all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
* Recommendations for browsing via Tor pre tor-browser?
@ 2018-07-12 17:03 Christopher Lemmer Webber
  2018-07-12 17:46 ` Arun Isaac
                   ` (3 more replies)
  0 siblings, 4 replies; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-12 17:03 UTC (permalink / raw)
  To: help-guix

Anyone have recommendations on how they're doing web browsing via Tor,
sans tor-browser?  In the interim I have been using the more
lightweight, non-js using browsers like links.

What are you doing in the interim?  icecat with a set of extensions?
Or?

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-12 17:03 Recommendations for browsing via Tor pre tor-browser? Christopher Lemmer Webber
@ 2018-07-12 17:46 ` Arun Isaac
  2018-07-13 10:56   ` Ricardo Wurmus
  2018-07-13  9:41 ` Ludovic Courtès
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 16+ messages in thread
From: Arun Isaac @ 2018-07-12 17:46 UTC (permalink / raw)
  To: Christopher Lemmer Webber, help-guix


> What are you doing in the interim?  icecat with a set of extensions?

I run `tor' from the command line. It opens up a SOCKS proxy at port
9050. I set that proxy in Icecat and use it along with Private Browsing
mode. I use the extension "MM3-ProxySwitch" to make switching proxies
convenient. I use an old version of uMatrix to block javascript. When
last I checked (many months back), the latest version of uMatrix wasn't
working in our Icecat. I also use the extension "Self-Destructing
Cookies" to automatically cleanup cookies once I don't need them (after
I close the tab of a website).

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-12 17:03 Recommendations for browsing via Tor pre tor-browser? Christopher Lemmer Webber
  2018-07-12 17:46 ` Arun Isaac
@ 2018-07-13  9:41 ` Ludovic Courtès
  2018-07-13 12:57   ` Christopher Lemmer Webber
  2018-07-16 22:06 ` Nils Gillmann
  2018-07-19  9:08 ` Devan Carpenter
  3 siblings, 1 reply; 16+ messages in thread
From: Ludovic Courtès @ 2018-07-13  9:41 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: help-guix

Christopher Lemmer Webber <cwebber@dustycloud.org> skribis:

> Anyone have recommendations on how they're doing web browsing via Tor,
> sans tor-browser?  In the interim I have been using the more
> lightweight, non-js using browsers like links.

I use Privoxy, and as written in the ‘privoxy.conf’ example, I have:

         forward-socks5   /               127.0.0.1:9050 .

where Tor is listening on port 9050 (I use the Tor service of GuixSD.)

Ludo’.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-12 17:46 ` Arun Isaac
@ 2018-07-13 10:56   ` Ricardo Wurmus
  2018-07-13 11:02     ` Arun Isaac
  0 siblings, 1 reply; 16+ messages in thread
From: Ricardo Wurmus @ 2018-07-13 10:56 UTC (permalink / raw)
  To: Arun Isaac; +Cc: help-guix


Arun Isaac <arunisaac@systemreboot.net> writes:

>> What are you doing in the interim?  icecat with a set of extensions?
>
> I run `tor' from the command line. It opens up a SOCKS proxy at port
> 9050.

On GuixSD you can use the tor-service instead.

-- 
Ricardo

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-13 10:56   ` Ricardo Wurmus
@ 2018-07-13 11:02     ` Arun Isaac
  0 siblings, 0 replies; 16+ messages in thread
From: Arun Isaac @ 2018-07-13 11:02 UTC (permalink / raw)
  To: Ricardo Wurmus; +Cc: help-guix


>>> What are you doing in the interim?  icecat with a set of extensions?
>>
>> I run `tor' from the command line. It opens up a SOCKS proxy at port
>> 9050.
>
> On GuixSD you can use the tor-service instead.

Ah, that's nice. I didn't think of that! Thank you!

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-13  9:41 ` Ludovic Courtès
@ 2018-07-13 12:57   ` Christopher Lemmer Webber
  2018-07-19  6:52     ` Chris Marusich
  0 siblings, 1 reply; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-13 12:57 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: help-guix

Ludovic Courtès writes:

> Christopher Lemmer Webber <cwebber@dustycloud.org> skribis:
>
>> Anyone have recommendations on how they're doing web browsing via Tor,
>> sans tor-browser?  In the interim I have been using the more
>> lightweight, non-js using browsers like links.
>
> I use Privoxy, and as written in the ‘privoxy.conf’ example, I have:
>
>          forward-socks5   /               127.0.0.1:9050 .
>
> where Tor is listening on port 9050 (I use the Tor service of GuixSD.)
>
> Ludo’.

I wonder if localhost + port is a good idea for tor or really any other
service.  Our experience with the confused deputy attack against guile's
live REPL makes me suspicious of anything that's localhost + port.

I notice that the Tor configuration file supports a unix domain socket:

       ControlSocket Path
           Like ControlPort, but listens on a Unix domain socket, rather than a TCP socket.  0 disables
           ControlSocket (Unix and Unix-like systems only.)

I wonder if that would be safer?  WDYT?

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-12 17:03 Recommendations for browsing via Tor pre tor-browser? Christopher Lemmer Webber
  2018-07-12 17:46 ` Arun Isaac
  2018-07-13  9:41 ` Ludovic Courtès
@ 2018-07-16 22:06 ` Nils Gillmann
  2018-07-19  9:08 ` Devan Carpenter
  3 siblings, 0 replies; 16+ messages in thread
From: Nils Gillmann @ 2018-07-16 22:06 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: help-guix

Christopher Lemmer Webber transcribed 254 bytes:
> Anyone have recommendations on how they're doing web browsing via Tor,
> sans tor-browser?  In the interim I have been using the more
> lightweight, non-js using browsers like links.
> 
> What are you doing in the interim?  icecat with a set of extensions?
> Or?
> 
I am cheating: I use torbrowser unwrapped, compiled by nix.
Icecat with proxy works probably.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-13 12:57   ` Christopher Lemmer Webber
@ 2018-07-19  6:52     ` Chris Marusich
  2018-07-19 16:23       ` Christopher Lemmer Webber
  0 siblings, 1 reply; 16+ messages in thread
From: Chris Marusich @ 2018-07-19  6:52 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: help-guix

[-- Attachment #1: Type: text/plain, Size: 2526 bytes --]

Christopher Lemmer Webber <cwebber@dustycloud.org> writes:

> Ludovic Courtès writes:
>
>> Christopher Lemmer Webber <cwebber@dustycloud.org> skribis:
>>
>>> Anyone have recommendations on how they're doing web browsing via Tor,
>>> sans tor-browser?  In the interim I have been using the more
>>> lightweight, non-js using browsers like links.
>>
>> I use Privoxy, and as written in the ‘privoxy.conf’ example, I have:
>>
>>          forward-socks5   /               127.0.0.1:9050 .
>>
>> where Tor is listening on port 9050 (I use the Tor service of GuixSD.)
>>
>> Ludo’.
>
> I wonder if localhost + port is a good idea for tor or really any other
> service.  Our experience with the confused deputy attack against guile's
> live REPL makes me suspicious of anything that's localhost + port.
>
> I notice that the Tor configuration file supports a unix domain socket:
>
>        ControlSocket Path
>            Like ControlPort, but listens on a Unix domain socket, rather than a TCP socket.  0 disables
>            ControlSocket (Unix and Unix-like systems only.)
>
> I wonder if that would be safer?  WDYT?

I know what you mean, but I think having TOR listen on localhost is
safer than having a Guile REPL listen on localhost.  In the case of
Guile, the risk is arbitrary code execution.  In the case of TOR, I
suppose the risks might be that an attacker would be able to make
requests over TOR from your machine.  Perhaps by making such requests,
they might also be able to infer that you are using TOR (although it's
already possible to determine that a person is using TOR simply by
watching their IP traffic).  In any case, since TOR is functioning as a
proxy, not a Turing-complete programming language, the things an
attacker could do or learn by making requests from your machine to the
localhost TOR seem limited.  Compared to the risk of arbitrary code
execution, it seems much safer to me.

I run the TOR service on GuixSD, and I manually tell IceCat to use it as
a SOCKS5 proxy.  You can configure this in the "Advanced" section of the
"Preferences" menu.  IceCat also lets you send DNS requests over the
SOCKS5 proxy, which increases your privacy.  Unlike Ludo, I don't
currently use Privoxy; I just have some extensions installed that I
think are probably helpful (SpyBlock, HTTPS Everywhere, Privacy Badger,
NoScript).

I don't know if IceCat or Firefox supports a proxy via a UNIX domain
socket; I'd be curious to know if it did!

-- 
Chris

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-12 17:03 Recommendations for browsing via Tor pre tor-browser? Christopher Lemmer Webber
                   ` (2 preceding siblings ...)
  2018-07-16 22:06 ` Nils Gillmann
@ 2018-07-19  9:08 ` Devan Carpenter
  2018-07-19 16:24   ` Christopher Lemmer Webber
  3 siblings, 1 reply; 16+ messages in thread
From: Devan Carpenter @ 2018-07-19  9:08 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: help-guix

[-- Attachment #1: Type: text/plain, Size: 1067 bytes --]

Please keep in mind that none of the interim solutions are safe compared
to tor-browser. Even using icecat with NoJS & self-destructing cookies
(which are both extensions you absolutely should have, if you're going to 
use icecat over Tor) it still is inferior. One of the nicest things
about tor-browser that is missing from every other browser is its tab
isolation. Every tab you have open is an isolated session, with no
shared cookies (and even different tor circuits iirc). This way you
can't be tracked accross websites by your cookies.

There are some other anonymizing features that I forget now, but that's
the main one which stands out, and the point is that you should be very
cautious using another browser via Tor.

Christopher Lemmer Webber transcribed 254 bytes:
> Anyone have recommendations on how they're doing web browsing via Tor,
> sans tor-browser?  In the interim I have been using the more
> lightweight, non-js using browsers like links.
> 
> What are you doing in the interim?  icecat with a set of extensions?
> Or?
> 

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-19  6:52     ` Chris Marusich
@ 2018-07-19 16:23       ` Christopher Lemmer Webber
  2018-07-20  3:38         ` Chris Marusich
  0 siblings, 1 reply; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-19 16:23 UTC (permalink / raw)
  To: Chris Marusich; +Cc: help-guix

Chris Marusich writes:

> I know what you mean, but I think having TOR listen on localhost is
> safer than having a Guile REPL listen on localhost.  In the case of
> Guile, the risk is arbitrary code execution.  In the case of TOR, I
> suppose the risks might be that an attacker would be able to make
> requests over TOR from your machine.  Perhaps by making such requests,
> they might also be able to infer that you are using TOR (although it's
> already possible to determine that a person is using TOR simply by
> watching their IP traffic).  In any case, since TOR is functioning as a
> proxy, not a Turing-complete programming language, the things an
> attacker could do or learn by making requests from your machine to the
> localhost TOR seem limited.  Compared to the risk of arbitrary code
> execution, it seems much safer to me.

What about sending messages to a specific .onion address to unmask you?
If you send a unique request to http://foobarbaz.onion/?id=50108560 (or
ip=...) you might be able to associate a specific address.

It may be that this is not as easily possible since I suspect Tor is not
as susceptable to a line-oriented attack, so maybe it's not a concern...
I dunno.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-19  9:08 ` Devan Carpenter
@ 2018-07-19 16:24   ` Christopher Lemmer Webber
  0 siblings, 0 replies; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-19 16:24 UTC (permalink / raw)
  To: Devan Carpenter; +Cc: help-guix

Thanks for that information... yes, I've suspected that tor-browser
was doing something special that way...

Devan Carpenter writes:

> Please keep in mind that none of the interim solutions are safe compared
> to tor-browser. Even using icecat with NoJS & self-destructing cookies
> (which are both extensions you absolutely should have, if you're going to 
> use icecat over Tor) it still is inferior. One of the nicest things
> about tor-browser that is missing from every other browser is its tab
> isolation. Every tab you have open is an isolated session, with no
> shared cookies (and even different tor circuits iirc). This way you
> can't be tracked accross websites by your cookies.
>
> There are some other anonymizing features that I forget now, but that's
> the main one which stands out, and the point is that you should be very
> cautious using another browser via Tor.
>
> Christopher Lemmer Webber transcribed 254 bytes:
>> Anyone have recommendations on how they're doing web browsing via Tor,
>> sans tor-browser?  In the interim I have been using the more
>> lightweight, non-js using browsers like links.
>> 
>> What are you doing in the interim?  icecat with a set of extensions?
>> Or?
>> 

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-19 16:23       ` Christopher Lemmer Webber
@ 2018-07-20  3:38         ` Chris Marusich
  2018-07-20 16:11           ` Christopher Lemmer Webber
  2018-07-26 15:16           ` Ludovic Courtès
  0 siblings, 2 replies; 16+ messages in thread
From: Chris Marusich @ 2018-07-20  3:38 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: Devan Carpenter, help-guix

[-- Attachment #1: Type: text/plain, Size: 3978 bytes --]

Christopher Lemmer Webber <cwebber@dustycloud.org> writes:

> Chris Marusich writes:
>
>> I know what you mean, but I think having TOR listen on localhost is
>> safer than having a Guile REPL listen on localhost.  In the case of
>> Guile, the risk is arbitrary code execution.  In the case of TOR, I
>> suppose the risks might be that an attacker would be able to make
>> requests over TOR from your machine.  Perhaps by making such requests,
>> they might also be able to infer that you are using TOR (although it's
>> already possible to determine that a person is using TOR simply by
>> watching their IP traffic).  In any case, since TOR is functioning as a
>> proxy, not a Turing-complete programming language, the things an
>> attacker could do or learn by making requests from your machine to the
>> localhost TOR seem limited.  Compared to the risk of arbitrary code
>> execution, it seems much safer to me.
>
> What about sending messages to a specific .onion address to unmask you?
> If you send a unique request to http://foobarbaz.onion/?id=50108560 (or
> ip=...) you might be able to associate a specific address.
>
> It may be that this is not as easily possible since I suspect Tor is not
> as susceptable to a line-oriented attack, so maybe it's not a concern...
> I dunno.

I think you're right: the fact that a malicious actor can induce
requests to your localhost endpoint is cause for concern, even if the
exact methods of exploitation are not obvious.

I looked into this.  I learned that Firefox (and our IceCat) supports a
SOCKS proxy using UNIX domain sockets [1].  If you've started TOR with a
socks socket at /var/run/tor/socks-sock, you can tell IceCat (or
Firefox) to use it by entering the socket path as your SOCKS proxy.
Specifically, in the IceCat built by Guix, you would do this:

* Click on the "hamburger menu" in the upper right (the icon looks like
  three fat lines stacked on top of one another).
* Go to Preferences > Advanced > Connection > Settings.
* Select "Manual proxy configuration".
* Select SOCKS v5 (because v5, unlike v4, supports sending DNS queries
  through the SOCKS proxy).
* Enter "file:///var/run/tor/socks-sock" in the SOCKS Host field (no
  quotes required).  The UI still makes it seem like you need to enter a
  port, but you can put any value in here, and it won't matter, since
  UNIX domain sockets don't use ports.
* Scroll to the bottom and make sure "Proxy DNS when using SOCKS v5" is
  checked.
* Click OK.

Assuming that TOR is running and the permissions on its SOCKS socket
allow you access, you can browse to https://check.torproject.org/ and it
should tell you that you're connected over TOR.  You can also check the
TOR messages sent to /var/log/messages to confirm that stuff is
happening.

Since using a UNIX domain socket for TOR is probably better than using a
localhost endpoint, we should make it easy to run a configuration like
this via the tor-service.  Currently, it's a little awkward to do, since
to set it up, you need to arrange for the directory that contains the
socket to have certain permissions, or else TOR refuses to start.  If
nobody beats me to it, I could try my hand at this in a few days' time.

Devan Carpenter <mail@dvn.me> writes:

> Please keep in mind that none of the interim solutions are safe compared
> to tor-browser.
>
> [...]
>
> There are some other anonymizing features that I forget now, but that's
> the main one which stands out, and the point is that you should be very
> cautious using another browser via Tor.

For sure - I agree.  However, since we don't have TOR browser yet in
GuixSD, I think manually configuring IceCat to use the tor-service as a
SOCKSv5 proxy is better than nothing.  If we can do it over a UNIX
domain socket instead of via a localhost endpoint, so much the better.

Footnotes: 
[1]  https://trac.torproject.org/projects/tor/ticket/20111

-- 
Chris

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-20  3:38         ` Chris Marusich
@ 2018-07-20 16:11           ` Christopher Lemmer Webber
  2018-07-21 14:53             ` Pierre Neidhardt
  2018-07-26 15:16           ` Ludovic Courtès
  1 sibling, 1 reply; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-20 16:11 UTC (permalink / raw)
  To: Chris Marusich; +Cc: Devan Carpenter, help-guix

Chris Marusich writes:

> I think you're right: the fact that a malicious actor can induce
> requests to your localhost endpoint is cause for concern, even if the
> exact methods of exploitation are not obvious.
>
> I looked into this.  I learned that Firefox (and our IceCat) supports a
> SOCKS proxy using UNIX domain sockets [1].  If you've started TOR with a
> socks socket at /var/run/tor/socks-sock, you can tell IceCat (or
> Firefox) to use it by entering the socket path as your SOCKS proxy.
> Specifically, in the IceCat built by Guix, you would do this:
>
> * Click on the "hamburger menu" in the upper right (the icon looks like
>   three fat lines stacked on top of one another).
> * Go to Preferences > Advanced > Connection > Settings.
> * Select "Manual proxy configuration".
> * Select SOCKS v5 (because v5, unlike v4, supports sending DNS queries
>   through the SOCKS proxy).
> * Enter "file:///var/run/tor/socks-sock" in the SOCKS Host field (no
>   quotes required).  The UI still makes it seem like you need to enter a
>   port, but you can put any value in here, and it won't matter, since
>   UNIX domain sockets don't use ports.
> * Scroll to the bottom and make sure "Proxy DNS when using SOCKS v5" is
>   checked.
> * Click OK.
>
> Assuming that TOR is running and the permissions on its SOCKS socket
> allow you access, you can browse to https://check.torproject.org/ and it
> should tell you that you're connected over TOR.  You can also check the
> TOR messages sent to /var/log/messages to confirm that stuff is
> happening.

Heck yeah!  This is awesome!

> Since using a UNIX domain socket for TOR is probably better than using a
> localhost endpoint, we should make it easy to run a configuration like
> this via the tor-service.  Currently, it's a little awkward to do, since
> to set it up, you need to arrange for the directory that contains the
> socket to have certain permissions, or else TOR refuses to start.  If
> nobody beats me to it, I could try my hand at this in a few days' time.

Please do.

While you're taking a crack at it, it might be cool if the
tor-hidden-services stuff could also accept unix domain sockets?  What
do you think?

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-20 16:11           ` Christopher Lemmer Webber
@ 2018-07-21 14:53             ` Pierre Neidhardt
  0 siblings, 0 replies; 16+ messages in thread
From: Pierre Neidhardt @ 2018-07-21 14:53 UTC (permalink / raw)
  To: Christopher Lemmer Webber; +Cc: Devan Carpenter, help-guix

[-- Attachment #1: Type: text/plain, Size: 1140 bytes --]

@Ludovic: I've tried setting up privoxy but I can't seem to get it to work.

>	privoxy /gnu/store/d3q0nz8568j32gslkc3lskxpzmimcx9z-privoxy-3.0.26/etc/privoxy/config

exits after a second.

--8<---------------cut here---------------start------------->8---
>	privoxy --no-daemon /gnu/store/d3q0nz8568j32gslkc3lskxpzmimcx9z-privoxy-3.0.26/etc/privoxy/config
2018-07-21 16:49:37.458 7ff8a464f740 Info: Privoxy version 3.0.26
2018-07-21 16:49:37.458 7ff8a464f740 Info: Program name: /home/ambrevar/.guix-profile/sbin/privoxy
--8<---------------cut here---------------end--------------->8---

does not output anything else and privoxy stays up.
Opening https://www.privoxy.org/config/ tells me that Privoxy is not being
used.

I've tried with forwarding to Tor, then using the SOCKS5 proxy on port 9050 in
IceCat, but also without forwarding, then using the HTTP(S) proxy on port 8118
in IceCat.

	sudo nmap -sT 127.0.0.1

does not return any 8118 port.


Also from the manual, tor forwarding is done with

       # forward-socks5t   /               127.0.0.1:9050 .

Note the trailing 't'.

-- 
Pierre Neidhardt

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 487 bytes --]

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-20  3:38         ` Chris Marusich
  2018-07-20 16:11           ` Christopher Lemmer Webber
@ 2018-07-26 15:16           ` Ludovic Courtès
  2018-07-27  2:12             ` Christopher Lemmer Webber
  1 sibling, 1 reply; 16+ messages in thread
From: Ludovic Courtès @ 2018-07-26 15:16 UTC (permalink / raw)
  To: Chris Marusich; +Cc: Devan Carpenter, help-guix

Hello,

Chris Marusich <cmmarusich@gmail.com> skribis:

> I looked into this.  I learned that Firefox (and our IceCat) supports a
> SOCKS proxy using UNIX domain sockets [1].  If you've started TOR with a
> socks socket at /var/run/tor/socks-sock, you can tell IceCat (or
> Firefox) to use it by entering the socket path as your SOCKS proxy.
> Specifically, in the IceCat built by Guix, you would do this:
>
> * Click on the "hamburger menu" in the upper right (the icon looks like
>   three fat lines stacked on top of one another).
> * Go to Preferences > Advanced > Connection > Settings.
> * Select "Manual proxy configuration".
> * Select SOCKS v5 (because v5, unlike v4, supports sending DNS queries
>   through the SOCKS proxy).
> * Enter "file:///var/run/tor/socks-sock" in the SOCKS Host field (no
>   quotes required).  The UI still makes it seem like you need to enter a
>   port, but you can put any value in here, and it won't matter, since
>   UNIX domain sockets don't use ports.
> * Scroll to the bottom and make sure "Proxy DNS when using SOCKS v5" is
>   checked.
> * Click OK.
>
> Assuming that TOR is running and the permissions on its SOCKS socket
> allow you access, you can browse to https://check.torproject.org/ and it
> should tell you that you're connected over TOR.  You can also check the
> TOR messages sent to /var/log/messages to confirm that stuff is
> happening.
>
> Since using a UNIX domain socket for TOR is probably better than using a
> localhost endpoint, we should make it easy to run a configuration like
> this via the tor-service.  Currently, it's a little awkward to do, since
> to set it up, you need to arrange for the directory that contains the
> socket to have certain permissions, or else TOR refuses to start.  If
> nobody beats me to it, I could try my hand at this in a few days' time.

That would be great!  I wonder if Privoxy can forward over Unix-domain
sockets as well.

Also note that we’re running Tor in a container, which adds an extra
layer of wrapping around it.

Ludo’.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: Recommendations for browsing via Tor pre tor-browser?
  2018-07-26 15:16           ` Ludovic Courtès
@ 2018-07-27  2:12             ` Christopher Lemmer Webber
  0 siblings, 0 replies; 16+ messages in thread
From: Christopher Lemmer Webber @ 2018-07-27  2:12 UTC (permalink / raw)
  To: Ludovic Courtès; +Cc: Devan Carpenter, help-guix

Ludovic Courtès writes:

> Also note that we’re running Tor in a container, which adds an extra
> layer of wrapping around it.

I didn't realize that... comforting to hear :)  I hope we can do more
sandboxing like this!

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2018-07-27  2:12 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-12 17:03 Recommendations for browsing via Tor pre tor-browser? Christopher Lemmer Webber
2018-07-12 17:46 ` Arun Isaac
2018-07-13 10:56   ` Ricardo Wurmus
2018-07-13 11:02     ` Arun Isaac
2018-07-13  9:41 ` Ludovic Courtès
2018-07-13 12:57   ` Christopher Lemmer Webber
2018-07-19  6:52     ` Chris Marusich
2018-07-19 16:23       ` Christopher Lemmer Webber
2018-07-20  3:38         ` Chris Marusich
2018-07-20 16:11           ` Christopher Lemmer Webber
2018-07-21 14:53             ` Pierre Neidhardt
2018-07-26 15:16           ` Ludovic Courtès
2018-07-27  2:12             ` Christopher Lemmer Webber
2018-07-16 22:06 ` Nils Gillmann
2018-07-19  9:08 ` Devan Carpenter
2018-07-19 16:24   ` Christopher Lemmer Webber

Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.