[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[tor-talk] SOCKS proxy to sit between user and Tor?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

I'm interested in having a SOCKS proxy sitting between the end user
and the Tor-provided SOCKS proxy, which can do really simple stuff
like redirect from one host to another.  (Just on the level of the
host requested via SOCKS, not HTTP headers.)  To implement this, I
figure surely there must be a decent SOCKS implementation I can use,
since I don't trust myself to implement the SOCKS protocol.
Unfortunately, GitHub appears to have numerous implementations of
questionable quality, and randomly searching GitHub isn't a great way
to find high-qualify code anyway.

So I'm wondering if there are any SOCKS proxy implementations that Tor
enthusiasts often use as an intermediary between a user and Tor, or
would consider suitable for such usage.  My basic requirements are:

* Reasonably well-reviewed implementation.
* Not abandoned, reasonably well maintained at least for bugfixes.
* Supports SOCKS auth in some way (I just want to pass-through the
auth to Tor for the purposes of stream isolation).
* Cross-platform (Linux/OSX/Windows).
* Generally something that Tor-interested people would expect to be
reasonably secure.

I'm not really picky about what language it's in, although a
high-level language is preferable over C/C++.  Python would be ideal,
all things being equal, but that's a very weak constraint and isn't a
big deal.

Extensibility would be a plus, i.e. if I can implement something like
redirects without modifying internal code, that would be a major benefit
.

Suggestions would be appreciated, if anyone has any.

(Apologies if some consider this off-topic.)

Thanks,
- -Jeremy
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=xJso
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk