On 5/20/20 11:29 AM, Anhangá wrote:
Thanks Daniil. I'll try that.

Em terça-feira, 19 de maio de 2020 08:53:09 UTC-3, Daniil Travnikov escreveu:

    Try this on your browser:


    About:config

    network.proxy.socks_remote_dns  >> Choose >>  false
    preferences  --advanced----netowork----settings----   >> Choose
     >>   No Proxy
    network.proxy.type    >> Choose >>    0
    network.http.sendRefererHeader    >> Choose >>    0
    network.cookie.cookieBehavior    >> Choose >>    2



    On Sunday, April 19, 2020 at 12:06:06 AM UTC+3, Anhangá wrote:



        Em sábado, 18 de abril de 2020 16:24:22 UTC-3, Chris Laprise
        escreveu:

            On 4/18/20 9:26 AM, Anhangá wrote:
             > But is it possible to somehow make TOR Browser to access
            clearnet using
             > a VPN connection after the TOR routing? Do I have to do
            some special
             > config in the TOR Browser to allow that?
             >
             > Em sábado, 18 de abril de 2020 10:07:16 UTC-3, Jarrah
            escreveu:
             >
             >      > My goal is connect to my VPN after the TOR routing
            (Bypass the
             >      > tor censorpship in some websites).
             >     This somewhat defeats the purpose of using TOR. You
            now have an
             >     identifiable address due to having a (hopefully paid)
            vpn. They can
             >     track you. Any anonymity provided by TOR is taken
            away by the VPN.
             >      > The problem is, when I set mt whonix-workstation
            to connect to
             >     sys-VPN over
             >      > whonix-gw, My Tor Browser do not work anymore. If
            I disconnect
             >     the VPN
             >      > inside sys-VPN, the Tor Browser start working as
            usual, but when
             >     my VPN is
             >      > connected, it stops.
             >
             >     This is by design. TOR browser assumes it can speak
            TOR protocols and
             >     connect to .onion addresses (etc). However, the VPN
            will come out onto
             >     the clearnet, rather than TOR's network. TOR browser
            cannot lookup TOR
             >     addresses, nor can it connect to anything relying on
            TOR.
             >
             >     If you want to do this to access clearnet sites,
            you'd have to use a
             >     standard browser. The VPN should work just fine, so
            long as you're not
             >     trying to connect to TOR specific services through
            it. Though, please
             >     see above warning about doing so.
             >
             >     The only reason I can think of to do this is if you
            live in a location
             >     that blocks VPNs, but is fine with TOR. Otherwise,
            you have exactly the
             >     same security model as just using the VPN, plus the
            overhead and attack
             >     surface of TOR/Whonix.

            Someone on the Whonix forums might know the definitive
            answer to your
            question. But I'd guess there is little or no advantage to
            using
            Torbrowser over Firefox when it can't speak to the Tor router.

            Note that Firefox has recently incorporated some Torbrowser
            features, so
            you could use it with Tracking Protection set to Strict, and
            'privacy.firstparty.isolate' set to True,
            'privacy.resistFingerprinting'
            set to True, in addition to using the User-Agent Switcher
            extension. I
            think these are a good idea whether or not you use a tunnel
            or proxy.

-- Chris Laprise, tas...@posteo.net
            https://github.com/tasket
            https://twitter.com/ttaskett
            PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


        Thank you for the answer Chris.

        I'm not planning to use Firefox over a TOR connection. I just
        want to use the TOR browser but, in the tor end node, route my
        traffic to a VPN and then to the Internet.

        I set the ProxyVM as you said in the qubes-vpn-support and it
        worked just fine. LINK IS UP and running. But if my ProxyVM is
        running my VPN connection, TOR browser in the Whonix-WS do not
        work. If I disconnect the VPN inside my ProxyVM, TOR browser
        also works just fine. The problem is only when I'm trying to use
        TOR Browser with VPN link UP. So, I'm guessing that is some
        config that I have to do inside TOR Browser to use my VPN

        The newest firefox has some really good anti-fingerprint
        features, but nothing compares to TOR Browser, like in-depth
        fingerprinting combining settings as Screen Resolution and
        viewport...

--
You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com <mailto:qubes-users+unsubscr...@googlegroups.com>. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3833f72e-5235-4969-bea6-7ada065bd19b%40googlegroups.com <https://groups.google.com/d/msgid/qubes-users/3833f72e-5235-4969-bea6-7ada065bd19b%40googlegroups.com?utm_medium=email&utm_source=footer>.When you have no choice and need to bypass cloudflare or similar here's
my quick and dirty:

Open any VPN provider's app that provides a SOCKS5 proxy inside a Whonix-WS appVM. Check the documentation for the IP/Port and point FF's network settings to the proxy address. Done.

I'll repeat what everyone else is saying: This is generally not advisable as your are often better spinning up a throwaway Deb or Fedora appvm with vpn, but this approach is simple and does work.

Logan

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9e8655c4-25d4-c29d-5ae3-11cf447288d5%40threatmodel.io.

Attachment: publickey - logan@threatmodel.io.asc.pgp
Description: application/pgp-key

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to