[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: What to do at IP number change?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: What to do at IP number change?
- From: Hans Schnehl <torvallenator@xxxxxxxxx>
- Date: Mon, 7 Jan 2008 23:35:42 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 07 Jan 2008 17:36:21 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:date:from:to:subject:message-id:references:mime-version:content-type:content-disposition:in-reply-to:user-agent; bh=FPnEgPqLrWZXHMj6LcKyvmGZ8ZZPToIv0WfOJV/VOAE=; b=eYbhUwPly/K6T3WErxB9yYjhWmu660t/P/dZW7HNncYJ2dLJXFUTkowVcEZmmoCcjs5ZmNtMz+8oYB2L9X9LYsZtV+DwtoREiH11RDnTM+s6YDB7ZeP2N6IPvEtap5nv36ArZvb4I2hojD9LU2dHxmIx38FuX37hfB4zlWV5Z4M=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=date:from:to:subject:message-id:references:mime-version:content-type:content-disposition:in-reply-to:user-agent; b=gbMsafxIjrBdsxWtzPugVYF9pGa/hXwKUBnK1oRSLASkIq8Qts+W8bHuheTszhta5GSekaQsptnWlr/jroVGT4uQoP6xha6VRwijlff83/g4W1czfVEjTrqWZEiwI9e5PuMrco+b1D/SFtalBM49HbB3kihhHWJWMpWKu9ADw3Q=
- In-reply-to: <525115653@xxxxxx>
- References: <525115653@xxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mutt/1.5.17 (2007-11-01)
On Mon, Jan 07, 2008 at 10:52:57PM +0100, dr._no@xxxxxxx wrote:
> > A word about obfuscation: If we run a tor node, we are as anonymous as Sta. Claus
> > hiding behind sunglasses to our ISP's.
> that's clear; i'm using TOR as a mix with a transparent local http proxy which uses an ISP
> proxy as parent proxy, so that the exit traffic goes through two proxies and with several numbers
> in the X_FORWARDED_FOR header ;-)
> That's good enough for hiding my public IP to http servers which do log only the TCP/IP number and
> for most which do evaluate the X_FORWARDED_FOR header.
> And because of the mixing the ISP can't see which traffic is caused by me. So he can see a TOR server
> which uses one of his proxies but not my personal traffic. For obfuscation i opened all exit ports except
> 25 (because of spam).
> > > So i should use a DynDNS host+domain name?
> > You may, but not necessarily have to. I made myself a little script catching the changed IP via mpd_linkup
> > (or ppp.linkup or what you may use) and changing the Address 126.96.36.199 into the new Address 188.8.131.52
> > and then sends a SIGHUP to Tor.
> Ok, i will use
> but what exactly shall i write into that file?
> killall -s SIGHUP tor?ybe you
I am not familiar how to do this on linux and have no machine to try here, can please someone help out?
You need the following:
torpid= 'catch the PID'
#something like the following should do then: (please someone "translate to a linux")
sed -i '' 's/^\(Address\) .*/\1 '$newip'/' /path/to/your/torrc
/path/to/kill -s HUP $torpid
to be put in a script and initiated by e.g. ip-up.local does the trick for me.
Maybe this is a complete waste of time, if Tor is able to determine the new IP alone faster.
IN this case a simple:
/path/to/kill -s HUP $torpid
should be fine.
What may be faster or more efficient, to HUP tor with a new IP, or to let the Authorities find out themselves
about a renewed IP, I do not know. Anyone?