Re: 3 questions about how to setup TOR proxy chain

2009-08-15 Thread Martin Balvers
 Hi,

 Could someone please answer these 3 questions (or point me to a place
 where I can find the answers):


take a look at point 3.15 of:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#torrc

That should take care of some of your questions.

As for using more or less hops, that would involve modifying the code,
there is no config option to do it.

Martin



Re: 3 questions about how to setup TOR proxy chain

2009-08-15 Thread slush
You can fully control Tor thru Tor Control Port. But it isnt end-user
functionality, you will have to write some controlling program. I used
this feature in my own app and works quite well.

Marek

On Fri, Aug 14, 2009 at 8:49 PM, Mmangobl...@gmail.com wrote:
 Hi,

 Could someone please answer these 3 questions (or point me to a place
 where I can find the answers):


 1. I understand TOR uses 3 hops in its proxy chain. Is it possible to
 make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how
 can I do this?

 2. Is it possible to define the nodes to use, so that TOR will only use
 these nodes in the chain and no other (i.ex: select 50 nodes, and TOR
 will randomly chose 3 nodes out of these 50 and not use the 1500 other
 nodes)?

 3. To add on point 2 above, is it possible to statically select 3
 nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know
 about the anonymity problems this may create, I'd only like to know if
 it is possible and how to do it).


 PS: I have already searched, and could only find some answers on how to
 select the exit node (.exit), but not on how to configure the proxy chain.

 Thanks a lot.



3 questions about how to setup TOR proxy chain

2009-08-14 Thread M
Hi,

Could someone please answer these 3 questions (or point me to a place
where I can find the answers):


1. I understand TOR uses 3 hops in its proxy chain. Is it possible to
make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how
can I do this?

2. Is it possible to define the nodes to use, so that TOR will only use
these nodes in the chain and no other (i.ex: select 50 nodes, and TOR
will randomly chose 3 nodes out of these 50 and not use the 1500 other
nodes)?

3. To add on point 2 above, is it possible to statically select 3
nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know
about the anonymity problems this may create, I'd only like to know if
it is possible and how to do it).


PS: I have already searched, and could only find some answers on how to
select the exit node (.exit), but not on how to configure the proxy chain.

Thanks a lot.


Re: 3 questions about how to setup TOR proxy chain

2009-08-14 Thread Tripple Moon
I think you are mistaking tor with VPN
If you want to control where exatly your connections go you should try other 
software.

The whole idea of TOR is that it (the program) chooses self with its algorithm 
which nodes to use.
If you were able to select intermediate nodes it would become a totally 
different product.
I don't think that's a feature that would be wishful, anyway that's IMHO, maybe 
others have other ideas about this...




- Original Message 
From: M mangobl...@gmail.com
To: or-talk@freehaven.net
Sent: Friday, August 14, 2009 8:49:44 PM
Subject: 3 questions about how to setup TOR proxy chain

Hi,

Could someone please answer these 3 questions (or point me to a place
where I can find the answers):


1. I understand TOR uses 3 hops in its proxy chain. Is it possible to
make it use less hops (i.ex: 1 or 2) or more hops (4, 5, ...) and how
can I do this?

2. Is it possible to define the nodes to use, so that TOR will only use
these nodes in the chain and no other (i.ex: select 50 nodes, and TOR
will randomly chose 3 nodes out of these 50 and not use the 1500 other
nodes)?

3. To add on point 2 above, is it possible to statically select 3
nodes (i.ex 2 middle nodes + 1 exit) and only use these 3? (I know
about the anonymity problems this may create, I'd only like to know if
it is possible and how to do it).


PS: I have already searched, and could only find some answers on how to
select the exit node (.exit), but not on how to configure the proxy chain.

Thanks a lot.



  


tor proxy chain

2007-02-12 Thread giorgio m

I've set up the proxy in firefox in order to connect to tor, and it
works well, now I would like to do this:
my_pc - tor - proxy_choosen_by_me:port-www_page

but if I type in the address bar of firefox:
http://proxy_choosen_by_me:port/www_page

I get nothing
Can you help me?

Thanks


Re: tor proxy chain

2007-02-12 Thread Fabian Keil
giorgio m [EMAIL PROTECTED] wrote:

 I've set up the proxy in firefox in order to connect to tor, and it
 works well, now I would like to do this:
 my_pc - tor - proxy_choosen_by_me:port-www_page

May I ask why?
 
 but if I type in the address bar of firefox:
 http://proxy_choosen_by_me:port/www_page
 
 I get nothing

What kind of proxy is proxy_choosen_by_me?

I'm not aware of a proxy standard that would work
the way you described. It certainly wouldn't work
with HTTP forwarding proxies.

And while I'm not sure, I also believe that
Firefox can't access other HTTP proxies through
socks proxies anyway.

If that's true, you need an additional proxy
before Tor, for example:

Firefox - Privoxy - Tor - another HTTP proxy - web site

would work.

Most of the time, however, using a proxy after Tor makes
no sense as it usually reduces your anonymity level again
(the IP address the target website sees doesn't change).

Fabian


signature.asc
Description: PGP signature


Re: tor proxy chain

2007-02-12 Thread Jonathan D. Proulx
On Mon, Feb 12, 2007 at 02:47:54PM +0100, giorgio m wrote:
:First of all, thanks for your polite and fast answer.
:To simplify the problem, I say that I would like to do this:
:
:perl_script- tor - standard_http_proxy - web_site
:
:I want the web site to see the ip of the standard_http_proxy, not the tor 
:ip.
:Do you think that it is possible to do this?

I haven't been following the thread so appologies if I miss the mark...

This seems possible *if* the standard_http_proxy accepts connections
from all tor exit nodes.

Now why you would want to do this is another question, perhaps the
answer is in the archives.

-Jon


Re: tor proxy chain

2007-02-12 Thread giorgio m

On 2/12/07, Jonathan D. Proulx [EMAIL PROTECTED] wrote:

On Mon, Feb 12, 2007 at 02:47:54PM +0100, giorgio m wrote:
:First of all, thanks for your polite and fast answer.
:To simplify the problem, I say that I would like to do this:
:
:perl_script- tor - standard_http_proxy - web_site
:
:I want the web site to see the ip of the standard_http_proxy, not the tor
:ip.
:Do you think that it is possible to do this?

I haven't been following the thread so appologies if I miss the mark...

This seems possible *if* the standard_http_proxy accepts connections
from all tor exit nodes.



Why a proxy shouldn't accept connections coming from tor? To prevent abuses?
Can you tell me how to do this proxychaining?


Now why you would want to do this is another question, perhaps the
answer is in the archives.



I just read the faq again, where I found that perhaps you are worried
that I will use tor to connect to open relays on port 25 and then
spam, is it right? I can assure you that this is not the case (I would
not be using tor in this case, I think that there are much easier
tools), one of the reasons is for example that I don't want the
websites to know that I'm using tor.

Thanks in advance.


Re: tor proxy chain

2007-02-12 Thread Jonathan D. Proulx
On Mon, Feb 12, 2007 at 03:16:32PM +0100, giorgio m wrote:

:Why a proxy shouldn't accept connections coming from tor? To prevent abuses?
:Can you tell me how to do this proxychaining?

Because then anyone using tor can use your proxy and any
crimes/harassment they commit come from your proxy.

have perl use socks to runn connections through tor configure the
proxy to accept connections from all tor exit nodes.  How to do this
is best asked either in a perl list or a list for your proxy server
software.

:
:Now why you would want to do this is another question, perhaps the
:answer is in the archives.
:
:
:I just read the faq again, where I found that perhaps you are worried
:that I will use tor to connect to open relays on port 25 and then
:spam, is it right? I can assure you that this is not the case (I would
:not be using tor in this case, I think that there are much easier
:tools), one of the reasons is for example that I don't want the
:websites to know that I'm using tor.

No, I'm not worried for TOR, I'm worried for you.  If all your traffic
appears to becoming from one proxy it's obvious who you are, and you
have basicly zero anonymity.

-Jon


Re: tor proxy chain

2007-02-12 Thread giorgio m

On 2/12/07, Jonathan D. Proulx [EMAIL PROTECTED] wrote:

On Mon, Feb 12, 2007 at 03:16:32PM +0100, giorgio m wrote:

:Why a proxy shouldn't accept connections coming from tor? To prevent abuses?
:Can you tell me how to do this proxychaining?

Because then anyone using tor can use your proxy and any
crimes/harassment they commit come from your proxy.



Hi Jonathan, I'm sorry if I was not clear; I don't own a proxy, I
would like to connect to an existing proxy using tor (I want the web
site to see the proxy ip, not the tor ip), for example the proxy lists
that I find here http://www.samair.ru/proxy/

I will try to follow the ideas expressed by John and the I will let you know.
--
Perhaps a contraption like this may work:
1. Install SocksCap / Freecap / tsocks and set it up to use Tor
2. Set your browser to use standard_http_proxy as your HTTP proxy
3. Launch your browser over SocksCap / Freecap / tsocks

With luck, SocksCap / Freecap / tsocks will intercept the TCP
connection your browser tries to make to the HTTP proxy, and tunnel it
through Tor.
--

Thanks



have perl use socks to runn connections through tor configure the
proxy to accept connections from all tor exit nodes.  How to do this
is best asked either in a perl list or a list for your proxy server
software.

:
:Now why you would want to do this is another question, perhaps the
:answer is in the archives.
:
:
:I just read the faq again, where I found that perhaps you are worried
:that I will use tor to connect to open relays on port 25 and then
:spam, is it right? I can assure you that this is not the case (I would
:not be using tor in this case, I think that there are much easier
:tools), one of the reasons is for example that I don't want the
:websites to know that I'm using tor.

No, I'm not worried for TOR, I'm worried for you.  If all your traffic
appears to becoming from one proxy it's obvious who you are, and you
have basicly zero anonymity.

-Jon



Re: tor proxy chain

2007-02-12 Thread Fabian Keil
giorgio m [EMAIL PROTECTED] wrote:

 First of all, thanks for your polite and fast answer.

You're welcome.

 To simplify the problem, I say that I would like to do this:
 
 perl_script- tor - standard_http_proxy - web_site
 
 I want the web site to see the ip of the standard_http_proxy, not the
 tor ip. Do you think that it is possible to do this?

Probably the easiest way to do this is to add Privoxy to the
proxy chain, have the Perl script use Privoxy as HTTP proxy
and let Privoxy do the rest.

I currently use something similar for testing purposes,
the Privoxy config line looks like this:

forward-socks4a .freebsd.org/Tor-Jail:9050   
tor.fabiankeil.de:8118

Requests that match .freebsd.org/ are forwarded
through the HTTP proxy tor.fabiankeil.de:8118
(another Privoxy) and the connection to that proxy
is made through the socks4a server Tor-Jail:9050 (Tor).

As mentioned earlier, from a anonymity point
of view this isn't the smartest setup. It increases
the chances that the traffic is sniffed or altered
and the target server always sees the same IP address.


You could also try to find a Perl module that can
reach HTTP proxies through socks4a servers. If you
find one (and aren't already using Privoxy anyway)
this should be even easier to set up, provided you
also find documentation for it.


A third way would be to configure your Perl script
to use a HTTP proxy and then intercept and redirect
these requests through Tor.

I recommend you use dns-proxy-tor, PF and a recent Tor
alpha version to set up the interception proxy, but the
programs John mentioned should work too.

Fabian


signature.asc
Description: PGP signature


Re: tor proxy chain

2007-02-12 Thread Juliusz Chroboczek
 I've set up the proxy in firefox in order to connect to tor, and it
 works well, now I would like to do this:
 my_pc - tor - proxy_choosen_by_me:port-www_page

The simplest way would be to set a proxy that can do that upstream of
tor.

my_pc - my_proxy - tor - proxy_choosen_by_me:port - www_page

With polipo, you do that by setting parentProxy to proxy_chosen_by_me,
and socksParentProxy to tor's address.

  http://www.pps.jussieu.fr/~jch/software/polipo/manual/Parent-proxies.html

I know that it can also be done with Privoxy, but someone else will
need to fill in the details.

Juliusz