Re: c'punks top 5
1. anonymous http proxy servers ("re-webbers")
What is wanted/meant for these ? -Jon -- Jonathon Fletcher, j.fletcher@stirling.ac.uk
1. anonymous http proxy servers ("re-webbers")
What is wanted/meant for these ?
A proxy server for HTTP transport so that one could access the web anonymously. I don't think coding is the problem here; one could be easily hacked out in perl, or you could use CERN HTTPD as a proxy server. I think the problem is finding someone who will offer up their machine as a place to run this service. -jon ( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- ) ( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4 5B 12 A0 35 E0 9B C0 01 ) ( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )
Jonathan Cooper wrote: | > > 1. anonymous http proxy servers ("re-webbers") | > | > What is wanted/meant for these ? | | A proxy server for HTTP transport so that one could access the web | anonymously. I don't think coding is the problem here; one could be | easily hacked out in perl, or you could use CERN HTTPD as a proxy | server. I think the problem is finding someone who will offer up their | machine as a place to run this service. It might also be nice to encrypt the connection from client to proxy. Otherwise, this service only protects you from the server knowing who you are. If you add encryption, then it begins to offer anonymity agianst people watching the proxy. (Assuming there are multiple connections to the proxy.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume
It might also be nice to encrypt the connection from client to proxy. Otherwise, this service only protects you from the server knowing who you are. If you add encryption, then it begins to offer anonymity agianst people watching the proxy. (Assuming there are multiple connections to the proxy.)
If c2.org grew enough to a warrant a fractional T1, it would certainly be willing to run such a service, with prolly swIPed or skronked connections between the client and proxy.. The barriers to me setting it up are: A) Digital postage B) Bandwidth on c2.org (only 14.4 right now) -- sameer Voice: 510-841-2014 Network Administrator Pager: 510-321-1014 Community ConneXion: The NEXUS-Berkeley Dialin: 510-549-1383 http://www.c2.org (or login as "guest") sameer@c2.org
It might also be nice to encrypt the connection from client to proxy. Otherwise, this service only protects you from the server knowing who you are. If you add encryption, then it begins to offer anonymity agianst people watching the proxy. (Assuming there are multiple connections to the proxy.)
In that case, you could make a local daemon software "wedge" that you'd connect to that would open an encrypted connection to the proxy. Should be rather easy. Like I said before, implementation doesn't seem incredibly hard, but I've not seen a deluge of people offering up their boxes for this use. -jon ( --------[ Jonathan D. Cooper ]--------[ entropy@intnet.net ]-------- ) ( PGP 2.6.2 keyprint: 31 50 8F 82 B9 79 ED C4 5B 12 A0 35 E0 9B C0 01 ) ( home page: http://hyperreal.com/~entropy/ ]-------[ Key-ID: 4082CCB5 )
participants (4)
-
Adam Shostack -
Jonathan Cooper -
Jonathon Fletcher -
sameer