On 07/17/2014 07:11 AM, Elrippo wrote: > I don't think that this is a problem, if you configure TOR as a transparent > proxy with some iptables rules on your Debian based OS, all TCP based traffic > is routed through TOR > > Take a look at the last example > https://elrippoisland.net/public/how_to/anonymity.html
An untrusted HTTPS connection? Really? Anonymity without security? > > > On 17. Juli 2014 10:06:52 MESZ, Rene Bartsch <[email protected]> wrote: >> Citadel is a groupware with integrated MTA, MDA, Jabber- and web-server > >> which makes it very easy to configure for average joes. Setting up a >> TOR >> hidden service is no problem. TLS is not necessary as TOR already uses >> end-to-end encryption. The problem is to make Citadel sending outgoing >> SMTP/Jabber traffic to the TOR client. > >> Best regards, > >> Renne > > >> Am 2014-07-17 08:27, schrieb Elrippo: >>> -----BEGIN PGP SIGNED MESSAGE----- >>> Hash: SHA512 >>> >>> I am using Exim on a hidden service. >>> Principally make your SMTP listen on local host and on the used onion >>> TLD, and edit the hidden service line, so it will redirect incoming >>> traffic on port 25 and/or 587 to localhost: 25 and/or localhost:587. >>> Be sure to build a certificate corresponding to your onion TLD, else >>> users might get confused. >>> I personally didn't get spamassasin to work with a SMTP on localhost, >>> but that's another story :) > > >> -- >> tor-talk mailing list - [email protected] >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
