[sword-devel] Access of SWORD repos through proxy?

Jaak Ristioja jaak at ristioja.ee
Sat Aug 31 11:29:58 EDT 2024


Hi,

I'm assuming your SOCKS5 traffic flows through a sufficiently encrypted 
network tunnel.

For Linux, there are programs which allow to run other programs and 
direct their network traffic to some SOCKS5 proxy, e.g. proxychains-ng:

   https://github.com/rofl0r/proxychains-ng/

On Debian, Ubuntu and their derivates one can likely install it by using

   sudo apt-get install proxychains4

Proxychains-ng needs to be configured via /etc/proxychains.conf, 
~/.proxychains/proxychains.conf or proxychains.conf in the current 
working directory unless the -f command line option is used to specify a 
different location. After configuration, one should be able to run 
programs via commands like

   proxychains4 your_program --with=any arguments

However, the problem with such tools is that they might not always work 
as intended. For example when network traffic flows via paths which 
tools like proxychains-ng do not know to intercept. Fpr example, this is 
sometimes the case for DNS traffic (hostname to IP address lookups) 
which is sometimes handled via external programs (e.g. DNS cache service 
on local machine). So be sure to always thorougly test (e.g. using 
network traffic analysis) whether this actually works properly before 
actual use, and that nothing leaks. And test again after ANY software 
updates or configuration changes. So be VERY VERY CAREFUL when using 
things like proxychains-ng.

A safer option might be to use something like Tails, a Debian Linux 
based operating system which forces all programs to network over a local 
SOCKS proxy providing Tor. It might be possible to configure Tails to 
use some other SOCKS5 proxy as well.

Regarding Tor, please note that in its simplest configuration Tor 
attempts to connect to public Tor relays, making it possible for 
eavesdroppers to detect Tor usage. A way around this (as suggested by 
the Tor project) is to use (private) Tor bridges which use domain 
fronting, traffic obfuscation and similar tricks. You might also find 
some of these technologies useful for the tunneling the SOCKS5 traffic.


Best regards,
Jaak


PS: All security technologies and their implementations, including 
proxychains-ng, Tails and Tor, have their weak points. So take care when 
evaluating their fitness for your particular purpose.


On 31.08.24 14:20, Tobias Klein wrote:
> Hi Troy and all,
> 
> One of the Ezra users has asked the following:
> 
> 
> The websites for updating modules and downloading Bibles are either 
> inaccessible or subject to censorship for people living in countries 
> that restrict internet access.
> 
> Could the program be updated to support setting up a SOCKS5 or HTTP 
> proxy, allowing users to access the internet through a proxy?
> 
> 
> 
> How do you assess this request from a SWORD library perspective?
> 
> 
> Best regards,
> Tobias
> 
> 
> _______________________________________________
> sword-devel mailing list: sword-devel at crosswire.org
> http://crosswire.org/mailman/listinfo/sword-devel
> Instructions to unsubscribe/change your settings at above page



More information about the sword-devel mailing list