LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-05-2009, 03:14 PM   #1
fhsm
Member
 
Registered: Jan 2009
Posts: 51

Rep: Reputation: 17
SSH, SOCKS, Tor and Privoxy


I'm trying to understand what I get out of SSH tunneling vs using Tor and why I need Privoxy in the middle.

Obviously Tor gives me anonymity that I don't get with an SSH tunnel. But why do I need Privoxy? FF3 has built in SOCKS4 and 5 support. I understand that I don't want to use SOCKS4 because of DNS leaking. While SOCKS4a would be ideal, wouldn't it work just as well to point Firefox right at Tor on 9050 as a SOCKS5 proxy and then set FF to point DNS to SOCKS? It sounds like this is easy with:
Code:
network.proxy.socks_remote_dns = true
Tor is deathly slow and the jumping endpoint seems to break a lot of things. Why not just setup a local SOCKS proxy to an SSH tunnel and do the FF DNS mod? That's even easier, just change one line in about:config and:
Code:
$ssh -NDC 431 you@example.com
I'm not interested in getting endpoint anonymity just out from behind a draconian content filter. As such it seems like Tor offers little benefit to offset the speed hit. Am I missing something obvious? For general knowledge if I am going to use Tor what's the point of using Privoxy? It looks like it's all about DNS leak.
 
Old 04-06-2009, 02:10 AM   #2
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
Using Privxoy with Tor is all about DNS leaks. (Although after using it to prevent DNS leaks, I have grown rather partial to some of the filtering it allows ) I am not knowledgeable enough about SOCKS to definitively answer your question. If SOCKS 5 absolutely never does it own DNS request then what you say should work fine. Also, at some point the capability of accepting an HTML proxy request (on a different port which I don't remember off the top of my head) was added to Tor. (I believe it has to be enabled with a configuration file option.) It is intended for allowing Tor to be used as a transparent proxy. It seems to me there may be some downside to using it, but I can't remember what that might be.

Quote:
Originally Posted by fhsm View Post
Code:
$ssh -NDC 431 you@example.com
I'm not interested in getting endpoint anonymity just out from behind a draconian content filter.
If that dodges the content filter (something I've use Tor for), then, yeah, go ahead and use it. It should work as a SOCKS proxy just fine.

You are right about Tor being quite slow. There has been some discussion of that on the or-talk mailing list recently. One person said he had measured the speed that, on average, was around dialup speed (50 - 70 kbps), but that it tended to come in bursts with peak speeds being over 1 Mbps. The Tor project has published a document of ways it is considering to try to speed things up.
 
Old 04-07-2009, 09:01 AM   #3
fhsm
Member
 
Registered: Jan 2009
Posts: 51

Original Poster
Rep: Reputation: 17
Thanks for the info. The code I posted will not work $ssh -N -D -C 431 you@example.com will however work.

Tor is so promising but so problematic all at the same time. The ramifications of running an endpoint are such that I don't see Tor speeding up any time soon. The IronKey private Tor network is wonderful. But, the client side is windows only, too bad.
 
Old 04-07-2009, 11:23 PM   #4
blackhole54
Senior Member
 
Registered: Mar 2006
Posts: 1,896

Rep: Reputation: 61
Thanks for the clarification. I've been tripped up more than once by the way ssh handles options.

And thanks for the heads up about Iron Key. I had not heard of it before. Glancing over their FAQ it sounds like they run all of the servers in their onion router network. I am no expert on this, but I think that would have horrible implications for anonymity. Also it sounds like Iron Key will be running your exit router. That's fine ... if you trust Iron Key! (Tor is designed so you don't have to trust anybody, but that adds some restrictions for safe use as an attacker could be running the exit router.)



If you've not already seen it, you might want to take a look at this:

https://blog.torproject.org/blog/why-tor-is-slow
 
Old 04-11-2009, 07:40 AM   #5
fhsm
Member
 
Registered: Jan 2009
Posts: 51

Original Poster
Rep: Reputation: 17
Quote:
Originally Posted by blackhole54 View Post
I am no expert on this, but I think that would have horrible implications for anonymity. Also it sounds like Iron Key will be running your exit router. That's fine ... if you trust Iron Key!
IronKey's network isn't designed to compete with Tor; rather, it's a reapplication of the onion-router technology to accomplish a different goal. Or at the very least a different set of priorities.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Socks Configuration in Privoxy mpmackenna Linux - Software 2 04-18-2008 10:45 AM
tor and privoxy phantom_cyph Linux - Software 4 10-30-2007 04:25 PM
Tor/privoxy setup chup Linux - Software 4 05-28-2007 06:52 AM
Tor and privoxy gabsik Linux - Networking 1 12-26-2005 01:57 PM
Privoxy and tor z3nith Linux - Software 2 10-01-2005 09:31 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration