On 01/18/2015 04:23 PM, [email protected] wrote: > I'm wondering what the best way to force yum and apt-get through tor > is, in fedora 21 and debian 7.7 respectivly. Are any of the following > least likely to produce dns or other leaks, or considered safest? > > In fedora, I see several options for forcing yum through tor: > > OPTION 1: (appears to work) > sudo nano /etc/yum.conf > ADD THIS: proxy=socks5://127.0.0.1:9050 > Use yum normally...is this likely to leak anything, dns perhaps? > > OPTION 2: (safest?) > sudo torsocks yum ... > This seems to work, though produces lots of this error at the command > line: WARNING torsocks[12367]: [syscall] Unsupported syscall number 191. > Denying the call (in tsocks_syscall() at syscall.c:165). Is this a > concern or just noise? > > OPTION 3: setup privoxy with tor, direct yum through privoxy > > OPTION 4: specify tor-ip:port as socks_proxy enviornment variable > > OPTION 5: > proxy3 recommended here, though I don't see why this isn't just less > clean: > https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/Misc
I'm using your OPTION 3 on a Debian Wheezy system and it's working for me. I sometimes get a bad package (didn't download properly) and I have to remove it and re-download it. > Alternatively, does anyone know a clean way to force all traffic > through tor? > I run hidden services in a VM with no internet access, and route apt-get through privoxy on a separate VM. Seems to work well for me. -Thom -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
