On Thu, 2012-09-20 at 05:52 +0200, Andreas Krey wrote: > On Wed, 19 Sep 2012 22:17:18 +0000, David H. Lipman wrote: > > From: "David H. Lipman" <DLipman@xxxxxxxxxxx> > > > > > > >On the WGET command line add the following switch parameter after Tor has > > >been loaded. > > > > > >--execute=http_proxy=http://127.0.0.1:8118/ > > That looks like telling wget to use an http proxy, not a socks proxy; > and tor by itself only offers a socks proxy (and usually on a different > port as well). > > And as far as I know wget can't deal with socks proxies. No, but the port on that example suggests an HTTP proxy like Privoxy or Polipo configured to forward to Tor's SOCKS proxy. > > I should add that the above is as a Proxy. How it works with .onion > > pseudo-domains I don't know. > > That is done by tor's socks proxy - you need to have the client leave > the hostname resolution to the proxy instead of doing the DNS lookup > itself and only passing down the IP address. Hidden services work with a properly configured forwarded HTTP proxy, like Privoxy or Polipo. This also means that wget won't leak DNS. -- Sent from Ubuntu
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk