Re: [tor-dev] Understanding Tor and SOCKS

2014-10-27 Thread Rob van der Hoeven
On Sun, 2014-10-26 at 17:31 +, Yawning Angel wrote: > On Sun, 26 Oct 2014 14:34:59 +0100 > Rob van der Hoeven wrote: > > > So, the SOCKS protocol supports redirection to another SOCKS server. > > An all-zero address/port simply means: use the server/port that you > > are currently connected

Re: [tor-dev] Understanding Tor and SOCKS

2014-10-27 Thread spriver
Thank you for the explanation! This was the exactly the question. (I was just wondering why BND.ADDR and BND.PORT get set to NUL, ) Have a nice day! Am 2014-10-26 18:31, schrieb Yawning Angel: On Sun, 26 Oct 2014 14:34:59 +0100 Rob van der Hoeven wrote: So, the SOCKS protocol supports redir

Re: [tor-dev] Understanding Tor and SOCKS

2014-10-26 Thread Yawning Angel
On Sun, 26 Oct 2014 14:34:59 +0100 Rob van der Hoeven wrote: > So, the SOCKS protocol supports redirection to another SOCKS server. > An all-zero address/port simply means: use the server/port that you > are currently connected to. That's a really interesting way of interpreting that part of th

Re: [tor-dev] Understanding Tor and SOCKS

2014-10-26 Thread Rob van der Hoeven
> address. When the connection gets granted I am getting a response from > the socks server: > (hex data of the tcp payload) > > 0x05 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00 > > Regarding to the SOCKS specification this means that the request is > granted. But I don't understand the 0x01 i

Re: [tor-dev] Understanding Tor and SOCKS

2014-10-26 Thread Владимир Мартьянов
Hm... Did you try Wireshark on it? 2014-10-26 11:46 GMT+03:00 spriver : > Hi everyone! > > I am trying to understand the communication between an application and Tor > (especially connecting to a hidden service). I am tracing packets on > loopback between a torified netcat request to connect to a

[tor-dev] Understanding Tor and SOCKS

2014-10-26 Thread spriver
Hi everyone! I am trying to understand the communication between an application and Tor (especially connecting to a hidden service). I am tracing packets on loopback between a torified netcat request to connect to a .onion address. When the connection gets granted I am getting a response from