PHP Classes

Tor Vidalia grave problem

Recommend this page to a friend!

      Proxy Connector  >  All threads  >  Tor Vidalia grave problem  >  (Un) Subscribe thread alerts  
Subject:Tor Vidalia grave problem
Summary:not finding .ini file and not connecting properly to tor
Messages:1
Author:Alex Koseki
Date:2012-11-09 16:44:10
 

  1. Tor Vidalia grave problem   Reply   Report abuse  
Picture of Alex Koseki Alex Koseki - 2012-11-09 16:44:10
Hello, i'd like to post some stuff that i was able to correct nicely:

First is the proxyConfiguration.ini location, since i used it in a subfolder, using"./proxyConfiguration.ini" was resetting to the default location that is where the including file is.

I let it go, but after sometime started to wonder about some stuff, and went to look at vidalia log. Then i noticed that the php application wasn't passing at all through the tor, it was using the common connection.

After this, in this line
$loaded_ini_array = parse_ini_file("./proxyConfiguration.ini",TRUE);
changed it to
$loaded_ini_array = parse_ini_file("proxyConfiguration.ini",TRUE);
and i stopped getting the errors.

But after that, the application stopped browsing the internet.
Looked at vidalia log and saw this:
[warn] Socks version 71 not recognized. (Tor is not an http proxy.)

looked at class again, then added this line:
curl_setopt($action, CURLOPT_PROXYTYPE, CURLPROXY_SOCKS5);
immediatelly after
curl_setopt($action, CURLOPT_PROXY, $this->ip .":". $this->port);

then it magically started to work. i was able to see vidalia "nov 09 13:40:34.122 [Aviso] Your application (using socks5 to port 80) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead. For more information, please see https://wiki.torproject.org/TheOnionRouter/TorFAQ#SOCKSAndDNS."

But it meant that is was working.

The graph for vidalia shows now that traffic is bein relayed through tor network.





This is just a advice for everyone, because the class was ignoring the tor altogether and passing the http requests through the normal connection.
CAUTION, this means that your application isn't stealth at all.
Other proof to this is disable your tor and check if the app still works. if it works, then... :/