Configuring a Proxy in Tor Browser
Why Use a Proxy in Tor Browser
Tor Browser is already a powerful anonymity tool, but sometimes an additional proxy is needed before Tor:
- ISP blocks Tor — the provider blocks direct connections to the Tor network
- Corporate firewall — access to Tor is blocked at work
- Hiding the fact of Tor usage — ISP sees a connection to Tor, a proxy hides this
- Additional layer of protection — a proxy between you and the Guard node
Architecture: Proxy Before Tor
Without a proxy: You → Guard node → Middle → Exit → Website
With a proxy: You → Proxy → Guard node → Middle → Exit → Website
The proxy only sees that you are connecting to Tor (Guard node). It does not see which websites you visit.
Your ISP sees a connection to the proxy, but not to Tor.
Configuring a Proxy
On First Launch
- Launch Tor Browser
- On the connection screen, click "Configure Connection"
- Find the "Advanced" section → "Use a local proxy"
- Select the proxy type: HTTP/HTTPS or SOCKS4/SOCKS5
- Enter the address and port
- If authentication is required, enter the username and password
- Click "Connect"
In an Already Configured Tor Browser
- Open Tor Browser
- Click the shield icon or open about:preferences#tor
- In the "Connection" section, find "Advanced"
- Enable "I use a proxy to connect to the Internet"
- Enter the proxy details
- Click "OK" and restart the connection
Via the torrc File
For advanced configuration, edit the torrc file:
HTTPSProxy ip:port — for HTTPS proxy
HTTPSProxyAuthenticator user:password — authentication
Socks5Proxy ip:port — for SOCKS5 proxy
Socks5ProxyUsername user — username
Socks5ProxyPassword password — password
torrc location:
- Windows: Desktop/Tor Browser/Browser/TorBrowser/Data/Tor/torrc
- macOS: ~/Library/Application Support/TorBrowser-Data/Tor/torrc
- Linux: ~/.local/share/torbrowser/profile.default/torrc
Bridges
If Tor is directly blocked, instead of a regular proxy, you can use bridges — hidden entry nodes:
Built-in Bridges
- Connection Settings → Bridges
- Select "Use a bridge"
- Select "Select a built-in bridge": obfs4, meek-azure, Snowflake
- Connect
Obtaining Additional Bridges
- Website: bridges.torproject.org
- Email: bridges@torproject.org (with an empty body, subject: get transport obfs4)
Bridge Types
obfs4 — masks Tor traffic, making it resemble random data. Most effective.
meek — masks traffic as a request to a CDN (Azure, Amazon). Works even under strict censorship.
Snowflake — uses WebRTC for masking. Volunteers provide their browsers as bridges.
Combination: Proxy + Bridge
You can use a proxy AND a bridge simultaneously:
- Configure the proxy in Connection Settings
- Enable a bridge (obfs4 or another)
- Traffic will flow: You → Proxy → Bridge → Tor → Website
This provides maximum obfuscation: your ISP sees regular HTTPS to the proxy, and the proxy sees encrypted obfs4 to the bridge.
Checking the Connection
Checking Tor Operation
- Open check.torproject.org
- It should display: "Congratulations. This browser is configured to use Tor"
Checking the Circuit
- Click the lock icon next to the URL
- "Tor Circuit for this Site" will show the chain of nodes
- You can click "New Circuit" to change the exit node
Common Problems
"Unable to connect"
- Check proxy details (address, port, login)
- Ensure the proxy is working (check in a regular browser)
- Try a different proxy type (HTTP → SOCKS5)
Slow Connection
- Bridges (especially meek) work slower than a direct connection
- Try obfs4 instead of meek — it's usually faster
- Use a low-latency proxy
Tor Blocks Proxy
- Tor Browser only trusts certain proxy types
- HTTP CONNECT and SOCKS4/5 are supported
- Transparent proxy is not supported
Security
What the Proxy Sees
- IP of the Tor Guard node (or bridge)
- Encrypted traffic (cannot read)
- Time and volume of traffic
What the ISP Sees
- Connection to the proxy's IP
- Does not see Tor traffic
Recommendations
- Use a trusted proxy (not free public ones)
- SOCKS5 is preferable to HTTP — no logging of HTTP headers
- If the proxy is unreliable, it adds risk rather than reducing it
- Bridge + proxy — maximum obfuscation
Conclusion
Configuring a proxy in Tor Browser is useful for bypassing Tor network blocking and hiding the fact of Tor usage from your ISP. For most users, bridges (obfs4 or Snowflake) are sufficient. A proxy is added when bridges are also blocked or an additional layer of obfuscation is needed.