[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor with ssh port forwarding
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>> 1. Run squid on your machine at home (say on port 3128)
>
> Don't do that. Squid will add the ``X-Forwarded-For'' header, and
> hence leak your IP.
>
> Instead of Squid, you should run either Privoxy or Polipo.
>
> Juliusz
# TAG: forwarded_for on|off
# If set, Squid will include your system's IP address or name
# in the HTTP requests it forwards. By default it looks like
# this:
#
# X-Forwarded-For: 192.1.2.3
#
# If you disable this, it will appear as
#
# X-Forwarded-For: unknown
#
#Default:
# forwarded_for on
forwarded_for off
#M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3-cvs (MingW32)
Comment: GnuPT 2.7.6
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFHVng6fSN8IKlpYoRAlNOAJ9ZboFE1DsGDGMNV2TXLfYvBm5eagCfUIXT
2hSaTLls8FtzsS7AnB/wizY=
=lXb/
-----END PGP SIGNATURE-----