[OTR-users] using TOR + socks with OTR + Pidgin

Richard James Salts otr at spectralmud.org
Thu Jan 9 19:17:50 EST 2014


On Thu, 9 Jan 2014 17:47:24 Guy Heatley wrote:
> On 06/01/2014 16:29, Jurre van Bergen wrote:
> > Actually. I wouldn't recommend using Pidgin with 'usewithtor'. The
> > latest versions of Pidgin has a very specific functionality build in to
> > handle DNS leaks over Tor! As can be seen in this screenshot I took:
> > http://i.imgur.com/trUwsi9.png
> 
> Hmm this is interesting! I have noticed a strange thing about using a
> local TOR proxy with pidgin:
> As in the image above, it seems that if you select
> "Tor/Privacy (SOCKS5)"
> from the proxy types, it only works if you use the IP address of the
> local machine (127.0.0.1) rather than the host name (e.g. localhost).
> 
> If you select simply "SOCKS5" from the list, you CAN use either IP
> address OR hostname for the local machine.
> 
> Previously (until I saw your image) it had never occurred to me to use
> the IP address, and I always thought that the Tor-specific selection was
> somehow broken, as it never worked using "localhost".
> 
> I always used Tor via the non Tor-specific "SOCKS5" selection.
> 
> I wonder if this is a bug in Pidgin that should be reported?

You sure it's not something in /etc/hosts, I'd guess specifically that 
localhost is pointing to both ::1 and 127.0.0.1 and it's trying ipv6 socket 
first and failing. The 127.0.0.1 works fine as this is where the socks proxy is 
set up and there is no ambiguity about it as there is with localhost.


> --
> Guy
> _______________________________________________
> OTR-users mailing list
> OTR-users at lists.cypherpunks.ca
> http://lists.cypherpunks.ca/mailman/listinfo/otr-users




More information about the OTR-users mailing list