LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-04-2006, 02:26 AM   #1
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Rep: Reputation: 32
IP Shield


Quote:
DONOT TAKE THIS AS MALICIOUS OR AGAINST THE LAW, RULES OR NORMS.
I want to learn how i can shield my IP from appearing to outside world (ISP Logs and all that). There are a few software that does the trick in windows like FREEDOM and others. I have used it and yes it does what i want. I want to do the same thing in LINUX and that to myself. I tried changing my proxy server to an anonymous and free proxy server in the net which use https instead of the general but it is not enough. since, every connection made to this proxy server shows up in logs (yes i have checked it myself, since i have access to them: you see its not a question of doing the wrong thing, rather it's a question of learning and utilizing that knowledge to stop wrong things.)
 
Old 01-04-2006, 03:34 AM   #2
amosf
Senior Member
 
Registered: Jun 2004
Location: Australia
Distribution: Mandriva/Slack - KDE
Posts: 1,672

Rep: Reputation: 46
Be a man, not a mouse.
 
Old 01-05-2006, 09:40 AM   #3
celejar
Member
 
Registered: Oct 2003
Location: New York
Distribution: Debian Sid
Posts: 185

Rep: Reputation: 30
How is it theoretically possible to stop your IP address from showing up in either the web server's or the proxy server's logs? It certainly seems impossible to stop your ISP from getting your IP address; they are giving it to you in the first place and they are the first stop for all your traffic!
 
Old 01-08-2006, 12:00 AM   #4
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
we have a pool of IP. having said that, have you ever used jap or freedom for windows. use it in your machine. open a website and then check your squid or whatever it maybe logs. I think you will understand. what you see is complete anonymity not a single trace. I am amazed.
 
Old 01-08-2006, 11:23 PM   #5
SciYro
Senior Member
 
Registered: Oct 2003
Location: hopefully not here
Distribution: Gentoo
Posts: 2,038

Rep: Reputation: 51
anonymity from what end? the web server, or some logger on your computer?
 
Old 01-09-2006, 08:47 AM   #6
celejar
Member
 
Registered: Oct 2003
Location: New York
Distribution: Debian Sid
Posts: 185

Rep: Reputation: 30
Quote:
we have a pool of IP. having said that, have you ever used jap or freedom for windows. use it in your machine. open a website and then check your squid or whatever it maybe logs. I think you will understand. what you see is complete anonymity not a single trace. I am amazed
I don't understand how a pool of IP addresses will stop them from showing up in server/proxy/isp logs. I have never used jap or freedom.
 
Old 01-09-2006, 09:55 AM   #7
FredrikN
Member
 
Registered: Nov 2001
Location: Sweden
Distribution: GNU/Linux since -97
Posts: 149

Rep: Reputation: 15
Read the Tor FAQ http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ
 
Old 01-10-2006, 03:56 AM   #8
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
its not like that!
actually the anonymous service softwares (like jap..) use a different proxy server than your local proxy server and by this process they completely bypass your local proxy server hence no information about any connection ever shows up in the proxy logs. thats anonymity.
 
Old 01-10-2006, 04:28 AM   #9
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
Quote:
Be a man, not a mouse.
sure buddy! whatever u say!
 
Old 01-10-2006, 04:32 AM   #10
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
Quote:
anonymity from what end? the web server, or some logger on your computer?
[...] how do u remain anonymous from yourself? i mean anonymity from the outside where the outside is your organization's system admin, your ISP and all others in the internet. you somehow completely bypass your organization's proxy logs and [...]
 
Old 01-10-2006, 03:26 PM   #11
celejar
Member
 
Registered: Oct 2003
Location: New York
Distribution: Debian Sid
Posts: 185

Rep: Reputation: 30
Quote:
Originally Posted by FredrikN
From the Tor overview (at tor.eff.org/overview):
Quote:
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.
But I guess the web server still won't have your IP address, although it will show up in the (first) Tor server, if I understood the Tor wiki entry and overview correctly. Thanks for the pointer.

Last edited by celejar; 01-10-2006 at 03:42 PM.
 
Old 01-17-2006, 03:28 AM   #12
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
now i understand this is not an easy issue. will have to use a third party proxy server if anybody has to completely and anonymously bypass his resident proxy. though the ssh tunneling ( or shunneling) idea seems to be cool and works well, you need a live internet connection at the other end but hey the method is super cool. third party tools also do the same thing they configure your browser to use their proxy instead of the resident proxy. their speed is very slow since they bounce your packet over many hops before landing it in your eth and vice versa and its damn frustrating. so the whole idea sums up like this. people in an organization can use these third party tools to bypass their organization firewall or proxy but won't get the speed they get using the default. there is no indirect way of stopping this kind of tunneling (yes i can configure my iptables to reject or drop these proxy addresses but the question is how many?--there are thousands of free proxies round the globe).
i guess somebody needs to invent something!
 
Old 02-15-2006, 04:17 PM   #13
abefroman
Senior Member
 
Registered: Feb 2004
Location: lost+found
Distribution: CentOS
Posts: 1,430

Rep: Reputation: 55
Quote:
Originally Posted by prozac
we have a pool of IP. having said that, have you ever used jap or freedom for windows. use it in your machine. open a website and then check your squid or whatever it maybe logs. I think you will understand. what you see is complete anonymity not a single trace. I am amazed.
How did you do this? You didnt use Tor?
 
Old 03-21-2006, 03:58 AM   #14
prozac
Member
 
Registered: Oct 2005
Location: Australia
Distribution: slackware 12.1
Posts: 753

Original Poster
Rep: Reputation: 32
ok i am kinda late! but i have some good news.
the softwares' i was talking about earlier are worthless in the sense they don't provide you with the speed you are entitled to. i mean if you are in a dsl connection then you will get the dial-up speed if you use those softwares. i have a better solutions he he.
all around the globe there are free-proxy servers you can use. some of them are test purpose proxy machines, some are general isp proxy servers and some are from the organizations whose sysadmin's are pretty lazy fellows to even bother dropping outgoing packets that donot belong to their domain. now coming to terms, there are various types of proxy servers'. there are anonymous proxy-servers and blah blah proxy servers and there are ELITE proxy-servers. you will need the ELITE proxy servers to do the job (coz they use https instead of the more regular http connections) i was thinking about. you just configure your browser to use these proxy servers instead of the default provided to you. firefox even got a cool extension that lets you switch between different proxy servers. get your hands on three or more of these elite proxy-server addresses and you are on the go! next time you use your browser to open a website, your sysadmin won't know where you are going. they can block whatever they want in their squid, firewall or whatever they use. you are one happy fellow for whom these restriction don't apply. the theory behind this is like this-> every web request you make must first make it to a proxy server right? now with you default configuration, your browser asks your organizations own proxy server to deliver the content to you right? but your organizations' proxy is configured to block or drop packets that are heading for some particular servers' right? they exercise their control this way right? now, what if your browser doesn't make this request to your default (your own organizatios') proxy instead your browser directly connects to some distant unknown proxy server that even hides your ip from showing up in places where it by default should. he he. lastly, you can use it from any distro you want, its completely platform independent and you can remain anonymous from the sites you visit (no ip tracing, no referrals), your own sysadmin (i am so f*ked up thinking my own colleagues could use this against me) and every other people you care to ditch. my friend that's the anonymity i was talking about.

and to abefroman:
Quote:
How did you do this? You didnt use Tor?
no i didn't!

Last edited by prozac; 03-21-2006 at 04:08 AM.
 
Old 03-24-2006, 04:06 PM   #15
boe
LQ Newbie
 
Registered: Mar 2006
Posts: 1

Rep: Reputation: 0
prozac,
Is it possible to block outbound traffic by port? Open only those ports you allow (say 8189 for your proxy server). Then no matter what port they configure their browser to point to for a proxy, it will be blocked and only access from your proxy server is allowed out.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Raven Shield socks Linux - Games 3 05-10-2005 09:18 AM
Prelink and Exec Shield socks Slackware 1 05-02-2005 07:52 AM
define Exec Shield please firenze Fedora 2 07-03-2004 05:22 PM
What is Exec Shield in Fedora??? neosap Fedora 1 06-19-2004 11:34 PM
installer shield - text problem hamish Linux - Software 9 10-18-2003 05:27 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:08 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration