{{Header}} {{Title| title=Connecting to Tor before a Proxy }} {{#seo: |description=Instructions on how to connect to Tor before a proxy. (User → Tor → Proxy → Internet) |image=Balloon-936780640.jpg }} [[image:Balloon-936780640.jpg|thumb]] {{intro| Instructions on how to connect to Tor before a proxy. '''UserTorProxyInternet''' }} = Introduction = {{Tunnels_Introduction}} == Proxy Warning == {{mbox | image = [[File:Ambox_warning_pn.svg.png|40px|alt={{project_name_long}} first time users warning]] | text = '''Warning!''' Take careful note of the following issues when using standard, common http(s)/SOCKS4(a)/5 proxies -- anonymizers that only use http(s)/SOCKS4(a)/5 as an interface Like the Tor, or [[I2P]] software. are exempt. * Most problems with these proxies are not caused by {{project_name_short}}. ** These problems are [[unspecific|unspecific to {{project_name_short}}]]. * Tor exit relays and their ISPs can still monitor your connection to its destination. * Be especially careful with http(s) proxies. Some of them send the [[Whonix_versus_Proxies#Summary|X-Forwarded-For]] header which discloses the IP address. http(s) proxies that do not send this header are sometimes called "elite" or "anonymous" proxies. * When using X-Forwarded-For http(s) proxies, destination servers can determine the IP of your Tor exit relay. For further detailed information on proxies, see: [[Whonix_versus_Proxies|Tor vs. Proxies, Proxy Chains]]. }} == Comparison of Post-Tor Proxy Connection Methods == There are three different methods to connect to Tor before a proxy. '''UserTorProxyInternet''' '''Table:''' ''Comparison of Post-Tor Proxy Connection Methods'' {| class="wikitable" style="background-color: #fff;text-align: center" | ! [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method|Proxy Settings Method]] ! [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxyfier_Method|Proxifier Method]] ! [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method|Transparent Proxying Method]] |- ! Examples | Tor Browser proxy settings; foxyproxy | torsocks; proxychains | iptables; redsocks |- ! Application requires no support for proxy settings | {{No}} | {{Yes}} | {{Yes}} |- ! Likelihood of leaks TCP or DNS going userTorInternet | Depends Depends if the application has any proxy bypass bugs. | Depends Depends on how bug free the socksifier is. | style="background-color: {{Green}}"| Lower Because redirection happens at the iptables level, not at the application level. |- ! Leak-shield possible in theory | {{No}} | {{No}} | {{Yes}} |- ! DNS can be resolved by the same proxy | {{Yes}} | {{Yes}} | Needs extra DNS resolver See [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method#DNS_resolution]]. |- ! Does not need separate DNS server. | {{Yes}} | {{Yes}} | {{No}} |- ! Per application configuration required | {{Yes}} | {{Yes}} | {{No}} |- ! System wide configuration | {{No}} | {{No}} | {{Yes}} |- ! Proxy chains possible | No | Yes, but see footnote. Questionable if that adds anything. See: [[Whonix_versus_Proxies#Proxy_Chains_Introduction|Aren't 10 proxies (proxychains) better than Tor with only 3 hops? - proxychains vs Tor]] | No, would require custom development. Would require adding a proxy chains feature to redsocks. |- ! Setup difficulty | Very difficult because different settings required for every application. | Initial setup very difficult. Afterwards similar usage for most applications. | Initial setup very difficult. Afterwards easy and reliable leak-shield. |- |} = Proxy Settings Method = Moved to [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method]]. = Proxyfier Method = Moved to [[Tunnels/Connecting to Tor before a proxy/Proxyfier Method]]. = Transparent Proxying Method = Moved to [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method]]. = Footnotes = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]