route-to sends it to the lo1 interface
on the lo1 interface the IP it is heading to is changed to 127.0.0.1
port 9040
some other rules to make sure nothing else gets out
Is that it? It still seems very confusing.
I finally cracked it! This PF ruleset let me send a test request from
firefox
Hans Schnehl wrote:
please see:
http://archives.seul.org/or/talk/Oct-2007/msg00028.html
handling a similar approach.
Oh... So rdr rules dont apply to lo0. No wonder the Wiki instructions
are so complicated.
I am not very experienced at PF... if anyone could help me understand
this workaround
On Fri, Jan 02, 2009 at 01:04:38PM -0500, Adlesshaven wrote:
> Fabian Keil wrote:
> > Adlesshaven wrote:
> >
> >
> >> Does anyone here jail, sandbox or chroot the applications they use with
> >> Tor?
> >>
> >
> > I'm running Tor and Privoxy in FreeBSD jails,
> > Xorg applications (which p
Adlesshaven wrote:
Does anyone here jail, sandbox or chroot the applications they use
with Tor?
yep.
1. Separate, individual (GRSecurity-hardened) jails on Linux for
Thunderbird, Opera, and TOR itself.
2. Opera connects to TOR via polipo - which is jailed in a "common"
jail; and Thunderbird c
Fabian Keil wrote:
Adlesshaven wrote:
Does anyone here jail, sandbox or chroot the applications they use with Tor?
I'm running Tor and Privoxy in FreeBSD jails,
Xorg applications (which probably pose a bigger thread)
are running on the host system, though.
I have been trying to
Adlesshaven wrote:
> Does anyone here jail, sandbox or chroot the applications they use with Tor?
I'm running Tor and Privoxy in FreeBSD jails,
Xorg applications (which probably pose a bigger thread)
are running on the host system, though.
> I have been trying to adapt the Wiki's transparent pr
On Thu, Jan 1, 2009 at 6:56 PM, Adlesshaven wrote:
> Does anyone here jail, sandbox or chroot the applications they use with Tor?
>... What is the best way
> to isolate applications completely for use with Tor?
situations vary but my personal preference is for distinct virtual
machines to run gro
Does anyone here jail, sandbox or chroot the applications they use with Tor?
I have been trying to adapt the Wiki's transparent proxy recommendations
to a FreeBSD jail for the last couple weeks with no luck. What is the
best way
to isolate applications completely for use with Tor?
8 matches
Mail list logo