Delivery-Date: Mon, 07 Mar 2016 18:26:41 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 74B9A1E0BE8;
	Mon,  7 Mar 2016 18:26:39 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 56736386E7;
	Mon,  7 Mar 2016 23:26:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 6CA9C375CD
 for <tor-talk@lists.torproject.org>; Mon,  7 Mar 2016 23:26:32 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Fs0FzG6uMjLT for <tor-talk@lists.torproject.org>;
 Mon,  7 Mar 2016 23:26:32 +0000 (UTC)
Received: from imirhil.fr (imirhil.fr [IPv6:2001:bc8:3f23:100::1])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "imirhil.fr", Issuer "CAcert Class 3 Root" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 4238D33A56
 for <tor-talk@lists.torproject.org>; Mon,  7 Mar 2016 23:26:32 +0000 (UTC)
X-Greylist: delayed 2862 seconds by postgrey-1.34 at eugeni;
 Mon, 07 Mar 2016 23:26:32 UTC
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits))
 (No client certificate requested)
 by imirhil.fr (Postfix) with ESMTPSA id 182938005F;
 Mon,  7 Mar 2016 23:26:29 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=imirhil.fr; s=mail;
 t=1457393189; bh=gz5F4t+9M7PWCcvRwJRAjmcFCJl3O3Oq8TYPxkh17pE=;
 h=From:To:Cc:Subject:Date:In-Reply-To:References:From;
 b=SS1N9zDogqeMnEVx5G5v5Ny/OqzXA2eL8rWqfbO7KZopkNWxZQljFQU1DJyF1Cu+7
 SOd6KTPoUUkYQROangXBVPUW7BDtUFN+XqdyhJdJX2Q7Zdrg6WIywZtISi0mk6vMqm
 xBpd93+fn5wd6zrXKArQ9o/rUF0gny0sVc6nbM7A=
From: Aeris <aeris+tor@imirhil.fr>
To: Oskar Wendel <o.wendel@wp.pl>
Date: Tue, 08 Mar 2016 00:26:25 +0100
Message-ID: <1512235.PJl9mF0AIi@home>
In-Reply-To: <nbl0st$s2e$4@ger.gmane.org>
References: <nbktsc$s2e$1@ger.gmane.org> <2804656.zJqi8RcCG5@home>
 <nbl0st$s2e$4@ger.gmane.org>
MIME-Version: 1.0
Cc: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Transparent proxy question
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============9043896087921790954=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

--===============9043896087921790954==
Content-Type: multipart/signed; boundary="nextPart13251011.TrQGgE4Gy1"; micalg="pgp-sha512"; protocol="application/pgp-signature"

--nextPart13251011.TrQGgE4Gy1
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

> Is there some way to pass these two options to a remote machine over =
the
> TCP channel?

AFAIK, no.

> I mean, I could write something like that myself, but maybe
> there is a ready made solution?

I already dev a tool to do this.
=09https://github.com/aeris/firewall-piercer
Kind of SOCKS and Transparent proxy over TLS.

Regards,
=2D-=20
Aeris
Individual crypto-terrorist group self-radicalized on the digital Inter=
net
https://imirhil.fr/

Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://caf=C3=A9-vie-priv=C3=A9e.fr/
--nextPart13251011.TrQGgE4Gy1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part.
Content-Transfer-Encoding: 7Bit

-----BEGIN PGP SIGNATURE-----

iQIcBAABCgAGBQJW3g4hAAoJECAWrwIKfDZo/H8QALqbfSFsDGktalvjUkNob599
JPBKfz6CLuwUVWr1fJf7M7iUtiu4rNCaH3q6iiF7KzkAgsVIjiywoMIGYCEvBuHo
8hw6DdIiZ2e6S6RiRPI2wdJG/k9QWRaD6YnPfjV5Y8s18CPx0NutbzoDFqrUrzW2
pHUhpGzrKbUWMvlaBftagtURUa0ImaCbDwg/macI/0/szXiQvqNmo38ou7Uj3FJi
/y93OHFyQyeI8kTxJZDTr6PUFegkU7AhmK5uG4NI/kM83WF3vrha6O8YV4vzOavB
Kqs0fe+H707YJV4Rmsor7erdbuJBKwoZZWEfDkIBDRQh6Z/Pve9ylB/bLEOjT3xP
sojSZsL/IKsJUtrGopuMJCwT49Koarn6cgUK/YT2iMrxY5Xd2zUf6QWAKuXhOqQk
NVD3WcWE0tTBvqlwTECgz1H5hCxx/FjWKCQAFxZwmYycH1Rxm5qSLOuVEm7Sea55
KH23FqFC8jBotCdrLnQK78ev9aZTweiSd88i6ISKD8jsJdU92HjWhNDWiXeJLyvP
g62RwOm/qSw9Hjc9kg1QHolTbu2yoxxv8ffCICTM19nk+Z3Aqc9K6MKiGj5SpFHV
QVw4RTSpns9V9KDsAONLHIg/EiZ8R8O6d27iZEe3DyXTiInJCshb+qELewPBSWm0
nW2jQDeJNoXVCjmosYnd
=qgWb
-----END PGP SIGNATURE-----

--nextPart13251011.TrQGgE4Gy1--


--===============9043896087921790954==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============9043896087921790954==--

