-
Notifications
You must be signed in to change notification settings - Fork 459
HOWTO OrWall together with AFWall
But you're the boss, if you need it, here are some quick tips.
- Root access, well most magic needs it
- Kernel compiled with CONFIG_IP_NF_MATCH_OWNE (to allow or reject packets on a per-command basis)
- Orbot (ensure Orbot has no Transparent Proxy enabled or disabled!)
- OrWall
- AFWall+
- Custom script code snippet
- Install the custom script for AFWall+
$IPTABLES -A "afwall" -d 127.0.0.1 -p tcp --dport 9050 -j ACCEPT
$IPTABLES -A "afwall" -d 127.0.0.1 -p udp --dport 5400 -j ACCEPT
- Select the apps that can communicate via Tor (outgoing)
- Go into Orbot and make sure Transparent Proxying is enabled!
- Select your apps e.g. Firefox,[...]
- Now the last steps
- Now deactivate internet access for Firefox,[...] via AFWall+ (in whitelist mode)
- In Orbot Firefox,[...] needs to be selected and allowed trough Tor
Orbot will now send all app network requests trough the local Tor ports 9050 and 5400 (Transparent Proxying). The code snippet allows all apps an access to these local ports so that OrWall isn't required here. One benefit is that the apps can only pass the tor network and nothing else.
-
Select the apps that can communicate via Tor (outgoing)
-
Go into Orbot and make sure Transparent Proxying is disabled!
-
Select your apps e.g. Firefox,[...]
Tor acts as a Socks5 proxy on port 9050 (Tor Browser itself listens on port 9150). Recent versions of Firefox allow direction of all traffic, including DNS resolution, through a Socks5 proxy. To enable this behavior (after starting and running a previously installed version of Tor/Orbot):
Firefox -> Tools -> Options -> Advanced -> Network -> Connection:Settings -> Manual proxy configuration (ticked) -> SOCKS Host:
127.0.0.1 (or localhost) Port: 9050 -> SOCKSv5 (ticked) -> No Proxy for: 127.0.0.1 (or localhost) -> Remote DNS (ticked)
The last step (Remote DNS) is important so that DNS lookups are done through the proxy (with SOCKSv5), not the client computer.
To return to using Firefox without a proxy (such as Tor), choose "No proxy" in the Firefox Network settings:
Firefox -> Tools -> Options -> Advanced -> Network -> Connection:Settings -> No proxy (ticked)
For mobile browsers: Go under Preferences > Advanced > Network tab > Settings manually set Firefox to use the SOCKS proxy localhost with port 9050. Then you must type about:config into the Firefox address bar. Change network.proxy.socks_remote_dns to true and restart the browser. This now channels all DNS requests through TOR's socks proxy.
Orxy is an Orbot alternative that supports devices running the latest Android OS, and also supports the add-on which is called Orxify, it enables a per app protection, technically it's just a Tor VPN based app (which is able to understand .onion addresses).
Here are some little facts (because there are a lot of false info available):
- Orbot uses IPTables to proxy all apps through Tor, which requires root access.
- Apps that use the built-in Android VPN interface do not require root access. This is the primary advantage of Orxify over Orbot.
- On Android 4.x (or higher) apps can create a native VPN connection without root access to send and receive all network traffic. Orxify app creates a VPN connection to Tor and routes the internet traffic through the VPN.
- The Orxify add-on is not open source and not free (Orxy itself is free but comes with in-app billing).
- AFWall (IPTables) works with it but it's also not recommend using both the same time.
- On some ROMs like Lollipop it may not work due internal changes and other apps may not respect the Android OS proxy settings, please take a look here.
There are also some other free and open source apps like Drony, it also uses a VPN but redirect them all to the Orbot app.
- Starting with Orbot v15.0.1 RC-3+ & Tor binary v0.2.6.10+, Mozilla Firefox (39+) releases, most of the mentioned steps are obsolete because most of all problems got fixed.
- Orbot does allow Brides which can bypass provider censorship and other blocking mechanism — together with the new implemented VPN configuration (both are not enabled by default) really all traffic goes trough the Tor network.
- The mentioned interface (see second method above) allows the root user to select or deselected specific apps that goes through the entire network — that normally means we do not need any other external apps like OrWall/Orxy. The rest can be controlled via AFWall+ itself (behind the firewall must be enabled for this).
- AFWall's NFlog or Orbots own integrated logging mechanism will show the rest and if there are any problems persisting.
Footer