privoxy/firefox
ADB
firefox-gen at walala.org
Mon Aug 29 06:15:24 UTC 2005
The latest stable (1.0.6) operates without causing any screen messages
when tor is set to 'notice' loglevel. Programs known not to do DNS in a
safe manner do result in such notifications. When did you last review
the source? I'll do a local ethernet sniff w/ Etherial if you would like
further verification (it's late right now otherwise I would just do it
immediately).
Roger Dingledine wrote:
>On Sun, Aug 28, 2005 at 10:40:53PM -0700, ADB wrote:
>
>
>>FF does SOCKS 5 securely, so I don't see why you couldn't. The only
>>
>>
>>
>>>Other than not having cookies blocked, Is there anything to lose by
>>>not having privoxy installed, and using firefox as its own sock5
>>>proxy? Does this compromise security by dns headers?
>>>
>>>
>
>Last I read the code, the way Firefox does socks5 is *not* secure from
>Tor's perspective. It does the DNS resolve itself, then passes the IP
>address to Tor via socks5.
>
>Firefox 1.1 (not yet released, as far as I know) has an option to "do
>dns remotely", which makes it safe. Adam Langley has a howto on this:
>http://www.imperialviolet.org/deerpark.html
>
>--Roger
>
>
>
>.
>
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050828/d29d7b1d/attachment.htm>
More information about the tor-talk
mailing list