Tor browser IP leaks for linux- and Mac-users: Tor project came with an important update:
https://blog.torproject.org/tor-browser-709-releasedThis bug was detected as a design flaw:
https://trac.torproject.org/projects/tor/ticket/24052For some the leakage was hard to reproduce.
Probably the design error was found, because of the transition to unix domain sockets.
Read about this by Robert Ransom at this link:
https://packetstormsecurity.com/files/112439/torproxy-bypass.txtHow to reproduce an example was given here:
https://trac.torproject.org/projects/tor/ticket/5741
Download and verify "tor-browser-gnu-linux-i686-2.2.35-10-dev-en-US.tar.gz"
Start up Wireshark to monitor your network, optionally filtering for "dns"
Unpack Tor and start it by running the "start-tor-browser" script
Once TorBrowser is open, go to "?http://bitcoincharts.com/"
See DNS request for "bitcoincharts.com" being logged in Wireshark
System information:
Tor Browser Bundle for 32-bit Linux, version 2.2.35-10
Running on Fedora 16
To reproduce the exact syntax used and configuration are important,
obfuscation already can be an erroneous factor,
those into reproducing could come up with their own "scrum-report" of sorts.
(info credits security dot nl).
polonus
P.S. The right order and right use of vpn and tor on whonix could be critical for security reasons.
Important notice:Remember to use these anonimity tools only for legitimate use. Abuse of such services is an legal offence,
and abusers will often suffer the consequences, when found out. No hacker is really out of harm's way. In some countries the use of such tools may be forbidden (certain VPN services in the Russian Federation,
when keys are withheld from the authorities).
Damian