Re: 3 questions about how to setup TOR proxy chain
Hi, Could someone please answer these 3 questions (or point me to a place where I can find the answers): take a look at point 3.15 of: https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc That should take care of some of your questions. As for using more or less hops, that would involve modifying the code, there is no config option to do it. Martin
Re: 3 questions about how to setup TOR proxy chain
You can fully control Tor thru Tor Control Port. But it isnt end-user functionality, you will have to write some controlling program. I used this feature in my own app and works quite well. Marek On Fri, Aug 14, 2009 at 8:49 PM, Mmangobl...@gmail.com wrote: Hi, Could someone please answer these 3 questions (or point me to a place where I can find the answers): 1. I understand TOR uses 3 hops in its proxy chain. Is it possible to make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how can I do this? 2. Is it possible to define the nodes to use, so that TOR will only use these nodes in the chain and no other (i.ex: select 50 nodes, and TOR will randomly chose 3 nodes out of these 50 and not use the 1500 other nodes)? 3. To add on point 2 above, is it possible to statically select 3 nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know about the anonymity problems this may create, I'd only like to know if it is possible and how to do it). PS: I have already searched, and could only find some answers on how to select the exit node (.exit), but not on how to configure the proxy chain. Thanks a lot.
3 questions about how to setup TOR proxy chain
Hi, Could someone please answer these 3 questions (or point me to a place where I can find the answers): 1. I understand TOR uses 3 hops in its proxy chain. Is it possible to make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how can I do this? 2. Is it possible to define the nodes to use, so that TOR will only use these nodes in the chain and no other (i.ex: select 50 nodes, and TOR will randomly chose 3 nodes out of these 50 and not use the 1500 other nodes)? 3. To add on point 2 above, is it possible to statically select 3 nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know about the anonymity problems this may create, I'd only like to know if it is possible and how to do it). PS: I have already searched, and could only find some answers on how to select the exit node (.exit), but not on how to configure the proxy chain. Thanks a lot.
Re: 3 questions about how to setup TOR proxy chain
I think you are mistaking tor with VPN If you want to control where exatly your connections go you should try other software. The whole idea of TOR is that it (the program) chooses self with its algorithm which nodes to use. If you were able to select intermediate nodes it would become a totally different product. I don't think that's a feature that would be wishful, anyway that's IMHO, maybe others have other ideas about this... - Original Message From: M mangobl...@gmail.com To: or-talk@freehaven.net Sent: Friday, August 14, 2009 8:49:44 PM Subject: 3 questions about how to setup TOR proxy chain Hi, Could someone please answer these 3 questions (or point me to a place where I can find the answers): 1. I understand TOR uses 3 hops in its proxy chain. Is it possible to make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how can I do this? 2. Is it possible to define the nodes to use, so that TOR will only use these nodes in the chain and no other (i.ex: select 50 nodes, and TOR will randomly chose 3 nodes out of these 50 and not use the 1500 other nodes)? 3. To add on point 2 above, is it possible to statically select 3 nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know about the anonymity problems this may create, I'd only like to know if it is possible and how to do it). PS: I have already searched, and could only find some answers on how to select the exit node (.exit), but not on how to configure the proxy chain. Thanks a lot.
tor proxy chain
I've set up the proxy in firefox in order to connect to tor, and it works well, now I would like to do this: my_pc - tor - proxy_choosen_by_me:port-www_page but if I type in the address bar of firefox: http://proxy_choosen_by_me:port/www_page I get nothing Can you help me? Thanks
Re: tor proxy chain
giorgio m [EMAIL PROTECTED] wrote: I've set up the proxy in firefox in order to connect to tor, and it works well, now I would like to do this: my_pc - tor - proxy_choosen_by_me:port-www_page May I ask why? but if I type in the address bar of firefox: http://proxy_choosen_by_me:port/www_page I get nothing What kind of proxy is proxy_choosen_by_me? I'm not aware of a proxy standard that would work the way you described. It certainly wouldn't work with HTTP forwarding proxies. And while I'm not sure, I also believe that Firefox can't access other HTTP proxies through socks proxies anyway. If that's true, you need an additional proxy before Tor, for example: Firefox - Privoxy - Tor - another HTTP proxy - web site would work. Most of the time, however, using a proxy after Tor makes no sense as it usually reduces your anonymity level again (the IP address the target website sees doesn't change). Fabian signature.asc Description: PGP signature
Re: tor proxy chain
On Mon, Feb 12, 2007 at 02:47:54PM +0100, giorgio m wrote: :First of all, thanks for your polite and fast answer. :To simplify the problem, I say that I would like to do this: : :perl_script- tor - standard_http_proxy - web_site : :I want the web site to see the ip of the standard_http_proxy, not the tor :ip. :Do you think that it is possible to do this? I haven't been following the thread so appologies if I miss the mark... This seems possible *if* the standard_http_proxy accepts connections from all tor exit nodes. Now why you would want to do this is another question, perhaps the answer is in the archives. -Jon
Re: tor proxy chain
On 2/12/07, Jonathan D. Proulx [EMAIL PROTECTED] wrote: On Mon, Feb 12, 2007 at 02:47:54PM +0100, giorgio m wrote: :First of all, thanks for your polite and fast answer. :To simplify the problem, I say that I would like to do this: : :perl_script- tor - standard_http_proxy - web_site : :I want the web site to see the ip of the standard_http_proxy, not the tor :ip. :Do you think that it is possible to do this? I haven't been following the thread so appologies if I miss the mark... This seems possible *if* the standard_http_proxy accepts connections from all tor exit nodes. Why a proxy shouldn't accept connections coming from tor? To prevent abuses? Can you tell me how to do this proxychaining? Now why you would want to do this is another question, perhaps the answer is in the archives. I just read the faq again, where I found that perhaps you are worried that I will use tor to connect to open relays on port 25 and then spam, is it right? I can assure you that this is not the case (I would not be using tor in this case, I think that there are much easier tools), one of the reasons is for example that I don't want the websites to know that I'm using tor. Thanks in advance.
Re: tor proxy chain
On Mon, Feb 12, 2007 at 03:16:32PM +0100, giorgio m wrote: :Why a proxy shouldn't accept connections coming from tor? To prevent abuses? :Can you tell me how to do this proxychaining? Because then anyone using tor can use your proxy and any crimes/harassment they commit come from your proxy. have perl use socks to runn connections through tor configure the proxy to accept connections from all tor exit nodes. How to do this is best asked either in a perl list or a list for your proxy server software. : :Now why you would want to do this is another question, perhaps the :answer is in the archives. : : :I just read the faq again, where I found that perhaps you are worried :that I will use tor to connect to open relays on port 25 and then :spam, is it right? I can assure you that this is not the case (I would :not be using tor in this case, I think that there are much easier :tools), one of the reasons is for example that I don't want the :websites to know that I'm using tor. No, I'm not worried for TOR, I'm worried for you. If all your traffic appears to becoming from one proxy it's obvious who you are, and you have basicly zero anonymity. -Jon
Re: tor proxy chain
On 2/12/07, Jonathan D. Proulx [EMAIL PROTECTED] wrote: On Mon, Feb 12, 2007 at 03:16:32PM +0100, giorgio m wrote: :Why a proxy shouldn't accept connections coming from tor? To prevent abuses? :Can you tell me how to do this proxychaining? Because then anyone using tor can use your proxy and any crimes/harassment they commit come from your proxy. Hi Jonathan, I'm sorry if I was not clear; I don't own a proxy, I would like to connect to an existing proxy using tor (I want the web site to see the proxy ip, not the tor ip), for example the proxy lists that I find here http://www.samair.ru/proxy/ I will try to follow the ideas expressed by John and the I will let you know. -- Perhaps a contraption like this may work: 1. Install SocksCap / Freecap / tsocks and set it up to use Tor 2. Set your browser to use standard_http_proxy as your HTTP proxy 3. Launch your browser over SocksCap / Freecap / tsocks With luck, SocksCap / Freecap / tsocks will intercept the TCP connection your browser tries to make to the HTTP proxy, and tunnel it through Tor. -- Thanks have perl use socks to runn connections through tor configure the proxy to accept connections from all tor exit nodes. How to do this is best asked either in a perl list or a list for your proxy server software. : :Now why you would want to do this is another question, perhaps the :answer is in the archives. : : :I just read the faq again, where I found that perhaps you are worried :that I will use tor to connect to open relays on port 25 and then :spam, is it right? I can assure you that this is not the case (I would :not be using tor in this case, I think that there are much easier :tools), one of the reasons is for example that I don't want the :websites to know that I'm using tor. No, I'm not worried for TOR, I'm worried for you. If all your traffic appears to becoming from one proxy it's obvious who you are, and you have basicly zero anonymity. -Jon
Re: tor proxy chain
giorgio m [EMAIL PROTECTED] wrote: First of all, thanks for your polite and fast answer. You're welcome. To simplify the problem, I say that I would like to do this: perl_script- tor - standard_http_proxy - web_site I want the web site to see the ip of the standard_http_proxy, not the tor ip. Do you think that it is possible to do this? Probably the easiest way to do this is to add Privoxy to the proxy chain, have the Perl script use Privoxy as HTTP proxy and let Privoxy do the rest. I currently use something similar for testing purposes, the Privoxy config line looks like this: forward-socks4a .freebsd.org/Tor-Jail:9050 tor.fabiankeil.de:8118 Requests that match .freebsd.org/ are forwarded through the HTTP proxy tor.fabiankeil.de:8118 (another Privoxy) and the connection to that proxy is made through the socks4a server Tor-Jail:9050 (Tor). As mentioned earlier, from a anonymity point of view this isn't the smartest setup. It increases the chances that the traffic is sniffed or altered and the target server always sees the same IP address. You could also try to find a Perl module that can reach HTTP proxies through socks4a servers. If you find one (and aren't already using Privoxy anyway) this should be even easier to set up, provided you also find documentation for it. A third way would be to configure your Perl script to use a HTTP proxy and then intercept and redirect these requests through Tor. I recommend you use dns-proxy-tor, PF and a recent Tor alpha version to set up the interception proxy, but the programs John mentioned should work too. Fabian signature.asc Description: PGP signature
Re: tor proxy chain
I've set up the proxy in firefox in order to connect to tor, and it works well, now I would like to do this: my_pc - tor - proxy_choosen_by_me:port-www_page The simplest way would be to set a proxy that can do that upstream of tor. my_pc - my_proxy - tor - proxy_choosen_by_me:port - www_page With polipo, you do that by setting parentProxy to proxy_chosen_by_me, and socksParentProxy to tor's address. http://www.pps.jussieu.fr/~jch/software/polipo/manual/Parent-proxies.html I know that it can also be done with Privoxy, but someone else will need to fill in the details. Juliusz