Delivery-Date: Wed, 10 Sep 2014 07:43:52 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 3A6B51E0AA8;
	Wed, 10 Sep 2014 07:43:51 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 2581A2E39A;
	Wed, 10 Sep 2014 11:43:45 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 403112C162
 for <tor-talk@lists.torproject.org>; Wed, 10 Sep 2014 11:43:41 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id c7eqNCoq_jGI for <tor-talk@lists.torproject.org>;
 Wed, 10 Sep 2014 11:43:41 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 28D202C049
 for <tor-talk@lists.torproject.org>; Wed, 10 Sep 2014 11:43:41 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id 694BE1E0B56; Wed, 10 Sep 2014 07:43:38 -0400 (EDT)
Date: Wed, 10 Sep 2014 07:43:38 -0400
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20140910114338.GA36318@moria.seul.org>
References: <CAHXoDSA7_4Uxvr20K0YeP5f7dDhhbdjZTOJzwsSbdYRKY=pDvg@mail.gmail.com>
 <541035CF.3080103@gmail.com>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <541035CF.3080103@gmail.com>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] socks connect
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Wed, Sep 10, 2014 at 01:28:15PM +0200, Perforin wrote:
> HI That's because the DNS requests are not made through Tor, so Pidgin
> can't resolv the hidden service onion URL. You need Polipo or Privoxy
> running, configure it with tunneling everything through Tor (don't
> forget the DNS requests!!!). Lastly you need to configure pidgin to use
> the local privoxy/polipo port as a socks5 proxy.

I think the "DNS requests are being done by your application rather
than passing the hostname into Tor" theory is a likely one.

But telling your Pidgin to use an http proxy (privoxy or polipo) as a
socks5 proxy is definitely not going to do what you want. :)

In my case I configure my Pidgin to use the proxy type called
"Tor/Privacy (SOCKS5)". This setting tells Pidgin that you really
do want the traffic to go through the proxy, and if it can't use the
proxy you would rather it not attempt the connection. If your Pidgin
doesn't have this proxy type, you should consider upgrading.

From the Tor side, you might set
TestSocks 1
which will make your Tor client log more useful debugging things for you.

Hope that helps,
--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

