spior 0.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA256:
3
+ metadata.gz: e99a81242d64a4764fe159a89b0da69b2920e6a23669289e47c929c30aa9fb05
4
+ data.tar.gz: 2b747268e80b4fe1925cd951943bf062f09ac17707ff97f6ae536ad4585af44d
5
+ SHA512:
6
+ metadata.gz: e2db8f8b6f8af9627c74857a306e7b2bad22b95791b2cc6bcdf35e4d91be9b430aebc110bfc2372b3dbebd954c1429e2470995cff806d452aa92cf2fc5838f33
7
+ data.tar.gz: 1547dadc53b9bb3ee702a39a6c801a2b5591a08324da4936c7b7debba1bc8a7f8619f107c24826a6294fdb3f4f97cf5a665bc70370cb5286a2e10ee57e0720c4
checksums.yaml.gz.sig ADDED
Binary file
data/.gitignore ADDED
@@ -0,0 +1,58 @@
1
+ *.swp
2
+ *.gem
3
+ *.rbc
4
+ /.config
5
+ /coverage/
6
+ /InstalledFiles
7
+ /pkg/
8
+ /spec/reports/
9
+ /spec/examples.txt
10
+ /test/tmp/
11
+ /test/version_tmp/
12
+ /tmp/
13
+ Makefile
14
+
15
+ # Used by dotenv library to load environment variables.
16
+ # .env
17
+
18
+ # Ignore Byebug command history file.
19
+ .byebug_history
20
+
21
+ ## Specific to RubyMotion:
22
+ .dat*
23
+ .repl_history
24
+ build/
25
+ *.bridgesupport
26
+ build-iPhoneOS/
27
+ build-iPhoneSimulator/
28
+
29
+ ## Specific to RubyMotion (use of CocoaPods):
30
+ #
31
+ # We recommend against adding the Pods directory to your .gitignore. However
32
+ # you should judge for yourself, the pros and cons are mentioned at:
33
+ # https://guides.cocoapods.org/using/using-cocoapods.html#should-i-check-the-pods-directory-into-source-control
34
+ #
35
+ # vendor/Pods/
36
+
37
+ ## Documentation cache and generated files:
38
+ /.yardoc/
39
+ /_yardoc/
40
+ /doc/
41
+ /rdoc/
42
+
43
+ ## Environment normalization:
44
+ /.bundle/
45
+ /vendor/bundle
46
+ /lib/bundler/man/
47
+
48
+ # for a library or gem, you might want to ignore these files since the code is
49
+ # intended to run in multiple environments; otherwise, check them in:
50
+ # Gemfile.lock
51
+ # .ruby-version
52
+ # .ruby-gemset
53
+
54
+ # unless supporting rvm < 1.11.0 or doing something fancy, ignore this:
55
+ .rvmrc
56
+
57
+ # Used by RuboCop. Remote config files pulled in from inherit_from directive.
58
+ # .rubocop-https?--*
data/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2020 szorfein
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,29 @@
1
+ # spior
2
+ (Spider|Tor). A tool to make TOR your default gateway and randomize your hardware (MAC).
3
+ **Still under development !**
4
+
5
+ ## Prerequisite
6
+ Just a little tool for change the mac address in POSIX shell.
7
+
8
+ $ curl -s -L -o deceitmac.tar.gz https://github.com/szorfein/deceitmac/archive/master.tar.gz
9
+ $ tar xvf deceitmac-master
10
+ $ cd deceitmac-master
11
+ $ sudo make install
12
+
13
+ ## Install
14
+ Spior is cryptographically signed, so add my public key (if you haven’t already) as a trusted certificate.
15
+
16
+ $ gem cert --add <(curl -Ls https://raw.githubusercontent.com/szorfein/spior/master/certs/szorfein.pem)
17
+
18
+ And install the gem
19
+
20
+ $ gem install spior -P MediumSecurity
21
+
22
+ ## Usage
23
+
24
+ $ spior -h
25
+ $ spior --install
26
+
27
+ ### links
28
+ + https://rubyreferences.github.io/rubyref
29
+ + https://rubystyle.guide/
data/bin/spior ADDED
@@ -0,0 +1,6 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'spior/runner'
4
+
5
+ runner = Spior::Runner.new(ARGV)
6
+ runner.run
data/conf/ipt_mod.conf ADDED
@@ -0,0 +1,5 @@
1
+ nf_log_arp
2
+ nf_log_ipv4
3
+ nf_log_common
4
+ iptable_nat
5
+ xt_LOG
@@ -0,0 +1,14 @@
1
+ [Unit]
2
+ Description=IPv4 Packet Filtering Framework
3
+ Before=network-pre.target
4
+ Wants=network-pre.target
5
+
6
+ [Service]
7
+ Type=oneshot
8
+ ExecStart=/sbin/iptables-restore /var/lib/iptables/rules-save
9
+ ExecReload=/sbin/iptables-restore /var/lib/iptables/rules-save
10
+ #ExecStop=/usr/lib/systemd/scripts/iptables-flush
11
+ RemainAfterExit=yes
12
+
13
+ [Install]
14
+ WantedBy=multi-user.target
data/conf/resolv.conf ADDED
@@ -0,0 +1 @@
1
+ nameserver 127.0.0.1
data/conf/ssh.conf ADDED
@@ -0,0 +1,29 @@
1
+ Host *.onion
2
+ ProxyCommand socat - SOCKS4A:localhost:%h:%p,socksport=9050
3
+
4
+ Host github.com
5
+ KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
6
+ Ciphers chacha20-poly1305@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc
7
+ MACs hmac-sha2-256,hmac-sha2-512,hmac-sha1
8
+
9
+ Host *
10
+ Protocol 2
11
+ KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
12
+
13
+ MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
14
+
15
+ Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
16
+
17
+ PasswordAuthentication no
18
+ ChallengeResponseAuthentication no
19
+ PubkeyAuthentication yes
20
+ ForwardX11Trusted no
21
+ ForwardX11 no
22
+ ForwardAgent no
23
+ ConnectTimeout 40
24
+
25
+ # Send locale environment variables. #367017
26
+ SendEnv LANG LC_ALL LC_COLLATE LC_CTYPE LC_MESSAGES LC_MONETARY LC_NUMERIC LC_TIME LANGUAGE LC_ADDRESS LC_IDENTIFICATION LC_MEASUREMENT LC_NAME LC_PAPER LC_TELEPHONE
27
+
28
+ # Send COLORTERM to match TERM. #658540
29
+ SendEnv COLORTERM
data/conf/sshd.conf ADDED
@@ -0,0 +1,46 @@
1
+ # ref https://github.com/stribika/stribika.github.io/wiki/Secure-Secure-Shell
2
+ # ref https://github.com/jumanjihouse/devenv/blob/master/app/etc/ssh/sshd_config
3
+ # ref https://www.ssh.com/ssh/sshd_config/
4
+
5
+ # Support for curve25519 KEX and chacha20 are on the wishlist.
6
+ KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
7
+
8
+ hostkeyalgorithms ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256
9
+
10
+ Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
11
+
12
+ MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
13
+
14
+ Protocol 2
15
+ AllowGroups ssh-user
16
+
17
+ # Only allow 4096-byte RSA key
18
+ HostKey /etc/ssh/ssh_host_rsa_key
19
+ HostKey /etc/ssh/ssh_host_ed25519_key
20
+
21
+ PermitEmptyPasswords no
22
+
23
+ # Change to no to disable s/key passwords
24
+ ChallengeResponseAuthentication no
25
+
26
+ PubkeyAuthentication yes
27
+
28
+ # With TOR
29
+ #ListenAddress 127.0.0.1:22
30
+
31
+ UsePAM yes
32
+ PasswordAuthentication no
33
+ PrintMotd no
34
+ PrintLastLog no
35
+
36
+ X11Forwarding no
37
+ permitrootlogin no
38
+
39
+ # override default of no subsystems
40
+ Subsystem sftp /usr/lib64/misc/sftp-server
41
+
42
+ # Allow client to pass locale environment variables. #367017
43
+ AcceptEnv LANG LC_ALL LC_COLLATE LC_CTYPE LC_MESSAGES LC_MONETARY LC_NUMERIC LC_TIME LANGUAGE LC_ADDRESS LC_IDENTIFICATION LC_MEASUREMENT LC_NAME LC_PAPER LC_TELEPHONE
44
+
45
+ # Allow client to pass COLORTERM to match TERM. #658540
46
+ AcceptEnv COLORTERM
@@ -0,0 +1,11 @@
1
+ [Unit]
2
+ Description=Create a transparent proxy over SSH with sshuttle
3
+ After=network-online.target
4
+
5
+ [Service]
6
+ Type=notify
7
+ NotifyAccess=all
8
+ ExecStart=/usr/bin/sshuttle -vr username@localhost 0/0
9
+
10
+ [Install]
11
+ WantedBy=multi-user.target
data/conf/torrc ADDED
@@ -0,0 +1,20 @@
1
+ User tor
2
+ PIDFile /run/tor/tor.pid
3
+ DataDirectory /var/lib/tor/data
4
+
5
+ Log notice stdout
6
+
7
+ GeoIPExcludeUnknown 1
8
+
9
+ ## Torified DNS
10
+ DNSPort 127.0.0.1:9061
11
+ AutomapHostsOnResolve 1
12
+ AutomapHostsSuffixes .exit,.onion
13
+
14
+ SocksPort 9050
15
+
16
+ VirtualAddrNetworkIPv4 10.192.0.0/10
17
+ TransPort 9040 IsolateClientAddr IsolateClientProtocol IsolateDestAddr IsolateDestPort
18
+
19
+ TestSocks 1
20
+ MaxCircuitDirtiness 600
@@ -0,0 +1,72 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'pathname'
4
+ require 'date'
5
+ require 'digest'
6
+ require_relative 'msg'
7
+
8
+ module Spior
9
+ class Install
10
+
11
+ def self.dependencies
12
+ if Pathname.new("/usr/bin/emerge")
13
+ puts "Install with emerge..."
14
+ system('sudo emerge -av --changed-use tor iptables')
15
+
16
+ elsif Pathname.new("/usr/bin/pacman")
17
+ puts "Install with pacman..."
18
+ system('sudo pacman -S --needed tor iptables')
19
+
20
+ elsif Pathname.new("/usr/bin/apt-get")
21
+ puts "Install with apt-get"
22
+ system('sudo apt-get tor iptables')
23
+ end
24
+ end
25
+
26
+ def self.config_files
27
+ copy_file("torrc", "/etc/tor/torrc")
28
+ copy_file("resolv.conf", "/etc/resolv.conf")
29
+ copy_file("ipt_mod.conf", "/etc/modules-load.d/ipt_mod.conf")
30
+ end
31
+
32
+ private
33
+
34
+ def self.copy_file(conf, target)
35
+ @config_file = "conf/#{conf}"
36
+ return if check_hash(target)
37
+ if File.exist? target then
38
+ print "Target #{target} exist, backup and replace? [N/y] "
39
+ choice = gets.chomp
40
+ if choice =~ /y|Y/ then
41
+ backup_file(target)
42
+ add_file target
43
+ end
44
+ else
45
+ add_file target
46
+ end
47
+ end
48
+
49
+ def self.check_hash(target)
50
+ return unless File.exist? target
51
+ sha256conf = Digest::SHA256.file @config_file
52
+ sha256target = Digest::SHA256.file target
53
+ if sha256conf === sha256target then
54
+ Msg.p "File #{target} alrealy exist, skip"
55
+ return true
56
+ end
57
+ return false
58
+ end
59
+
60
+ def self.backup_file(target)
61
+ d = DateTime.now
62
+ backup = target + ".backup-" + d.strftime('%b-%d_%I-%M')
63
+ system("sudo cp -a #{target} #{backup}")
64
+ puts "Renamed file #{backup}"
65
+ end
66
+
67
+ def self.add_file(target)
68
+ system("sudo cp -a #{@config_file} #{target}")
69
+ Msg.p "File #{@config_file} has been successfully copied at #{target}"
70
+ end
71
+ end
72
+ end
data/lib/spior/msg.rb ADDED
@@ -0,0 +1,15 @@
1
+ require 'rainbow'
2
+
3
+ module Msg
4
+ def self.head
5
+ puts Rainbow("------------------------------------------------").cyan
6
+ end
7
+
8
+ def self.p(text)
9
+ puts Rainbow("[").cyan + Rainbow("+").white + Rainbow("]").cyan + " " + text
10
+ end
11
+
12
+ def self.err(text)
13
+ puts Rainbow("[").red + Rainbow("-").white + Rainbow("]").red + " " + text
14
+ end
15
+ end
@@ -0,0 +1,47 @@
1
+ require 'optparse'
2
+ require_relative 'status'
3
+
4
+ module Spior
5
+ class Options
6
+ attr_reader :install
7
+ attr_reader :copy
8
+
9
+ def initialize(argv)
10
+ @install = false
11
+ @copy = false
12
+ parse(argv)
13
+ end
14
+
15
+ private
16
+
17
+ def parse(argv)
18
+ OptionParser.new do |opts|
19
+
20
+ opts.on("-i", "--install", "Install dependencies") do
21
+ @install = true
22
+ end
23
+
24
+ opts.on("-c", "--copy", "Copy config files") do
25
+ @copy = true
26
+ end
27
+
28
+ opts.on("-s", "--status", "Look infos about your current ip") do
29
+ Spior::Status::info
30
+ end
31
+
32
+ opts.on("-h", "--help", "Show this message") do
33
+ puts opts
34
+ exit
35
+ end
36
+
37
+ begin
38
+ argv = ["-h"] if argv.empty?
39
+ opts.parse!(argv)
40
+ rescue OptionParser::ParseError => e
41
+ STDERR.puts e.message, "\n", opts
42
+ exit(-1)
43
+ end
44
+ end
45
+ end
46
+ end
47
+ end
@@ -0,0 +1,22 @@
1
+ require_relative 'options'
2
+ require_relative 'install'
3
+ require_relative 'msg'
4
+
5
+ module Spior
6
+ class Runner
7
+ def initialize(argv)
8
+ @options = Options.new(argv)
9
+ end
10
+
11
+ def run
12
+ if @options.install then
13
+ Msg.head
14
+ Spior::Install::dependencies
15
+ end
16
+ if @options.copy then
17
+ Msg.head
18
+ Spior::Install::config_files
19
+ end
20
+ end
21
+ end
22
+ end
@@ -0,0 +1,21 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'open-uri'
4
+ require 'json'
5
+
6
+ module Spior
7
+ class Status
8
+
9
+ # TODO: if someone want help, i have trouble to make JSON.parse() work here
10
+ # the output is very very ugly !
11
+ def self.info
12
+ uri = URI.parse("https://ipleak.net/json")
13
+ uri.open {|f|
14
+ f.each_line {|line|
15
+ p line
16
+ }
17
+ }
18
+ end
19
+
20
+ end
21
+ end
data/spior.gemspec ADDED
@@ -0,0 +1,22 @@
1
+ Gem::Specification.new do |s|
2
+ s.name = "spior"
3
+ s.summary = "A tool to make TOR your default gateway"
4
+ s.description = File.read(File.join(File.dirname(__FILE__), "README.md"))
5
+ s.version = "0.0.2"
6
+ s.requirements << 'tor'
7
+ s.requirements << 'sudo'
8
+ s.requirements << 'iptables'
9
+ s.platform = Gem::Platform::RUBY
10
+ s.author = ['szorfein']
11
+ s.homepage = 'https://github.com/szorfein/spior'
12
+ s.email = 'szorfein@protonmail.com'
13
+ s.required_ruby_version = '>=2.4'
14
+ s.files = `git ls-files`.split(" ")
15
+ s.files.reject! { |fn| fn.include? "certs" }
16
+ s.executables = [ 'spior' ]
17
+ s.test_files = Dir["test/test_*.rb"]
18
+ s.licenses = ['MIT']
19
+ s.cert_chain = ['certs/szorfein.pem']
20
+ s.signing_key = File.expand_path("~/.ssh/gem-private_key.pem") if $0 =~ /gem\z/
21
+ s.add_runtime_dependency('rainbow', '3.0.0')
22
+ end
@@ -0,0 +1,12 @@
1
+ require 'minitest/autorun'
2
+ require_relative '../lib/spior/install'
3
+ require 'pathname'
4
+
5
+ class TestInstall < Minitest::Test
6
+
7
+ def test_sudo_is_installed
8
+ sudo = `which sudo`
9
+ assert_match(/sudo/, sudo, "sudo isn't installed?")
10
+ end
11
+
12
+ end
@@ -0,0 +1,5 @@
1
+ require 'minitest/autorun'
2
+ require_relative '../lib/spior/options'
3
+
4
+ class TestOptions < Minitest::Test
5
+ end
data.tar.gz.sig ADDED
Binary file
metadata ADDED
@@ -0,0 +1,117 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: spior
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.0.2
5
+ platform: ruby
6
+ authors:
7
+ - szorfein
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain:
11
+ - |
12
+ -----BEGIN CERTIFICATE-----
13
+ MIIETTCCArWgAwIBAgIBATANBgkqhkiG9w0BAQsFADAoMSYwJAYDVQQDDB1zem9y
14
+ ZmVpbi9EQz1wcm90b25tYWlsL0RDPWNvbTAeFw0yMDA0MzAxNzAxNDBaFw0yMTA0
15
+ MzAxNzAxNDBaMCgxJjAkBgNVBAMMHXN6b3JmZWluL0RDPXByb3Rvbm1haWwvREM9
16
+ Y29tMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAxCTYZRndCTRy18rE
17
+ exr2wig/staa0G5kt99xqaBYD0dnIRBr/GO5dFntlBVwmefQlTrNbygVUIYTb8Vg
18
+ B1oX3v/LLW9SRQcWaZwou0tARqanm5WhgV1ZYQTs22endTazsDHw0uhM3V+FgDh+
19
+ eR5wM9vU+SkRFHWzjVS1OxyTSCBVWb3+nrYTr/OKZ5Fm3Vo1dEQdwBEWLLXuUBxs
20
+ dWEDmBk7iTJbvNdd5Kk2wfMKRMOl9NGicJl3Cb5yl5ITeZsXdOsrLBBPepTpNeq2
21
+ k1goew3mEd/4pVXrdw6S5Qr6RTbTCLpKNRxWtx01vue9NN1cQ/Ds5FRkCp/Ntw/k
22
+ Xroyofo4MW5fEPq+udgvVpdTfguQkpmuJg7TRiq9F5hDhEMnKUsdM2fSev9u8EvL
23
+ OkidKy8bnhUOoG9qDxEG/IyibjRLl1i5jtyHa8Jb/We8poZ5LI8qjHwMPjTBhDgi
24
+ EzaYV5rLGs5S1/m58XG6a+620x2tcQZph6FFbnQJ8QBuNz6zAgMBAAGjgYEwfzAJ
25
+ BgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNVHQ4EFgQUc8XWveAjxS5fVEOZeeZe
26
+ uUQmbhMwIgYDVR0RBBswGYEXc3pvcmZlaW5AcHJvdG9ubWFpbC5jb20wIgYDVR0S
27
+ BBswGYEXc3pvcmZlaW5AcHJvdG9ubWFpbC5jb20wDQYJKoZIhvcNAQELBQADggGB
28
+ AG4K1ZJdzcVABSnVuD83z5ne9eBlrYscHHSXev5FX32jFdKxl19FQ+eorjSOTsNq
29
+ SIgKneQOKdsWIlv8M6NDiUDcc1s504fOpIVtMbP+6n47hBGz4bzGlAdtvTO1PewK
30
+ tW6ii8TOCOJ3Pv6bTzQlsaQrADi2MHuVHTb14H7uoSFJNzfU4sYJn1C3PRMC3G7n
31
+ Qe/zVOdMf0bkwBnfQNojbwx3Vy1jr2JSQWjK25NYimpuKV0skanU0iBiqru6VCbK
32
+ zhDNufCgCnWLwXXET3onVQMZsiLTUFf30BXX7PY1O0Km15MQn1HzOecJ3ZIDBWtS
33
+ d/lg1MHB7+/FQAY5FujZqvVv5i2M9wLx+7N4ONRA7MsWD86hLiYN68QeRsHI+LNf
34
+ AnVdw7i28f3GhZldcdllblGeTOjSfwl9wL4yBb1UwVjvcwMR5SDed0yPmHPXBiAC
35
+ J/zT/q2Ac7BWpSLbv6p9lChBiEnD9j24x463LR5QQjDNS5SsjzRQfFuprsa9Nqf2
36
+ Tw==
37
+ -----END CERTIFICATE-----
38
+ date: 2020-05-02 00:00:00.000000000 Z
39
+ dependencies:
40
+ - !ruby/object:Gem::Dependency
41
+ name: rainbow
42
+ requirement: !ruby/object:Gem::Requirement
43
+ requirements:
44
+ - - '='
45
+ - !ruby/object:Gem::Version
46
+ version: 3.0.0
47
+ type: :runtime
48
+ prerelease: false
49
+ version_requirements: !ruby/object:Gem::Requirement
50
+ requirements:
51
+ - - '='
52
+ - !ruby/object:Gem::Version
53
+ version: 3.0.0
54
+ description: "# spior\n(Spider|Tor). A tool to make TOR your default gateway and randomize
55
+ your hardware (MAC). \n**Still under development !**\n\n## Prerequisite\nJust a
56
+ little tool for change the mac address in POSIX shell.\n\n $ curl -s -L -o deceitmac.tar.gz
57
+ https://github.com/szorfein/deceitmac/archive/master.tar.gz\n $ tar xvf deceitmac-master\n
58
+ \ $ cd deceitmac-master\n $ sudo make install\n\n## Install\nSpior is cryptographically
59
+ signed, so add my public key (if you haven’t already) as a trusted certificate.\n\n
60
+ \ $ gem cert --add <(curl -Ls https://raw.githubusercontent.com/szorfein/spior/master/certs/szorfein.pem)\n\nAnd
61
+ install the gem\n\n $ gem install spior -P MediumSecurity\n\n## Usage\n\n $
62
+ spior -h\n $ spior --install\n\n### links\n+ https://rubyreferences.github.io/rubyref\n+
63
+ https://rubystyle.guide/"
64
+ email: szorfein@protonmail.com
65
+ executables:
66
+ - spior
67
+ extensions: []
68
+ extra_rdoc_files: []
69
+ files:
70
+ - ".gitignore"
71
+ - LICENSE
72
+ - README.md
73
+ - bin/spior
74
+ - conf/ipt_mod.conf
75
+ - conf/iptables.service
76
+ - conf/resolv.conf
77
+ - conf/ssh.conf
78
+ - conf/sshd.conf
79
+ - conf/sshuttle.service
80
+ - conf/torrc
81
+ - lib/spior/install.rb
82
+ - lib/spior/msg.rb
83
+ - lib/spior/options.rb
84
+ - lib/spior/runner.rb
85
+ - lib/spior/status.rb
86
+ - spior.gemspec
87
+ - test/test_install.rb
88
+ - test/test_options.rb
89
+ homepage: https://github.com/szorfein/spior
90
+ licenses:
91
+ - MIT
92
+ metadata: {}
93
+ post_install_message:
94
+ rdoc_options: []
95
+ require_paths:
96
+ - lib
97
+ required_ruby_version: !ruby/object:Gem::Requirement
98
+ requirements:
99
+ - - ">="
100
+ - !ruby/object:Gem::Version
101
+ version: '2.4'
102
+ required_rubygems_version: !ruby/object:Gem::Requirement
103
+ requirements:
104
+ - - ">="
105
+ - !ruby/object:Gem::Version
106
+ version: '0'
107
+ requirements:
108
+ - tor
109
+ - sudo
110
+ - iptables
111
+ rubygems_version: 3.1.2
112
+ signing_key:
113
+ specification_version: 4
114
+ summary: A tool to make TOR your default gateway
115
+ test_files:
116
+ - test/test_options.rb
117
+ - test/test_install.rb
metadata.gz.sig ADDED
Binary file