Tor as a component of a cohesive anonymizing OS

Philippe Gauthier philippe.gauthier at deuxpi.ca
Tue Apr 19 04:04:25 UTC 2005


Le lundi 18 avril 2005 à 22:29 +0100, Adam Langley a écrit :
> On 4/18/05, Chris Palmer <chris at eff.org> wrote:
> > > We probably want to write our own HTTP proxy designed to work well
> > > with Tor*.
> > Why re-do all that work? Why not just modify Privoxy or some other
> > pre-existing HTTP proxy?
> 
> I didn't mean to suggest that the two were mutually exclusive. Writing
> one's own proxy might involve large chunks of a preexisting proxy or
> not.

Then as an exercise, I put together some Python code which does forward
HTTP GET commands to a SOCKS v4a server (Tor). I guess it shouldn't be
very difficult to implement at least POST, CONNECT and HTTPS from that.

http://www.deuxpi.ca/personnes/phil/SimpleProxyServer.py

-- 
Philippe Gauthier <philippe.gauthier at deuxpi.ca>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Ceci est une partie de message num?riquement sign?e
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050419/b0aa86be/attachment.pgp>


More information about the tor-talk mailing list