[Freedombox-discuss] Privoxy -> TOR - feature ?

James Valleroy jvalleroy at mailbox.org
Sat Feb 4 12:20:25 UTC 2017

On 02/04/2017 03:03 AM, Pierre L. wrote:
> Hey here,
> 1st, I want to thx all for your work on Freedombox. I'm trying it on a
> RPi 1B today.
> I hope writing this in the right place. You are free to kick me :)
> On my LAN, I'm usually using (on another server) Privoxy + TOR together.
> It can be a cool feature to have an option to tick in the Privoxy page ?
> - 1 Privoxy (8118 as usual) going through regular network.
> - 1 Privoxy (8119 for ex.) forwarding packets to TOR Socks to use this
> onion network.
> I don't know if it's possible to have both options running together on
> Freebombox ?
> May be we need 2 Privoxy instances running...?
> In my Privoxy config file, if I don't forget my previous set up, it's
> forwarding packets to TOR Socks with this config line (TOR Socks is
> listening on port 9050). Don't forget the "dot" at the end of the line ! :
> |forward-socks5t / .|
> Why not ?

How do we ensure that DNS leaks are prevented with this setup? Or do we
require that users have their applications properly configured?



One option that has been mentioned is to have an "anonymous browsing
mode" where the firewall blocks any non-torified traffic from clients on
the internal network.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20170204/79eb747d/attachment.sig>

More information about the Freedombox-discuss mailing list