[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tor-talk] SOCKS proxy to sit between user and Tor?
-----BEGIN PGP SIGNED MESSAGE-----
On 05/24/2015 06:42 AM, s7r wrote:
> Hi Jeremy
> Why do you want this and why do you think this is a good idea?
> What are you trying to solve? The socks5 which Tor open is not a
> simple socks5 protocol implementation, it has some customizations
> and enhancements used by Tor Browser to isolate streams, etc.
> As TvdW suggests, you if you use a TCP proxy that will just
> redirect the requests, there should be no penalty of performance or
> features for the Tor socks5. But I am not sure why you want to do
I want to be able to modify the host that the user program is
requesting from the Tor SOCKS proxy. E.g. Firefox requests abc.com,
Tor receives a request for xyz.org. And I want to do this without
modifying Tor's source code.
The intended use case is redirecting .bit domains to .onion domains
(as a way of enabling human-readable .onion domains), without needing
any modifications to Tor or TorBrowser. (Also redirecting .bit to
.b32.i2p domains would be an application.)
My understanding is that the main quirk of Tor's SOCKS implementation
is that the SOCKS basic auth is used for stream isolation, so passing
it through from the user to Tor shouldn't hurt anything. Is there
some other deviation from the SOCKS spec that I don't know about?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
-----END PGP SIGNATURE-----
tor-talk mailing list - email@example.com
To unsubscribe or change other settings go to