Page 1 of 1

Torifiying all Guest VM traffic through TOR running on Host

Posted: 29. Aug 2012, 16:08
by eggs
Hi,

This has had me stumped for a long time now and I cannot find the answer to my troubles anywhere!
I have a Backtrack 5 r3 VM running on a Windows 7 64 bit host system. What I wish to do is pipe all traffic in and out of the guest OS through TOR which is running on the host, like a middlebox (if that's what they're called? :D )

I can set up TOR in Windows and use it, no problem. I can also set it up and use it in Linux too. But I don't want to just set it up in the Linux Guest OS and leave it at that because it's not only my Browser traffic that I want to go through the TOR network; it's also anything from the Command Line. Basically I want everything in my Guest OS Torified.

I just don't understand the process of doing this. I can get TOR up and running on my Windows Host fine, but I need to know how to connect my Guest OS to the TOR (via Privoxy, I think??) and then on to the T'internet.

Please help. I've gone grey over this and haven't slept for the past 7 months.

Re: Torifiying all Guest VM traffic through TOR running on H

Posted: 30. Aug 2012, 03:38
by BillG
Tor is not designed to do that. Tor is a client based solution. It is designed to protect the system on which it is running. It is not designed to protect other machines which may be running on the same network (which would be a server based solution).

If Tor was designed to protect other physical systems (ie work like a firewall/router) you could implement it to protect a virtual machine running behind it. But it isn't. If you want full protection for your guest you would need to run in bridged mode and run Tor in both systems ie run them as if they were two separate machines (which they are, as far as the networking protocols are concerned).