[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor with ssh port forwarding



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>> 1.  Run squid on your machine at home (say on port 3128)
> 
> Don't do that.  Squid will add the ``X-Forwarded-For'' header, and
> hence leak your IP.
> 
> Instead of Squid, you should run either Privoxy or Polipo.
> 
>                                         Juliusz

#  TAG: forwarded_for   on|off
#       If set, Squid will include your system's IP address or name
#       in the HTTP requests it forwards.  By default it looks like
#       this:
#
#               X-Forwarded-For: 192.1.2.3
#
#       If you disable this, it will appear as
#
#               X-Forwarded-For: unknown
#
#Default:
# forwarded_for on
forwarded_for off



#M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3-cvs (MingW32)
Comment: GnuPT 2.7.6
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFHVng6fSN8IKlpYoRAlNOAJ9ZboFE1DsGDGMNV2TXLfYvBm5eagCfUIXT
2hSaTLls8FtzsS7AnB/wizY=
=lXb/
-----END PGP SIGNATURE-----