[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: FTP with Tor
Thanks tildeone for all your help. Am currently exploring the tor_resolve
stuff you kindly put down. Would be so grateful if anyone can comment
further on these topics:
1) "the fact that an application speaks socks 4a doesn't mean the dns
leakage problem is not present." Oh. Can you perhaps explain the
significance of socks4a for me? Why is it so important to Tor if it is not
related to this DNS issue? Isn't the importance of Privoxy something to do
with it enabling Tor to be used as a Socks4a proxy as opposed to a Socks4 or
2) Is this valid?: if I input an IP address to the FTP client, instead of a
domain name, then there will be no DNS issue cause it will of course not
have to look up the corresponding IP address to the domain name - it already
has the IP address!
3) With FTP - is it best to use Tor as a 1) Socks4a proxy 2) Socks4 proxy or
3) Socks 5 proxy?
Thanks in advance. hope you guys all have a nice weekend.
From: tilde0ne <admin@xxxxxxxxxxxxxxxxxxxx>
Subject: Re: FTP with Tor
Date: Sat, 23 Jul 2005 00:33:42 +0200
Received: from belegost.seul.org ([184.108.40.206]) by mc11-f30.hotmail.com
with Microsoft SMTPSVC(6.0.3790.211); Fri, 22 Jul 2005 15:40:32 -0700
Received: by moria.seul.org (Postfix)id 692C01408074; Fri, 22 Jul 2005
18:40:27 -0400 (EDT)
Received: by moria.seul.org (Postfix, from userid 65534)id 662D614080DB;
Fri, 22 Jul 2005 18:40:27 -0400 (EDT)
Received: from tilde-one.dyndns.org (dsl-084-058-010-213.arcor-ip.net
[220.127.116.11])by moria.seul.org (Postfix) with ESMTP id D912A1408074for
<or-talk@xxxxxxxxxxxxx>; Fri, 22 Jul 2005 18:40:26 -0400 (EDT)
Received: (qmail 12729 invoked by uid 1010); 23 Jul 2005 00:33:43 +0200
Received: from 192.168.3.4 by tilde-one (envelope-from
<admin@xxxxxxxxxxxxxxxxxxxx>, uid 1008) with qmail-scanner-1.25-st-qms
(clamdscan: 0.86.1/533. perlscan: 1.25-st-qms. Clear:RC:1(192.168.3.4):.
Processed in 0.128715 secs); 22 Jul 2005 22:33:43 -0000
Received: from unknown (HELO ?127.0.0.1?) (192.168.3.4) by
tilde-one.dyndns.org with SMTP; 23 Jul 2005 00:33:43 +0200
X-Antivirus-tilde0ne-Mail-From: admin@xxxxxxxxxxxxxxxxxxxx via tilde-one
X-Antivirus-tilde0ne: 1.25-st-qms (Clear:RC:1(192.168.3.4):. Processed in
0.128715 secs Process 12718)
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
X-Antivirus: avast! (VPS 0529-2, 21.07.2005), Outbound message
X-To-Get-Off-This-List: mail majordomo@xxxxxxxx, body unsubscribe or-talk
X-OriginalArrivalTime: 22 Jul 2005 22:40:32.0415 (UTC)
-----BEGIN PGP SIGNED MESSAGE-----
On 23.07.2005 00:09, Ben Clifford wrote:
> 1) "the fact that an application speaks socks 4a doesn't mean the dns
> leakage problem is not present."
> Oh. Can you perhaps explain the significance of socks4a for me? Why is
> important to Tor if it is not related to this DNS issue? Isn't the
> importance of Privoxy something to do with it enabling Tor to be used as
> Socks4a proxy as opposed to a Socks4 or Socks5 proxy?
Sorry, I can't (I'm really not that network guru at all, just starting
> 2) So, I think what you are saying is that if I input an IP address to
> FTP client, instead of a domain name, then there will be no DNS issue
> it will of course not have to look up the corresponding IP address to
> domain name - it already has the IP address! A good idea for sure. Now,
> to get the IP address for a given ftp domain name? Could use
> "a program that you run to resolve one single domain name to one sinlge
> using the tor network."
> How do I run Tor-resolve? Still don't really know how to use the
usage (in DOS promt, if you are on windows):
tor_resolve [-v] hostname [sockshost:socksproxy]
arguments in  are optional, -v means verbose output, without defining
sockshost:socksport tor_resovle defaults to localhost:9050.
> 3) With FTP - is it best to use Tor as a 1) Socks4a proxy 2) Socks4
> 3) Socks 5 proxy?
I think it should be socks 4a (but again, I don't really know the
significance - guess there are people knowing much better on the list).
Hope that helps
tor node id fingerprint:
5f69 47da 52a0 99b7 06c8 8319 6de8 4803 7817 d32a
admin key fingerprint:
a812 3e53 75a0 21a4 c73b 7438 35b4 f926 582o 4cec
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (MingW32)
-----END PGP SIGNATURE-----