<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html; charset=UTF-8" http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#ffffff">
Am 05.05.2011 05:52, schrieb katmagic:
<blockquote cite="mid:1304567529.2413.15.camel@ubuntu" type="cite">
  <pre wrap="">On Wed, 2011-05-04 at 22:31 +0200, Moritz Bartl wrote:
  </pre>
  <blockquote type="cite">
    <pre wrap="">Hi,

On 04.05.2011 22:11, Fabio Pietrosanti (naif) wrote:
    </pre>
    <blockquote type="cite">
      <pre wrap="">It would be possible to remove X-Forwarded-For from tor2web proxy:
* At apache mod_proxy_http level with a code patch:
<a class="moz-txt-link-freetext" href="http://blog.basteagow.com/2011/04/02/mod_proxy_http-disable-x-forwarded-headers/">http://blog.basteagow.com/2011/04/02/mod_proxy_http-disable-x-forwarded-headers/</a>
Or better do it at polipo level with CensorHeader:
<a class="moz-txt-link-freetext" href="http://www.pps.jussieu.fr/~jch/software/polipo/polipo.html#Censoring-headers">http://www.pps.jussieu.fr/~jch/software/polipo/polipo.html#Censoring-headers</a>
      </pre>
    </blockquote>
    <pre wrap="">
I vouch for removal of X-Forwarded-For and a new header for sites to
detect tor2web users (regardless of IP).

    </pre>
  </blockquote>
  <pre wrap="">
You can also detect Tor2Web users through the use of JavaScript:

if ( document.location.host.match(/\.tor2web\.org$/) ) {
        alert("mikeperry not detected!!!!!!!!!!!!!!!!!");
}
  </pre>
  <pre wrap="">
<fieldset class="mimeAttachmentHeader"></fieldset>
_______________________________________________
tor-talk mailing list
<a class="moz-txt-link-abbreviated" href="mailto:tor-talk@lists.torproject.org">tor-talk@lists.torproject.org</a>
<a class="moz-txt-link-freetext" href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk</a>
  </pre>
</blockquote>
this does not work for me, but i am by no means a js guy.<br>
</body>
</html>