Exploring the SelekTOR front end for the Tor anonymity tool
Hiding from Spies

© Lead Image © AndreaDanti, 123RF.com
If you want to exploit protection through the anonymous Tor router fully, you need to delve deep into the underlying technologies. The SelekTOR front end saves you much of that effort.
Tor, which was originally known as "The Onion Router," [1] is an anonymous networking solution that has recently gained popularity as a means to avoid government snooping and commercial behavior tracking. A Tor client, running on a desktop system, routes traffic to an anonymous network consisting of Tor nodes.
Tor relies on the onion principle (Figure 1) and redirects the traffic through three nodes, changing the route every 10 minutes. The Tor Browser Bundle comes with a preconfigured combination of the Firefox web browser, the Tor client, and Tor Launcher.

The complete Tor package lets you surf the web in relative anonymity and use services such as email, instant messaging, IRC, SSH, and P2P. Although the Tor project offers its own user interface for its anonymous router in the form of Vidalia, the alternative SelekTOR front end provides some functions that Vidalia lacks. For example, SelekTOR offers semi-automatic configuration of the Tor client, as well as a choice of exit nodes sorted by country.
In this article, I show how to configure and use the SelekTOR front end. I'll assume you have some basic familiarity with Tor. For an introduction to the Tor anonymity solution, see the project website [2]. The developer points out that SelekTOR is only an interface for the Tor client and launcher, not a substitute for the Tor browser.
Requirements
SelekTOR supports Firefox or its offshoot Pale Moon, as well as Opera and Chrome or Chromium, with no additional plugins. The program does require an installed Java runtime environment (JRE) 7 or its free implementation, OpenJRE 1.7. Only the next version of the software will have Java 8 support.
If Vidalia is already installed, you must remove it before using SelekTOR. You also need to remove any existing older version of SelekTOR before installing the new version. The current SelekTOR 3 (November 2014 version) release has a version number of 3.12-11.
Although the software was written in Java, separate versions exist for Linux and Windows, and only the Windows version comes with the Tor software (see the "Installing SelekTOR" box). The software works with all major desktop environments on Linux.
Installing SelekTOR
SelekTOR naturally requires Tor as a basis. Most distributions have Tor in their repositories, so you can set it up normally through the package manager. Otherwise, download Tor from the project site [3].
Debian and Debian-derivative users now have a ready-made .deb
package that handles the dependencies of the tor and tor-geoipdb packages. SelekTOR's own internal network functions now go over Tor, preventing any possible DNS leakage.
Because SelekTOR will take over the task of starting Tor, you should disable the onion router's start mechanism. To do so, replace RUN_DAEMON="yes"
with RUN_DAEMON="no"
in the /etc/default/tor
file. Then, stop the service by typing sudo service tor stop
.
SelekTOR usually appears in the menu of the respective desktop after installation. Alternatively, you can run it as a normal user in the console using the selektor
command.
Defining Exit Nodes
After starting the SelekTOR GUI, first make sure that Tor has started correctly. After restarting the browser, you can visit the Tor check site to do so [4]. You can then see whether you are visiting the site with or without Tor. You should also see an IP address that differs from the external address otherwise allocated for this connection.
SelekTOR is suitable for several applications. In addition to its role as a Tor launcher, it offers you the option of defining the exit nodes yourself. Exit nodes are the Tor servers through which the packets leave the Tor network and enter the normal Internet ("clearnet"). They are a vulnerability in the Tor system, because if you use an unencrypted connection, an attacker can crack your anonymity by sniffing the exit nodes, provided they have sufficient resources and perseverance. However, they have to do so in less than 10 minutes, because Tor then automatically switches the route.
With SelekTOR, you can select the exit node from a list sorted by country (Figure 2). Additionally, the software offers a selective routing based on URL patterns. These patterns rely on PAC files (proxy auto-config) [5] for different websites to use the most appropriate proxy automatically.
Put simply, a proxy is a broker that routes requests through its own address before passing them on to their actual origin in order to obfuscate the original source. The PACs include the hostname and the port number of a proxy in a few lines of Java code. They are mostly on servers on the Internet but can also be operated locally. This setup allows users in countries whose governments block certain websites to use them anyway. SelekTOR includes a Proxy Pattern Editor (under Menu) that lets you create, edit, import, and export PAC files.
SelekTOR also tries to optimize the function of the Tor client by continuously monitoring the connections and using the exit nodes with the best response times. The software integrates the WHOIS protocol for querying information about Internet domains and IP addresses and their owners (Figure 3). With the release of version 3.12-11, whois
became an integrated web application; therefore, like Atlas [6], which visualizes information on Tor relays (Figure 4), it can be initiated in the browser and sent via Tor.

Conclusions
SelekTOR simplifies use of the Tor client in many ways and makes using Tor more transparent for the user. Additionally, the software lets you bypass restrictions of a political or commercial nature when accessing web pages. In doing so, SelekTOR handles the configuration for most applications unobtrusively in the background, instead of overwhelming the user with what can be a difficult task.
During testing in the lab, SelekTOR provided its service perfectly after resolving some troubles caused by bugs. If problems occur during use, contact the friendly and helpful developer [7]. While researching this article, I collaborated with the developer on removing some minor bugs.
Infos
- Onion routing: http://en.wikipedia.org/wiki/Onion_routing
- SelekTOR: http://www.dazzleships.net/?page_id=71
- Downloading Tor: https://www.torproject.org/download/download-unix.html.en
- Tor check: https://check.torproject.org
- PAC: http://en.wikipedia.org/wiki/Proxy_auto-config
- Atlas: https://atlas.torproject.org
- Contact: http://www.dazzleships.net/?page_id=247
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Direct Download
Read full article as PDF:
Price $2.95
News
-
Elementary OS 5.1 Has Arrived
One of the most highly regarded Linux desktop distributions has released its next iteration.
-
Linux Mint 19.3 Will be Released by Christmas
The developers behind Linux Mint have announced 19.3 will be released by Christmas 2019.
-
Linux Kernel 5.4 Released
A number of new changes and improvements have reached the Linux kernel.
-
System76 To Design And Build Laptops In-House
In-house designed and built laptops coming from System76.
-
News and views on the GPU revolution in HPC and Big Data:
-
The PinePhone Pre-Order has Arrived
Anyone looking to finally get their hands on an early release of the PinePhone can do so as of November 15.
-
Microsoft Edge Coming to Linux
Microsoft is bringing it’s new Chromium-based Edge browser to Linux.
-
Open Invention Network Backs Gnome Project Against Patent Troll
OIN has deployed its legal team to find prior art.
-
Fedora 31 Released
The latest version of Fedora comes with new packages and libraries.
-
openSUSE OBS Can Now Build Windows WSL Images
openSUSE enables developers to build their own WSL distributions.