Lost-Cluster

A small amount of data that does not belong to any file

Rabbit Hole

Rabbit Hole

Tunnel your browser connection through Tor and a proxy for extra security and privacy. An obscure option is to use Mozilla or Hola proxy in conjunction with Tor. This allows users to take advantage of the anonymity provided by Tor, while also benefiting from the additional security and privacy features offered by the proxy service. This is particularly useful when accessing the Internet from untrusted or open networks, such as public Wi-Fi hotspots, as it can help protect against hackers and other malicious actors. In addition, using a tunneling proxy can be useful for bypassing corporate filtering and large government firewalls, allowing users to access blocked content and websites.

By combining a proxy with the Tor network, you can increase your privacy and hide your location. This setup anonymises your origin, making it invisible to the proxy service, and the Tor exit node is unaware of the requests made. This construction ensures that no single party has access to the full picture of your online activities.

Rabbit Hole Graph

You'll need

The excellent and outstanding software of the Tor Project. Please feel free to make a generous and worthy donation to these esteemed and admirable people.

A proxy from Snawoot:

Hola-proxy (Download binary)
Opera-proxy (Download binary)

Please feel free to make a generous donation to His Majesty.

Installation

For Mac

Install Brew.sh:

# /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

Install Tor

# brew install tor

Depending on your OS X version you might need to install PHP:

# brew install php

For Debian / Ubuntu

Follow the instructions here to install the most up-to-date version:

Why and how I can enable Tor Package Repository in Debian?

Install PHP if you didn't already:

# apt install php

Browser extention

Download a useful browser: getfirefox.com
Get a proxy switch browser extention for your browser and set it for:

Host: localhost
Port: 8080

Proxy settings

Now you can easily enable/disable the proxy in your browser.

Fire up the Rabbit Hole

Run Tor and one of the proxies:

# tor &
# ./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country EU

Or...

Use this script to run and manage the proxies:

<?php
echo <<<BANNER
 ______       __    __    __ __   _______       __        
|   __ \---.-|  |--|  |--|__|  |_|   |   |-----|  |-----*
|      <  _  |  _  |  _  |  |   _|       |  _  |  |  -__|
|___|__|___._|_____|_____|__|____|___|___|_____|__|_____| v1.0


BANNER;

/*
    Usage: php proxy.php [select proxy = opera_eu]

    This script sets up a proxy connection using the Tor network and one of several possible proxy
    services (Opera or Hola). The script first displays a banner with information about the version of
    the script. The script then sets the location of the Tor binary, and sets up different proxy
    options, depending on the user input. The script then installs a Control-C (Break) interrupt and
    creates a new process for both Tor and the chosen proxy service. The script runs an infinite loop
    that reads output from both processes and displays it to the user. It also includes a few comments
    describing the usage of the script and where the sources can be found.

    The script includes a class called "process" which is used to create and manage the processes for
    the Tor and proxy services. The class includes several methods.

    The constructor method, "__construct", takes in one parameter, the command to run the process, and
    creates a new process resource using the proc_open() function. It also sets up pipes for standard
    input, output, and error streams.

    The "read()" method retrieves data from the output and error pipes and returns it as a string.

    The "__destruct()" method is used to close the pipes and end the process, it prints a
    message "Killing process {$pid}" and it uses the proc_close() and posix_kill() functions to close
    the process and kill it.

    The class allows to handle the process of Tor and the chosen proxy service as objects, it can read
    the output and error of the processes, and it can close them and kill them properly.

    Sources:
    https://github.com/Snawoot/
    https://github.com/Snawoot/hola-proxy
    https://github.com/Snawoot/opera-proxy

    *** Don't forget to change your default preferences and the locations of the binaries! ***

*/


$tor_bin = "/opt/homebrew/bin/tor";

$proxy_bin = match($argv[1] ?? null) {
    default => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country EU",
    "opera_us" => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country AM",
    "opera_asia" => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country AS",
    "hola_us" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country us",
    "hola_de" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country de",
    "hola_uk" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country uk",
};

//install Control-C (Break) interrupt
declare(ticks = 1);
pcntl_signal(SIGINT, function() { die("\nCaught SIGINT\n"); });


class process {
    private $resource = null;
    private $pipes = null;

    function __construct($cmd) {
        $this->resource = proc_open($cmd, [["pipe", "r"], ["pipe", "w"], ["pipe", "w"]], $this->pipes);
        foreach([1,2] as $i) stream_set_blocking($this->pipes[$i], false);
    }

    function read() {
        return(stream_get_contents($this->pipes[1]).stream_get_contents($this->pipes[2]));
    }

    function __destruct() {
        $pid = proc_get_status($this->resource)["pid"];
        echo "Killing process {$pid}\n";
        foreach([0,1,2] as $i) fclose($this->pipes[$i]);
        proc_close($this->resource);
        posix_kill($pid, SIGTERM);
    }
}

// Setup the Tor tunnel first
$tor = new process($tor_bin);
while(true) {
    if(!empty($buf = $tor->read())) {
        echo $buf;
        if(substr($buf, -31) == "Bootstrapped 100% (done): Done\n")
            break;
    }
    usleep(250000); //0.25 sec
}

// Start the proxy through the Tor tunnel
$proxy = new process($proxy_bin);

// Wait for the output forever, cancel by pressing ctrl-c
while(true) {
    echo $tor->read();
    echo $proxy->read();
    usleep(250000); //0.25 sec
}
?>

Output

Last login: Mon Nov 05 11:42:43 on ttys002
root@matrix ~ % php proxy.php
 ______       __    __    __ __   _______       __        
|   __ \---.-|  |--|  |--|__|  |_|   |   |-----|  |-----*
|      <  _  |  _  |  _  |  |   _|       |  _  |  |  -__|
|___|__|___._|_____|_____|__|____|___|___|_____|__|_____| v1.0

Nov 05 15:18:00.358 [notice] Tor 0.4.7.10 running on Darwin with Libevent 2.1.12-stable, OpenSSL 1.1.1q, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Unknown N/A as libc.
Nov 05 15:18:00.358 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Nov 05 15:18:00.358 [notice] Configuration file "/opt/homebrew/etc/tor/torrc" not present, using reasonable defaults.
Nov 05 15:18:00.362 [notice] Opening Socks listener on 127.0.0.1:9050
Nov 05 15:18:00.362 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Nov 05 15:18:00.000 [notice] Parsing GEOIP IPv4 file /opt/homebrew/Cellar/tor/0.4.7.10/share/tor/geoip.
Nov 05 15:18:00.000 [notice] Parsing GEOIP IPv6 file /opt/homebrew/Cellar/tor/0.4.7.10/share/tor/geoip6.
Nov 05 15:18:00.000 [notice] Bootstrapped 0% (starting): Starting
Nov 05 15:18:00.000 [notice] Starting with guard context "default"
Nov 05 15:18:01.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Nov 05 15:18:01.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Nov 05 15:18:01.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Nov 05 15:18:02.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Nov 05 15:18:02.000 [notice] Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
Nov 05 15:18:02.000 [notice] Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
Nov 05 15:18:02.000 [notice] Bootstrapped 30% (loading_status): Loading networkstatus consensus
Nov 05 15:18:02.000 [notice] Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
Nov 05 15:18:02.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3040/6049, and can only build 10% of likely paths. (We have 53% of guards bw, 49% of midpoint bw, and 39% of exit bw = 10% of path bw.)
Nov 05 15:18:02.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3040/6049, and can only build 10% of likely paths. (We have 53% of guards bw, 49% of midpoint bw, and 39% of exit bw = 10% of path bw.)
Nov 05 15:18:02.000 [notice] Bootstrapped 54% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 61% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 66% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 73% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:04.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Nov 05 15:18:04.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Nov 05 15:18:04.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Nov 05 15:18:04.000 [notice] Bootstrapped 100% (done): Done
MAIN    : 2022/10/31 15:18:05 main.go:147: INFO     hola-proxy client version v1.5.0 is starting...
MAIN    : 2022/10/31 15:18:05 main.go:148: INFO     Constructing fallback DNS upstream...
MAIN    : 2022/10/31 15:18:05 main.go:155: INFO     Initializing configuration provider...
MAIN    : 2022/10/31 15:18:06 main.go:167: INFO     Endpoint: https://zagent1612.hola.org:22225
MAIN    : 2022/10/31 15:18:06 main.go:168: INFO     Starting proxy server...
MAIN    : 2022/10/31 15:18:06 main.go:170: INFO     Init complete.

Final thoughts

Galatic Brain