[OTR-users] using TOR + socks with OTR + Pidgin

Guy Heatley guy at member.fsf.org
Thu Jan 9 12:47:24 EST 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/01/2014 16:29, Jurre van Bergen wrote:

> Actually. I wouldn't recommend using Pidgin with 'usewithtor'. The
> latest versions of Pidgin has a very specific functionality build in to
> handle DNS leaks over Tor! As can be seen in this screenshot I took:
> http://i.imgur.com/trUwsi9.png

Hmm this is interesting! I have noticed a strange thing about using a
local TOR proxy with pidgin:
As in the image above, it seems that if you select
"Tor/Privacy (SOCKS5)"
from the proxy types, it only works if you use the IP address of the
local machine (127.0.0.1) rather than the host name (e.g. localhost).

If you select simply "SOCKS5" from the list, you CAN use either IP
address OR hostname for the local machine.

Previously (until I saw your image) it had never occurred to me to use
the IP address, and I always thought that the Tor-specific selection was
somehow broken, as it never worked using "localhost".

I always used Tor via the non Tor-specific "SOCKS5" selection.

I wonder if this is a bug in Pidgin that should be reported?
- -- 
Guy
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlLO4KgACgkQtVeealbDyDXodQCfWR1ixcsNmroJz/5tkhWqJaWi
9ogAniU5qmEDaM9a3VuEzdGJRDns7DSQ
=n48S
-----END PGP SIGNATURE-----



More information about the OTR-users mailing list