Configure Bridges to penetrate the wall in TOR in Ubuntu

Source: Internet
Author: User
Nowadays, traditional wall-piercing techniques are not good at all. TOR, Gladder, and VPN are all ineffective. Even if I had a self-built glype, I had to take a rest. After reading GFW, it is still a little awesome, but there will always be a wall ladder. The posts of the following two talents provide a new method for the extraordinary period, it's a pity how to configure the Tor Bridge in Ubuntu with a wall. It's all written on the executor's blogspot, And the tumble ladder is in the middle. Isn't it a matter of worry? It was hard to see the wall-mounted secret. The following describes how

Nowadays, traditional wall-piercing techniques are not good at all. TOR, Gladder, and VPN are all ineffective. Even if I had a self-built glype, I had to take a rest.

After reading GFW, it is still awesome, but there will always be a wall ladder. the posts of the two talents below provide a new method.

How to use "Build" to penetrate the wall in extraordinary periods

How to configure the Tor Bridge in Ubuntu

Unfortunately, they are all written on shard's blogspot, And the tumble ladder is in the middle. Isn't it a hurry?

It was hard to see the wall-mounted secret.

The following describes how to configure TOR bridges in Ubuntu.

Step 1: Get the bridge address

Use your gmail account to send "get bridges" emails with the subject and content to your bridges@torproject.org

Step 2: configure the Tor Bridge

First, back up the original Tor configuration file torrc to the backup directory:

Sudo cp-p/etc/tor/torrc your-backup-directory and then add the "UseBridges 1" Switch option at the end of the torrc configuration file (0 by default, that is, off ),

UseBridges 1

Note: In the HOLY JOE'S BLOG, this field is written as "UserBridges 1". After testing, this field is written as "User"

Finally, append the bridge list in the bridges@torproject.org reply mail to the end of the torrc configuration file, and add it in the original format of bridge in the reply mail, that is:

Bridge ip: port fingerprint

The emails mentioned in the above two blogs contain the fingerprint field, which is not found in the emails I received. However, they are also valid after testing.

Step 3: restart Tor and Privoxy

Sudo/etc/init. d/tor restart

Sudo/etc/init. d/privoxy restart

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.