[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
DNS leak check
- To: or-talk@xxxxxxxxxxxxx
- Subject: DNS leak check
- From: Agent0013 <0013.agent0013@xxxxxxxxx>
- Date: Fri, 10 Mar 2006 12:10:16 -0600
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Fri, 10 Mar 2006 13:10:20 -0500
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type; b=HOB2tqwSxPISfDcS4iDP5WX979RSLTUsSMttdSHRCqQwpPGC/pA2LC/+cjIvmVNNLptG+bRVHuJFdjJLONmIoOnx9+dvEb++kkjRJ6yEfy7Te30mTMEetVgs/ziqKZ5wb3K51HsUA7YZpbg7CHfIXHBecjocTjnayrkL/FlWVk0=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
I was wondering how you check that your DNS requests are not being
leaked. I have setup tor as a server on my Linux box at home and have
just now got privoxy running on the same server. I ssh into that server
from my computer at work and tunnel the connection into privoxy then
into tor. Where would I look to find the dns request and where it is
being routed? How can I make sure that privoxy is doing it's job in
hiding the dns request. The connection I have not looks exactly the
same as before I had privoxy installed and was just using tor.
Thanks,
Agent0013
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (MingW32)
iD8DBQFEEcDBsDGV+i6wZnIRAqxxAJ9dIJ5b2tqBPY+eWMzf7UMaFOVZHwCgj7yx
If1qp9gtWsqplmEvVfN/9b0=
=xTne
-----END PGP SIGNATURE-----