[tor-dev] Understanding Tor and SOCKS
vilgeforce at gmail.com
Sun Oct 26 08:59:31 UTC 2014
Hm... Did you try Wireshark on it?
2014-10-26 11:46 GMT+03:00 spriver <spriver at autistici.org>:
> Hi everyone!
> I am trying to understand the communication between an application and Tor
> (especially connecting to a hidden service). I am tracing packets on
> loopback between a torified netcat request to connect to a .onion address.
> When the connection gets granted I am getting a response from the socks
> (hex data of the tcp payload)
> 0x05 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00
> Regarding to the SOCKS specification this means that the request is
> granted. But I don't understand the 0x01 in byte no 4. It means IPv4
> address in the SOCKS specification, but the following part of the
> destination address and port (the following 0x00's) are empty. So what does
> that 0x01 mean?
> Can someone explain me that?
> Thank you!
> tor-dev mailing list
> tor-dev at lists.torproject.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the tor-dev