On 03/25/2012 01:57 PM, Maxim Kammerer wrote: > On Sun, Mar 25, 2012 at 17:40, intrigeri <intrig...@boum.org> wrote: >>> Could you please share a Privoxy configuration you trust to be safe >>> using with Tor? > > I still don't understand why would anyone trust Tor developers to > correctly configure Privoxy. > E.g., on > https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter: > "it needs to see the entire page to parse it, before sending it on to > the browser". >
The first part of the FAQ is the most important: "Why a HTTP proxy at all?" > This incorrect remark can mean only one thing: whoever wrote that > sentence didn't read the manual. For a decent configuration, see > src/etc/privoxy in Liberté's git, which includes Referer/Host header > rewriting for .exit notation support, for instance. > It's a wiki. Feel free to update it? I looked at your config ( https://github.com/mkdesu/liberte/blob/master/src/etc/privoxy/config ) and it looks like the following: confdir /etc/privoxy logdir /var/log/privoxy actionsfile match-all.action # Actions that are applied to all sites and maybe overruled later on. # Ad-blocking is done in browsers nowadays, and removing # page blocking and content manipulation from Privoxy makes # it more robust (e.g., for cables communication). # actionsfile default.action # Main actions file # actionsfile user.action # User customizations # filterfile default.filter # Main filters file filterfile user.filter # User filters file logfile privoxy.log listen-address 127.0.0.1:8118 toggle 1 enforce-blocks 0 buffer-limit 4096 forward-socks5 / 127.0.0.1:9050 . forward-socks5 check.torproject.org 127.0.0.1:9050 . forward-socks5 torcheck.xenobite.eu 127.0.0.1:9050 . forward-socks5 .onion 127.0.0.1:9050 . forward-socks5 .exit 127.0.0.1:9050 . forward .i2p 127.0.0.1:4444 forward .i2p:443 127.0.0.1:4445 forward *AAAA/ 127.0.0.1:4444 forward *AAAA:443/ 127.0.0.1:4445 forward 127.0.0.1/ . forward localhost/ . forward liberte/ . # forward 192.168.*.*/ . forwarded-connect-retries 2 accept-intercepted-requests 0 keep-alive-timeout 5 socket-timeout 300 # EOF It seems like your config tampers with the requests pretty heavily and the support of .exit should probably be disabled. I also think it is dangerous to support both i2p and Tor with the same privoxy config. It seems like it should be possible to construct a single webpage that attempts to link i2p and Tor usage via HTTP and thus fingerprints the user as using Liberté... No? If I was going to make your config more generic, I'd probably remove the filters to reduce the attack surface and to simply make it an HTTP shim: #Begin confdir /etc/privoxy logdir /var/log/privoxy logfile privoxy.log listen-address 127.0.0.1:8118 toggle 1 enforce-blocks 0 buffer-limit 4096 forward-socks4a / 127.0.0.1:9050 . forward-socks5 / 127.0.0.1:9050 . forward-socks5 .onion 127.0.0.1:9050 . forwarded-connect-retries 2 accept-intercepted-requests 0 keep-alive-timeout 5 socket-timeout 300 #EOF All the best, Jacob _______________________________________________ tails-dev mailing list tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev