Silk Road forums
Discussion => Security => Topic started by: Afrob on January 12, 2013, 05:34 am
-
Hi,
just trying to set something up to circumvent TOR-unfriendly sites.
I use VPN -> TOR on a debian based System.
Now I want to setup a Socks5 Proxy after the TOR Exit Node, so I can't get blocked from certain services using TOR.
This should work like this: VPN -> TOR -> not blacklisted Socks 5 Proxy
I've done some research on this and it should be doable with "proxychains".
Here is a tidbit of info how to setup proxychains:
Proxychains
First download & install proxychains:
sudo apt-get install proxychains
Then configure proxychains to setup your chain:
nano /etc/proxychains.conf
Down towards the bottom you should see:
[ProxyList]
# add proxy here ...
# meanwile
# defaults set to "tor"
Just write your list in using Tor as the first listed:
socks4 127.0.0.1 9050
socks5 ip.address.here port
After that you should be done. Just go to terminal and set your browser to go through proxychains:
proxychains firefox
Well this is straightforward, but I don't get how to do the last step with the Tor Browser Bundle.
Some ideas? Thanks.
-
Er... it's telling you to set it as a socks4 proxy, not socks4a or socks5? I think that's... bad? I mean like, that could be a serious leak I think -- somebody else is gonna have to advise you on whether I'm right or not though.
So basically, firefox to proxychains, then from there to Tor...? Wait, wtf... that wouldn't help anything? Tor should be listening at 127.0.0.1:9050 if it's setup as usual (the port is randomized in the Tor browser bundle though).
-
nobody? where are the cracks then you need them?