[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor with ssh port forwarding
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
>>>> 1. Run squid on your machine at home (say on port 3128)
>>> Don't do that. Squid will add the ``X-Forwarded-For'' header, and
>>> hence leak your IP.
>>>
>>> Instead of Squid, you should run either Privoxy or Polipo.
>>>
>>> Juliusz
>
> # TAG: forwarded_for on|off
> # If set, Squid will include your system's IP address or name
> # in the HTTP requests it forwards. By default it looks like
> # this:
> #
> # X-Forwarded-For: 192.1.2.3
> #
> # If you disable this, it will appear as
> #
> # X-Forwarded-For: unknown
> #
> #Default:
> # forwarded_for on
> forwarded_for off
And also you can chain proxies, for example "client -> squid -> privoxy
- -> tor"
Some reading: http://wiki.noreply.org/noreply/TheOnionRouter/SquidProxy
http://wiki.boum.org/CyberForat/TorifiedNetwork
M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3-cvs (MingW32)
Comment: GnuPT 2.7.6
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFFHVuE6fSN8IKlpYoRAoEKAJ4jtO/k5fCsJKpI/TTSjUmSFFNJ3wCfVPAJ
bt1Lz9reGB7fqi34TQvMPPY=
=sBUc
-----END PGP SIGNATURE-----