{{Header}}
{{Title|
title=Connecting to Tor before a Proxy
}}
{{#seo:
|description=Instructions on how to connect to Tor before a proxy. (User → Tor → Proxy → Internet)
|image=Balloon-936780640.jpg
}}
[[File:Balloon-936780640.jpg|thumb]]
{{intro|
Instructions on how to connect to Tor before a proxy.
'''User
→ Tor
→ Proxy
→ Internet
'''
}}
= Introduction =
{{Tunnels_Introduction}}
== Proxy Warning ==
{{mbox
| image = [[File:Ambox_warning_pn.svg.png|40px|alt={{project_name_long}} first time users warning]]
| text = '''Warning!'''
Take careful note of the following issues when using standard, common http(s)/SOCKS4(a)/5 proxies -- anonymizers that only use http(s)/SOCKS4(a)/5 as an interface [Like the Tor, or [[I2P]] software.] are exempt.
* Most problems with these proxies are not caused by {{project_name_short}}.
** These problems are [[unspecific|unspecific to {{project_name_short}}]].
* Tor exit relays and their ISPs can still monitor your connection to its destination.
* Be especially careful with http(s) proxies. Some of them send the [[Whonix_versus_Proxies#Summary|X-Forwarded-For
]] header which discloses the IP address. http(s) proxies that do not send this header are sometimes called "elite" or "anonymous" proxies.
* When using X-Forwarded-For
http(s) proxies, destination servers can determine the IP of your Tor exit relay.
For further detailed information on proxies, see: [[Whonix_versus_Proxies|Tor vs. Proxies, Proxy Chains]].
}}
== Comparison of Post-Tor Proxy Connection Methods ==
There are three different methods to connect to Tor before a proxy.
'''User
→ Tor
→ Proxy
→ Internet
'''
'''Table:''' ''Comparison of Post-Tor Proxy Connection Methods''
{| class="wikitable" style="background-color: #fff;text-align: center"
|
! [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method|Proxy Settings Method]]
! [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxyfier_Method|Proxifier Method]]
! [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method|Transparent Proxying Method]]
|-
! Examples
| Tor Browser proxy settings; foxyproxy
| torsocks; proxychains
| iptables; redsocks
|-
! Application requires no support for proxy settings
| {{No}}
| {{Yes}}
| {{Yes}}
|-
! Likelihood of leaks [
TCP or DNS
] going user
→ Tor
→ Internet
| Depends [Depends if the application has any proxy bypass bugs.]
| Depends [Depends on how bug free the socksifier is.]
| style="background-color: {{Green}}"| Lower [Because redirection happens at the iptables level, not at the application level.
]
|-
! Leak-shield possible in theory
| {{No}}
| {{No}}
| {{Yes}}
|-
! DNS can be resolved by the same proxy
| {{Yes}}
| {{Yes}}
| Needs extra DNS resolver [
See [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method#DNS_resolution]].
]
|-
! Does not need separate DNS server.
| {{Yes}}
| {{Yes}}
| {{No}}
|-
! Per application configuration required
| {{Yes}}
| {{Yes}}
| {{No}}
|-
! System wide configuration
| {{No}}
| {{No}}
| {{Yes}}
|-
! Proxy chains possible
| No
| Yes, but see footnote. [
Questionable if that adds anything. See: [[Whonix_versus_Proxies#Proxy_Chains_Introduction|Aren't 10 proxies (proxychains) better than Tor with only 3 hops? - proxychains vs Tor]]
]
| No, would require custom development. [
Would require adding a proxy chains feature to redsocks.
]
|-
! Setup difficulty
| Very difficult because different settings required for every application.
| Initial setup very difficult. Afterwards similar usage for most applications.
| Initial setup very difficult. Afterwards easy and reliable leak-shield.
|-
|}
= Proxy Settings Method =
Moved to [[Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method]].
= Proxyfier Method =
Moved to [[Tunnels/Connecting to Tor before a proxy/Proxyfier Method]].
= Transparent Proxying Method =
Moved to [[Tunnels/Connecting_to_Tor_before_a_proxy/Transparent_Proxying_Method]].
= Footnotes =
{{reflist|close=1}}
{{Footer}}
[[Category:Documentation]]