TBNG  — Overview
http://znoxx.me

TorBOX Next Generation

Overview

What is it

TorBOX Next Generation (hereinafter TBNG) — is a set of scripts for the Linux OS which allows fast and effortless deploy of secure internet access points.

User has an opportunity to:

What for

TOR, the same The Onion Router — a set of utilities for obtaining pseudo-anonymous access to the Internet. Each packet sent to a node through the TOR goes through a chain of nodes, so the original packet address for the end node is hidden. You can read more about this in the official project documentation. TBNG's goal is to automate the configuration and provide a simple interface that can be accessed from almost any modern device — smartphone, tablet or computer.

For whom

Intended audience

Using the ready-made configured system is as simple as possible — to connect to the configured network and select the desired mode of operation via the web interface.

The initial setup and installation will require certain skills in Linux, such as:

Hardware requirements

OS requirements

System

Linux, better Debian / Ubuntu. At least, it is tested on these OS.

Mandator packages without which nothing will work properly

Last two should be available at least in your Linux distribution repository.

User accounts

For general activity you need an account with no superuser rights (non-root), but root rights are required during the installation. So you should know your root password or be able to execute sudo command.

Generally, any major modern Linux distro should work, excel most marginal ones. OpenWRT, Alpine Linux are not supported and won't be supported in visible future.

How it works

After successful installation and initial configuration, the target device becomes an Internet access point, and all client traffic is redirected through the TOR network. In addition, you can configure the filtering mode for traffic — deleting advertisements, "Like" buttons, etc (through the package Privoxy). It is also possible to use the service I2P. Detailed configuration is available in the user manual.

General working diagramm

TBNG work schematics

TBNG work schematics

Client devices connect to interfaces ** _ lan0 ... lanX _ ** — they can be either wired or wireless. The device addresses are assigned using the dnsmasq package.

Using the iptables rules, traffic is routed either through the TOR + Privoxy, TOR, or directly. For traffic routing, IP Masquerading (also known as NAT) is used.

TBNG project componetns

TBNG does not use binary files, all components are written in Python. During installation, you need to install some packages (Python3, Tor, Privoxy, iptables and others). Some of them may already be present in the system. A complete list of components is available in the installation and configuration manual.

Key project componets are on diagram below.

TBNG key componets

TBNG key componets

TBNG can be managed via the web-interface or via the command line (ssh or the web version shell-in-a-box).

UpDog logo Host your own website for free with UpDog.