is it possible to hide my linux box ipaddress from browsers like ghostsurf on win?
I was hoping i could hide my linux box ipaddress from browsers such that i could ghostsurf the net. i know its possible on windows but dont know how to set iptable rules for this on linux box redhat enterprise.
|
I was wondering the samething. Whenever I run a web port scan on my firewall, it knows my IP addess before it is natted and after. They call that reverse DNS lookups. How that can be stopped I have no clue.
|
It isn't possible. Period. The IP address you are assigned by your ISP is used when you browse the web. Without this information the web servers can't return the information to your browser.
|
There are "proxy" sites, where you can connect and have them forward you IP traffic (in both directions), so sites further "down stream" from the "proxy" site see only the "proxy's" address, not yours.
I.e., all your traffic using your address is between your ISP and the "proxy" site. You might check with your ISP provider: they may offer a similar service. (In fact, this is what an ISP typically does. Only when you have requested -- and usually paid for -- a "static" IP address are you assigned anything except a "random" address in the range of addresses "owned" by your ISP every time you connect to the ISP.) |
If what you want to do is to 'surf' anonymously, then it is, indeed, possible.
There are hundreds of ways to do this. Google for it. or tor.eff.org which is the absolute best. However, if you're going to go the tor route, please do your tor server operators a favour and consider running your own tor server; donate some bandwidth. It's slow enough, as it is, and since the number of users grows a thousandfold vs the number of servers, the service gets slower. Another plea is to please don't use tor for p2p, torrent, and other heavy bandwidth purposes. panhandle over. cheers, |
The proxy server you are surfing through will know your IP address.
|
Quote:
*there are hypothetical adversarial instances where it may be possible to determine originating ip, through intense, constant, and forensic monitoring of entry and exit nodes, traffic patterns, user habits and, um, lunar eclipses and banshee cult rituals, but it's unlikely.... cheers, |
All times are GMT -5. The time now is 12:56 PM. |