECT http_access deny !Safe_ports http_access deny CONNECT !SSL_ports http_access allow localhost manager http_access deny manager include /etc/squid/conf.d/* http_access allow localhost http_access deny all http_port 3128 coredump_dir /var/spool/squid refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320
Privoxy
nano /etc/privoxy/config
# # https://www.privoxy.org/user-manual/config.html # listen-address 192.168.1.131:8118 #ExitNodes {za} #StrictNodes 1 user-manual /usr/share/doc/privoxy/user-manual confdir /etc/privoxy logdir /var/log/privoxy actionsfile match-all.action # Actions that are applied to all sites and maybe overruled later on. actionsfile default.action # Main actions file actionsfile user.action # User customizations filterfile default.filter filterfile user.filter # User customizations logfile logfile debug 1 # Log the destination for each request. See also debug 1024. debug 2 # show each connection status debug 4 # show tagging-related messages debug 8 # show header parsing #debug 16 # log all data written to the network debug 32 # debug force feature debug 64 # debug regular expression filters debug 128 # debug redirects #debug 256 # debug GIF de-animation debug 512 # Common Log Format debug 1024 # Log the destination for requests Privoxy didn't let through, and the reason why. debug 2048 # CGI user interface debug 4096 # Startup banner and warnings. debug 8192 # Non-fatal errors #debug 32768 # log all data read from the network #debug 65536 # Log the applying actions toggle 1 enable-remote-toggle 0 enable-remote-http-toggle 0 enable-edit-actions 0 enforce-blocks 0 buffer-limit 4096 enable-proxy-authentication-forwarding 0 forward-socks5 / localhost:9050 . # перенаправляем траффик на tor socks proxy (на тор) forward-socks4 / localhost:9050 . # перенаправляем траффик на tor socks proxy (на тор) forward-socks4a / localhost:9050 . # перенаправляем траффик на tor socks proxy (на тор) forward-socks4a .onion localhost:9050 . # Если домен .onion - то через tor forward .i2p localhost:4444 . # если домен .i2p - идем на него через i2p роутер forward 192.168.*.*/ . # локалку не трогаем forward 10.*.*.*/ . #равно как и VPN forward 127.*.*.*/ . forwarded-connect-retries 0 accept-intercepted-requests 1 # это позволит делать прозрачное проксирование через iptables allow-cgi-request-crunching 0 split-large-forms 0 keep-alive-timeout 5 tolerate-pipelining 1 socket-timeout 300
Tor
nano /etc/tor/torrc
# # https://www.torproject.org/docs/faq#torrc # https://manpages.debian.org/bullseye/tor/torrc.5.en.html # curl -x socks5h://localhost:9050 -s https://check.torproject.org/api/ip # SocksPort localhost:9050 ControlPort localhost:9051 # Log notice file /var/log/tor/notices.log Log debug file /var/log/tor/debug.log # DataDirectory /var/lib/tor CookieAuthentication 0 User debian-tor Group debian-tor RunAsDaemon 1 # Эти настройки немного ускоряют работу - важно для слабых устройств CircuitBuildTimeout 30 KeepAlivePeriod 60 NewCircuitPeriod 15 NumEntryGuards 8 # Это позволяет ограничить количество используемых сокетов - важно при работе на опять-таки "вялых" устройствах и на арендованных серверах ConstrainedSockets 1 # Мининизировать запись на диск - это важно для устройств, система которых находится на флешке AvoidDiskWrites 1 # bridges ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy Bridge obfs4 [2400:8902::f03c:92ff:feab:489e]:7987 9F539B9E42AB86BFDFD8B3760138A39E67395589 cert=FjKytP43NmYEklG4ScIBhYIXfSe05oVIEKVu4h87gZU+x/l7B5E/pQSYo60Mc/qduhgSXQ iat-mode=0 Bridge webtunnel [2001:db8:3d87:58ab:4ec3:21ba:913f:99d8]:443 E4B91C347D685E929C1B7CE84CC27EB073127EA6 url=https://borntec.autos/poh8aiteaqu6oophaiXo ver=0.0.1 Bridge webtunnel [2001:db8:3d87:58ab:4ec3:21ba:913f:99d8]:443 E4B91C347D685E929C1B7CE84CC27EB073127EA6 url=https://borntec.autos/poh8aiteaqu6oophaiXo ver=0.0.1 Bridge obfs4 185.177.207.137:8443 D6B9EC832A0D9E6A181A62D4D72CC3A9FEDF60CB cert=4Q8yZaa1lzkPmxsbtanABUYaapxko+AoVtsBNoWGC4+YLBCgavxoM3x4Kn+SX3rLVNubDQ iat-mode=0 Bridge obfs4 207.172.185.193:22223 F34AC0CDBC06918E54292A474578C99834A58893 cert=MjqosoyVylLQuLo4LH+eQ5hS7Z44s2CaMfQbIjJtn4bGRnvLv8ldSvSED5JpvWSxm09XXg iat-mode=0 UseBridges 1
Bridges
$ apt install obfs4proxy
RKN
#!/bin/sh curl -fsSL https://raw.githubusercontent.com/zapret-info/z-i/master/dump.csv \ | sed 1d \ | cut -d ';' -f 3 \ | tr "\|" "\n" \ | sed 's/^[ \t]*//;s/[ \t]*$//' \ | uniq > /etc/squid/zapret-urls.txt #“sed 1d” — отрезаем первую строку #“cut -d ';' -f 3“ — вырезаем все, кроме третьей колонки. #tr "\|" "\n" — заменяем символ | на символ переноса строки #sed 's/^[ \t]*//;s/[ \t]*$//' — обрезаем пробелы и табуляцию #uniq — удаляем дублирующиеся строки.