Rob van der Hoeven: > On Wed, 2017-10-25 at 13:27 +0000, nusenu wrote: > > Rob van der Hoeven: > > > I'm currently working on a small Linux utility that does single-program > > > transparent proxying. My utility tests if Tor handles all Internet > > > traffic by requesting an .onion address. If the address gets resolved, > > > and if a HTTP HEAD request to the resolved address gets a response, > > > it's assumed that all Internet traffic is routed through Tor. > > > > Isn't it better to check if your are exiting from an exit IP? (or how > > do you authenticate the response?) > > That's a good question. I want to know if the Tor network handles all > TCP and DNS traffic. Only the Tor network can resolve an .onion > address, and only the Tor network can reach an .onion address. So, if > both resolve and requesting work, I am quite confident that Tor handles > all TCP traffic. Keep in mind the false positives caused by crappy networks that just resolve _all_ domains and then serve ads, a captive portal, etc. on whatever IP address. Checking the https://check.torproject.org/api/ip response body seems like it would be safer. Rusty
Attachment:
signature.asc
Description: PGP signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk