From: SourceForge.net <no...@so...> - 2011-10-16 13:00:48
|
Support Requests item #3420433, was opened at 2011-10-07 20:41 Message generated for change (Settings changed) made by fabiankeil You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=211118&aid=3420433&group_id=11118 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: configuration Group: 3.0.17 >Status: Closed Priority: 5 Private: No Submitted By: LEV (vel38) Assigned to: Fabian Keil (fabiankeil) Summary: configuring TOR Initial Comment: So, I've got Privoxy running and it works great! My question is whether there is a way to configure how it uses the TOR network. In particular, I'd like to monitor and (more importantly!) control the degree of randomness with which the packets are routed. Is there a way to affect the variance with which the first points of contact are chosen and how often they are switched? Many thanks! Lev ---------------------------------------------------------------------- >Comment By: Fabian Keil (fabiankeil) Date: 2011-10-16 13:00 Message: You're welcome. ---------------------------------------------------------------------- Comment By: LEV (vel38) Date: 2011-10-11 01:02 Message: fabiankeil, Many thanks for such a detailed and informative response! Sorry for not being specific enough - I'm not acquainted with the architecture and not sure what happens at which level. Eventually, I need my requests (all addressed to the same server) to be issued by as many exit nodes as possible. I've experimented with the protocol a bit and it seams that at least some of the exit nodes are quite persistent. I guess, I'll have to do some more reading to nail this down. Thank again for your kind advice! ---------------------------------------------------------------------- Comment By: Fabian Keil (fabiankeil) Date: 2011-10-08 15:34 Message: I'm not sure what kind of packets you are referring to, but if you are talking about TCP packets you are an abstraction level too low. Tor 0.2.3.3-alpha introduced "stream isolation" and you can leverage the feature through Privoxy by using different forwarding settings for different URLs or TAGs. If your Tor version doesn't support "stream isolation" you could fake it by running multiple Tor clients at the same time. Note that I'm saying you could do it, not that it's a good idea. If you enable Tor's AllowDotExit option (disabled by default for a reason!) you can additionally control the exit node by rewriting the request URL behind the clients back. Packets belonging to the same incoming TCP connection ("stream") would still pass through the same Tor nodes, though. If by "first point of contacts" you mean the guard nodes, then I'm not aware of a method to mess with their selection through Socks. In most cases doing it would probably be a bad idea anyway, though. If you really want to control and monitor Tor's path selection you have to use Tor's control protocol directly and/or change Tor's configuration. You also may want to give Arm or Vidalia a try. ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=211118&aid=3420433&group_id=11118 |