[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Tor with ssh port forwarding



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1




>>>> 1.  Run squid on your machine at home (say on port 3128)
>>> Don't do that.  Squid will add the ``X-Forwarded-For'' header, and
>>> hence leak your IP.
>>>
>>> Instead of Squid, you should run either Privoxy or Polipo.
>>>
>>>                                         Juliusz
> 
> #  TAG: forwarded_for   on|off
> #       If set, Squid will include your system's IP address or name
> #       in the HTTP requests it forwards.  By default it looks like
> #       this:
> #
> #               X-Forwarded-For: 192.1.2.3
> #
> #       If you disable this, it will appear as
> #
> #               X-Forwarded-For: unknown
> #
> #Default:
> # forwarded_for on
> forwarded_for off


And also you can chain proxies, for example "client -> squid -> privoxy
- -> tor"

Some reading: http://wiki.noreply.org/noreply/TheOnionRouter/SquidProxy
http://wiki.boum.org/CyberForat/TorifiedNetwork


M


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3-cvs (MingW32)
Comment: GnuPT 2.7.6
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFHVuE6fSN8IKlpYoRAoEKAJ4jtO/k5fCsJKpI/TTSjUmSFFNJ3wCfVPAJ
bt1Lz9reGB7fqi34TQvMPPY=
=sBUc
-----END PGP SIGNATURE-----