wiki:doc/TorifyHOWTO/Putty

Putty is a free application suite for Windows that provides such tools as Telnet, SSH and SCP, along with a very good xterm emulator. It's written and maintained by Simon Tatham and can be downloaded via links on its homepage at http://www.chiark.greenend.org.uk/~sgtatham/putty/.

The first application to Torify is Putty itself. This is a combined Telnet/SSH client. When started, you are presented with a Session configuration screen (shown below).

https://farm8.staticflickr.com/7567/15432251023_4dd7b3a477_o.png

This screen is used to select the host you wish to connect with, the preferred port and the connection type, (Raw, Telnet, Rlogin, SSH). It also enables a session configuration to be saved and retrieved. For this reason, I suggest configuring the other session tabs first and then returning to this one in order to save the configuration.

Only one other tab requires configuration specifically for Tor, and that's the Proxy tab (shown below).

https://farm8.staticflickr.com/7579/15864607570_d718573cea_o.png

The above image shows the settings exactly as they should be set for usage with Tor. Pay particular attention to the "Do DNS lookup at proxy end:" option. If this is set to Off or Auto, then DNS will leak information about what services are being used.

That's it for Putty. Return to the Session tab and save the configuration if desired.

Putty Command Line Tools

The situation is slightly different for command-line tools such as PSCP (the Putty SCP client). In order to use these through Tor, a previously saved configuration must be specified. Assuming during the Putty instructions above, a configuration was created with the name 'tor_default'. The PSCP command line would be something like:

pscp -load tor_default -ls user@host.org:

This would retrieve a directory listing of the files in the users homedir.

pscp -load tor_default sample.txt user@host.org:examples/

This would copy a file sample.txt to a subdir called examples under the users homedir.

Testing

Sometimes it can be hard to tell if a command line tool is really using Tor. One solution to this dilema is to create a tor_test configuration file with the option "Do DNS lookup at proxy end:" set to no. This will result in the Tor log containing a warning about the DNS leak if the connection is routing through Tor. Of course this should only be used for testing purposes.

Last modified 3 years ago Last modified on Dec 18, 2014, 8:20:23 PM