[Freedombox-discuss] Privoxy -> TOR - feature ?

James Valleroy jvalleroy at mailbox.org
Sat Feb 4 12:20:25 UTC 2017


On 02/04/2017 03:03 AM, Pierre L. wrote:
> Hey here,
> 
> 1st, I want to thx all for your work on Freedombox. I'm trying it on a
> RPi 1B today.
> I hope writing this in the right place. You are free to kick me :)
> 
> On my LAN, I'm usually using (on another server) Privoxy + TOR together.
> It can be a cool feature to have an option to tick in the Privoxy page ?
> 
> - 1 Privoxy (8118 as usual) going through regular network.
> - 1 Privoxy (8119 for ex.) forwarding packets to TOR Socks to use this
> onion network.
> 
> I don't know if it's possible to have both options running together on
> Freebombox ?
> May be we need 2 Privoxy instances running...?
> 
> In my Privoxy config file, if I don't forget my previous set up, it's
> forwarding packets to TOR Socks with this config line (TOR Socks is
> listening on port 9050). Don't forget the "dot" at the end of the line ! :
> 
> |forward-socks5t / 127.0.0.1:9050 .|
> 
> Why not ?


How do we ensure that DNS leaks are prevented with this setup? Or do we
require that users have their applications properly configured?

https://trac.torproject.org/projects/tor/wiki/doc/Preventing_Tor_DNS_Leaks

https://www.torproject.org/docs/faq.html.en#WarningsAboutSOCKSandDNSInformationLeaks

One option that has been mentioned is to have an "anonymous browsing
mode" where the firewall blocks any non-torified traffic from clients on
the internal network.

--
James

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20170204/79eb747d/attachment.sig>


More information about the Freedombox-discuss mailing list