hello polipo developers,

i'd like to suggest a minor but imo useful enhancements for the
documentation:


the documentation on http and socks proxies lists examples, especially
on ssh usage, which is i appreciate for practicality, but doesn't take
into consideration recent features of ssh.

currently, the http example describes using ssh to secure a connection
to a proxy running on the very machine the ssh connection is established
to. the current socks example focuses on tor, claiming it to be the
"main application" of socks forwarding.

openssh since 4.3 supports socks proxying by itself, so an additional
section under the tor example in doc/SOCKS-parent-proxies.html could
look like this:

----------

SOCKS can also be used directly in connection with SSH. Requests will be
tunnelled through SSH and further originate from the SSH server:

$ ssh -f -N -C -D 1080 login.myuniversity.edu
$ polipo socksParentProxy=localhost:1080

----------

as this obsoletes the use of two chained polipo instances in the html
page, i suggest that the http example in doc/HTTP-parent-proxies.html be
changed to this:

----------

$ ssh -f -N -C -L 8124:gateway.myuniversity.edu:8080 login.myuniversity.edu
$ polipo parentProxy=localhost:8124

If it is sufficient to just cross the firewall with the SSH connection,
an HTTP parent proxy is not required, as SSH can also [act as a SOCKS
proxy by itself](link to socks page).

----------

i think these modifications would make the documentation reflect
realistic cases better, keep people from setting up unnecessarily
complex systems and generally be more useful.


please keep me in cc in responses, as i'm not subscribed to the
polipo-users list.

regards
chrysn

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom

Attachment: signature.asc
Description: Digital signature

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Polipo-users mailing list
Polipo-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/polipo-users

Reply via email to