Hm... Did you try Wireshark on it? 2014-10-26 11:46 GMT+03:00 spriver <[email protected]>:
> Hi everyone! > > I am trying to understand the communication between an application and Tor > (especially connecting to a hidden service). I am tracing packets on > loopback between a torified netcat request to connect to a .onion address. > When the connection gets granted I am getting a response from the socks > server: > (hex data of the tcp payload) > > 0x05 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00 > > Regarding to the SOCKS specification this means that the request is > granted. But I don't understand the 0x01 in byte no 4. It means IPv4 > address in the SOCKS specification, but the following part of the > destination address and port (the following 0x00's) are empty. So what does > that 0x01 mean? > > Can someone explain me that? > > Thank you! > > Cheers, > spriver > _______________________________________________ > tor-dev mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev >
_______________________________________________ tor-dev mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
