Commit 5746e8d7 authored by Lorenzo Faletra's avatar Lorenzo Faletra

release anonsurf 2.5

parent 20d8748c
......@@ -12,7 +12,10 @@ install:
ln -s /etc/anonsurf/onion.pac $(DESTDIR)/etc/tor/onion.pac
cp torrc $(DESTDIR)/etc/anonsurf/torrc
cp anonsurf.sh $(DESTDIR)/usr/bin/anonsurf
cp exitnode-selector $(DESTDIR)/usr/bin/exitnode-selector
cp exitnodes.csv /etc/anonsurf/exitnodes.csv
chown root:root $(DESTDIR)/usr/bin/anonsurf
chown root:root $(DESTDIR)/usr/bin/exitnode-selector
chmod 775 $(DESTDIR)/usr/bin/anonsurf
ln -s /usr/bin/anonsurf $(DESTDIR)/usr/bin/anon
cp -rf launchers/* $(DESTDIR)/usr/share/applications/
......
......@@ -31,6 +31,11 @@
# along with Parrot Security OS. If not, see <http://www.gnu.org/licenses/>.
export BLUE='\033[1;94m'
export GREEN='\033[1;92m'
export RED='\033[1;91m'
......@@ -47,6 +52,14 @@ TOR_UID="debian-tor"
# Tor's TransPort
TOR_PORT="9040"
function notify {
if [ -e /usr/bin/notify-send ]; then
/usr/bin/notify-send "AnonSurf" "$1"
......@@ -54,6 +67,10 @@ function notify {
}
export notify
function clean_dhcp {
dhclient -r
rm -f /var/lib/dhcp/dhclient*
......@@ -62,6 +79,10 @@ function clean_dhcp {
}
function init {
echo -e -n "$BLUE[$GREEN*$BLUE] killing dangerous applications\n"
killall -q chrome dropbox iceweasel skype icedove thunderbird firefox firefox-esr chromium xchat hexchat transmission steam
......@@ -77,14 +98,13 @@ function init {
function starti2p {
echo -e -n " $GREEN*$BLUE starting I2P services"
service tor stop
cp /etc/resolv.conf /etc/resolv.conf.bak
touch /etc/resolv.conf
sudo echo -e 'nameserver 127.0.0.1\nnameserver 92.222.97.144\nnameserver 92.222.97.145' > /etc/resolv.conf
echo -e -n "$BLUE[$GREEN*$BLUE] Modified resolv.conf to use tor and ParrotDNS\n"
sudo -u i2psvc i2prouter start
gksu -u i2psvc i2prouter start
firefox http://127.0.0.1:7657/home &
echo -e -n "$BLUE[$GREEN*$BLUE] I2P daemon started"
notify "I2P daemon started"
......@@ -92,11 +112,7 @@ function starti2p {
function stopi2p {
echo -e -n "$BLUE[$GREEN*$BLUE] Stopping I2P services\n"
sudo -u i2psvc i2prouter stop
if [ -e /etc/resolv.conf.bak ]; then
sudo rm /etc/resolv.conf
sudo cp /etc/resolv.conf.bak /etc/resolv.conf
fi
gksu -u i2psvc i2prouter stop
echo -e -n "$BLUE[$GREEN*$BLUE] I2P daemon stopped\n"
notify "I2P daemon stopped"
}
......@@ -105,12 +121,11 @@ function stopi2p {
function ip {
MYIP=`wget -qO- https://start.parrotsec.org/ip/`
echo -e "\nMy ip is:\n"
sleep 1
wget -qO- http://ip.frozenbox.org/
echo $MYIP
echo -e "\n"
echo -e "if the two letters nation code is T1\n then you are succesfully connected to tor"
echo -e "\n\n----------------------------------------------------------------------"
notify "My IP is:\n\n$MYIP"
}
......@@ -192,6 +207,8 @@ function start {
echo -e "$GREEN *$BLUE All traffic was redirected throught Tor\n"
echo -e "$GREEN[$BLUE i$GREEN ]$BLUE You are under AnonSurf tunnel$RESETCOLOR\n"
notify "Global Anonymous Proxy Activated"
sleep 1
notify "Dance like no one's watching. Encrypt like everyone is :)"
sleep 10
}
......@@ -238,34 +255,32 @@ function stop {
sleep 1
echo -e " $GREEN*$BLUE Anonymous mode stopped\n"
notify "Global Anonymous Proxy Stopped"
notify "Global Anonymous Proxy Closed - Stop dancing :("
sleep 4
}
function change {
service tor stop
sleep 4
service tor start
exitnode-selector
sleep 10
echo -e " $GREEN*$BLUE Tor daemon reloaded and forced to change nodes\n"
notify "Identity changed"
notify "Identity changed - let's dance again!"
sleep 1
}
function status {
service tor@default status
cat /tmp/anonsurf.log || cat /var/log/tor/log
cat /tmp/anonsurf-tor.log || cat /var/log/tor/log
}
case "$1" in
start)
init
zenity --question --text="Do you want anonsurf to kill dangerous applications and clean some application caches?" && init
start
;;
stop)
init
zenity --question --text="Do you want anonsurf to kill dangerous applications and clean some application caches?" && init
stop
;;
change)
......@@ -277,6 +292,9 @@ case "$1" in
myip)
ip
;;
ip)
ip
;;
starti2p)
starti2p
;;
......@@ -290,7 +308,7 @@ case "$1" in
;;
*)
echo -e "
Parrot AnonSurf Module (v 2.4)
Parrot AnonSurf Module (v 2.5)
Developed by Lorenzo \"Palinuro\" Faletra <palinuro@parrotsec.org>
Lisetta \"Sheireen\" Ferrero <sheireen@parrotsec.org>
Francesco \"Mibofra\" Bonanno <mibofra@parrotsec.org>
......
anonsurf (2.5+parrot0) testing; urgency=medium
* Improve IP checker.
* Add exit node country selector.
* Fix i2p launchers.
* Improve popup notifications.
* Remove deprecated instructions from torrc.
* Add a dialog question for the startup cleaners.
-- Lorenzo "Palinuro" Faletra <palinuro@parrotsec.org> Sun, 30 Apr 2017 03:01:42 +0200
anonsurf (2.4+parrot1) testing; urgency=medium
* Remove dependencies checker
......
......@@ -5,7 +5,7 @@ IFS=$'\n'
PS3="Chose the country: "
get_country_code() {
country_data=$(grep -i "$1" exitnodes.csv)
country_data=$(grep -i "$1" /etc/anonsurf/exitnodes.csv)
if [ "$country_data" ]
then
if [ $(echo "$country_data" | wc -l) -gt 1 ]
......
......@@ -4,8 +4,8 @@ Version=1.0
Type=Application
Terminal=true
Exec=menuexecg "anonsurf change"
Name=change identity
Comment=Restart TOR daemon to change exit node
Name=change exit node
Comment=Select the exit country to use
Icon=reload
Categories=anonsurf;
#!/usr/bin/env xdg-open
[Desktop Entry]
Version=1.0
Type=Application
Terminal=true
Exec=anonsurf ip
Name=check IP
Comment=Print the current IP address
Icon=network-server
Categories=anonsurf;
......@@ -6,7 +6,6 @@ AutomapHostsSuffixes .exit,.onion
#define tor ports and explicitly declare some security flags
TransPort 127.0.0.1:9040 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr
SocksPort 127.0.0.1:9050 IsolateClientAddr IsolateSOCKSAuth IsolateClientProtocol IsolateDestPort IsolateDestAddr
ControlListenAddress 127.0.0.1:9051
ControlPort 9051
HashedControlPassword 16:FDE8ED505C45C8BA602385E2CA5B3250ED00AC0920FEC1230813A1F86F
......@@ -17,22 +16,14 @@ DNSPort 127.0.0.1:53
RunAsDaemon 1
#move log to /tmp to prevent digital evidences to be stored on disk ;)
Log notice file /tmp/anonsurf.log
#sandbox
Sandbox 1
#use this PID file
PidFile /tor.pid
Log notice file /tmp/anonsurf-tor.log
#use hardware accaleration when possible for crypto
HardwareAccel 1
#socket safety hacks
TestSocks 1
WarnUnsafeSocks 1
AllowNonRFC953Hostnames 0
AllowDotExit 0
WarnPlaintextPorts 23,109,110,143,80
#dns safety hacks
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment