[sword-devel] Access of SWORD repos through proxy?

Tobias Klein contact at tklein.info
Sun Sep 1 13:58:02 EDT 2024


Thank you, Jaak and David,

I have passed on your feedback to the user.

See 
https://github.com/ezra-bible-app/ezra-bible-app/discussions/1093#discussioncomment-10512596

Best regards,
Tobias

On 8/31/24 5:29 PM, Jaak Ristioja wrote:
> Hi,
>
> I'm assuming your SOCKS5 traffic flows through a sufficiently 
> encrypted network tunnel.
>
> For Linux, there are programs which allow to run other programs and 
> direct their network traffic to some SOCKS5 proxy, e.g. proxychains-ng:
>
>   https://github.com/rofl0r/proxychains-ng/
>
> On Debian, Ubuntu and their derivates one can likely install it by using
>
>   sudo apt-get install proxychains4
>
> Proxychains-ng needs to be configured via /etc/proxychains.conf, 
> ~/.proxychains/proxychains.conf or proxychains.conf in the current 
> working directory unless the -f command line option is used to specify 
> a different location. After configuration, one should be able to run 
> programs via commands like
>
>   proxychains4 your_program --with=any arguments
>
> However, the problem with such tools is that they might not always 
> work as intended. For example when network traffic flows via paths 
> which tools like proxychains-ng do not know to intercept. Fpr example, 
> this is sometimes the case for DNS traffic (hostname to IP address 
> lookups) which is sometimes handled via external programs (e.g. DNS 
> cache service on local machine). So be sure to always thorougly test 
> (e.g. using network traffic analysis) whether this actually works 
> properly before actual use, and that nothing leaks. And test again 
> after ANY software updates or configuration changes. So be VERY VERY 
> CAREFUL when using things like proxychains-ng.
>
> A safer option might be to use something like Tails, a Debian Linux 
> based operating system which forces all programs to network over a 
> local SOCKS proxy providing Tor. It might be possible to configure 
> Tails to use some other SOCKS5 proxy as well.
>
> Regarding Tor, please note that in its simplest configuration Tor 
> attempts to connect to public Tor relays, making it possible for 
> eavesdroppers to detect Tor usage. A way around this (as suggested by 
> the Tor project) is to use (private) Tor bridges which use domain 
> fronting, traffic obfuscation and similar tricks. You might also find 
> some of these technologies useful for the tunneling the SOCKS5 traffic.
>
>
> Best regards,
> Jaak
>
>
> PS: All security technologies and their implementations, including 
> proxychains-ng, Tails and Tor, have their weak points. So take care 
> when evaluating their fitness for your particular purpose.
>
>
> On 31.08.24 14:20, Tobias Klein wrote:
>> Hi Troy and all,
>>
>> One of the Ezra users has asked the following:
>>
>>
>> The websites for updating modules and downloading Bibles are either 
>> inaccessible or subject to censorship for people living in countries 
>> that restrict internet access.
>>
>> Could the program be updated to support setting up a SOCKS5 or HTTP 
>> proxy, allowing users to access the internet through a proxy?
>>
>>
>>
>> How do you assess this request from a SWORD library perspective?
>>
>>
>> Best regards,
>> Tobias
>>
>>
>> _______________________________________________
>> sword-devel mailing list: sword-devel at crosswire.org
>> http://crosswire.org/mailman/listinfo/sword-devel
>> Instructions to unsubscribe/change your settings at above page
>
> _______________________________________________
> sword-devel mailing list: sword-devel at crosswire.org
> http://crosswire.org/mailman/listinfo/sword-devel
> Instructions to unsubscribe/change your settings at above page


More information about the sword-devel mailing list