Torifiying all Guest VM traffic through TOR running on Host

Discussions related to using VirtualBox on Windows hosts.
Post Reply
eggs
Posts: 1
Joined: 29. Aug 2012, 16:00

Torifiying all Guest VM traffic through TOR running on Host

Post by eggs »

Hi,

This has had me stumped for a long time now and I cannot find the answer to my troubles anywhere!
I have a Backtrack 5 r3 VM running on a Windows 7 64 bit host system. What I wish to do is pipe all traffic in and out of the guest OS through TOR which is running on the host, like a middlebox (if that's what they're called? :D )

I can set up TOR in Windows and use it, no problem. I can also set it up and use it in Linux too. But I don't want to just set it up in the Linux Guest OS and leave it at that because it's not only my Browser traffic that I want to go through the TOR network; it's also anything from the Command Line. Basically I want everything in my Guest OS Torified.

I just don't understand the process of doing this. I can get TOR up and running on my Windows Host fine, but I need to know how to connect my Guest OS to the TOR (via Privoxy, I think??) and then on to the T'internet.

Please help. I've gone grey over this and haven't slept for the past 7 months.
BillG
Volunteer
Posts: 5106
Joined: 19. Sep 2009, 04:44
Primary OS: MS Windows 10
VBox Version: VirtualBox+Oracle ExtPack
Guest OSses: Windows 10,7 and earlier
Location: Sydney, Australia

Re: Torifiying all Guest VM traffic through TOR running on H

Post by BillG »

Tor is not designed to do that. Tor is a client based solution. It is designed to protect the system on which it is running. It is not designed to protect other machines which may be running on the same network (which would be a server based solution).

If Tor was designed to protect other physical systems (ie work like a firewall/router) you could implement it to protect a virtual machine running behind it. But it isn't. If you want full protection for your guest you would need to run in bridged mode and run Tor in both systems ie run them as if they were two separate machines (which they are, as far as the networking protocols are concerned).
Bill
Post Reply