I’ve recently started playing around with an application called Superhighway84 which is a sort of cross between Usenet and IRC running on IPFS. I can run it just fine with Torsocks. I have a question though, how can I see and verify if my connection is really running through Tor?
Hi @ukmr, my question isn’t about torsocks so much as it is about IPFS. I’ve been using torsocks for years and I know how it works. However, using a client connected to IPFS is different.
Let’s take a similar example, IRC. If I use torsocks + IRC client and then connect to an IRC server, that server will return my IP (I can confirm that is from an exit node) as well as other information.
If I use this superhighway84 client to connect to IPFS, then there is nothing to relay back the information of how I’m connecting. Furthermore, IPFS works a little like bittorrent. There will be multiple connections going to multiple peers, not just one.
How can I tell, on my machine, if my connections to IPFS via the superhighway84 client are truly going through Tor? If this isn’t possible, I understand. However, it seems like there should be a way for me to see if my connections are going to a guard node or not from my machine.
one way would be to create a virtual machine with a host only network interface. on the host you could make the socks proxy available to the VM. run you superhighway84 client in the VM pointing to the proxy on your host…
Do you mean something like Tails where every connection is running through Tor? That might work if I’m only concerned with connecting through Tor. However, I also need to verify that I am connecting only through Tor.
Also, going the VM route, is there a way I could use Wireshark to monitor the network interface to see if connections are running to a Guard node?
no, not like tails - just setup a “usual” VM and give it a host only network (Host-only adapter/networking), so the VM itself has no internet connectivity without using a proxy.
point every application from the VM that needs internet to a tor-enabled socks proxy on the host.
you can also use wireshark to track, where connections are going to - but this does not make sure, they do not go anywhere else in the future…