[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Proxifier Socks4a leaks with Tor?
- To: or-talk@xxxxxxxx
- Subject: Re: Proxifier Socks4a leaks with Tor?
- From: echosblue <echosblue@xxxxxxxxx>
- Date: Thu, 29 Mar 2007 18:53:53 -0400
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Thu, 29 Mar 2007 18:54:20 -0400
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; b=Jppe3uBwk8TmHjWXeflaYgBiHc/txsJNYoexpl50gKttYWrDz2kEqM3M/Mhr3+nJgWDC2uH5xlLiV70abZ0NE5EVFd7yO0dY+F8Db1AiNBjOVzGygEEsOX0EMMHeyanIZ/iZuGLOuOSCn0rtEehngy3CNEplyOU+nYzK7B7TyeA=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; b=GObUTIy9jeEO59T39+tWpkCuIYAyNySp0NGxBw0tnEu1eHdEhkN5qbDiprOsk70RJzg51Z2J5whNAsyBWDyc52n/uzjOZVhTMFGxkgB+ktMk76xMoLKJd/cBXFc25Qn09LHTfZmjJTe4SkmtcHK5sBa/4kyUQy218JDTRJkFbHc=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 1.5.0.10 (Macintosh/20070221)
Hi, I use a Windows program called Proxifier that routes all
applications to connect to Tor. I find Proxifier very useful in allowing
Tor to connect to proxies set in Firefox by an external program (Hide IP
Platinum). I think easier than editing the Privoxy config to stick open
proxies at the end of an exit node. My only concern with Proxifier is
that Vidalia is giving me warnings about only receiving an IP address
from Socks4. In Proxifier, I have entered IP:127.0.0.1 Port:9050 and
have selected the Socks4a option. Why does Vidalia/Tor think I'm only
using Socks4? Does anyone have experience with Proxifier? How does it
resolve hostnames in Socks4a? Thanks.