Преглед изворни кода

remove CLIENTS file, since it has been replaced with
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS


svn:r4473

Roger Dingledine пре 19 година
родитељ
комит
e35256f45c
2 измењених фајлова са 1 додато и 67 уклоњено
  1. 0 66
      doc/CLIENTS
  2. 1 1
      doc/Makefile.am

+ 0 - 66
doc/CLIENTS

@@ -1,66 +0,0 @@
-
-    Part one: Overview and explanation
-
-Because tor is an application-level proxy, it needs client-side support
-from every client program that wants to use it. (This is different from
-systems like Freedom, which used a single client-side program to capture
-all packets and redirect them to the Freedom network.) Client applications
-need two general classes of modifications to be compatible with tor:
-
-1) Whenever they call connect(), they instead should connect() to the
-local onion proxy and tell it "address and port". The onion proxy will
-itself make a connection to "address and port", and then the client
-application can talk through that socket as if it's directly connected. To
-support as many applications as possible, tor uses the common "socks"
-protocol which does exactly the above. So applications with socks support
-will support tor without needing any modifications.
-
-2) Applications must not call gethostbyname() to resolve an address
-they intend to later connect() to via onion routing. gethostbyname()
-contacts the dns server of the target machine -- thus giving away the
-fact that you intend to make an anonymous connection to it.
-
-To clarify, I need to explain more about the socks protocol. Socks
-comes in three flavors: 4, 4a, and 5. The socks4 protocol basically
-uses IP and port -- so it is unsuitable because of the gethostbyname()
-issue above. Socks4a is a slight modification to the socks4 protocol,
-whereby you can specify an IP of 0.0.0.x to signal the socks server
-that you will instead be sending a hostname (fqdn). So applications with
-socks4a support are all set. Socks5, on the other hand, allows the client
-to specify "address type" and then an address -- so some applications
-choose to supply an IP and others choose to supply a hostname. If the
-application uses socks5 you must investigate further to decide whether
-it's leaking anonymity.
-
-
-    Part two: using tsocks to transparently replace library calls
-
-tsocks (available from http://tsocks.sourceforge.net/ or from your
-favorite apt-get equivalent) allows you to run a program as normal,
-but it replaces the system calls for connect() to connect to the socks
-server first and then pass it your destination info. In our case the
-socks server is a tor process (running either locally or elsewhere).
-In general this works quite well for command-line processes like finger,
-ssh, etc. But there are a couple of catches: A) tsocks doesn't intercept
-calls to gethostbyname. So unless you specify an IP rather than hostname,
-you'll be giving yourself away. B) Programs which are suid don't let you
-intercept the system calls -- ssh falls into this category. But you can
-make a local copy of ssh and use that. C) Probably tsocks doesn't behave
-well for behemoths like Mozilla.
-
-
-    Part three: applications which support tor correctly
-
-[this section is outdated and wrong. we should tie it into the main
-tor-doc.html one day.]
-
-http: Mozilla: set your socks4 proxy to be the onion proxy (but see above)
-      privoxy: set your socks4a proxy to be the onion proxy
-      wget: run privoxy, and then add the line
-        "http_proxy=http://localhost:8118" to your ~/.wgetrc.
-ssh: tsocks ssh arma@18.244.0.188
-ftp: tsocks wget ftp://18.244.0.188/quux.tar --passive
-     Mozilla: set your socks4 proxy to be the onion proxy
-
-
-

+ 1 - 1
doc/Makefile.am

@@ -1,4 +1,4 @@
-EXTRA_DIST = tor-spec.txt CLIENTS FAQ HACKING rend-spec.txt control-spec.txt tor-doc.html tor-doc.css tor-resolve.1 version-spec.txt
+EXTRA_DIST = tor-spec.txt FAQ HACKING rend-spec.txt control-spec.txt tor-doc.html tor-doc.css tor-resolve.1 version-spec.txt
 
 man_MANS = tor.1 tor-resolve.1