Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Resolve .onion domains when Tor integration is enabled #1346

Open
ameshkov opened this issue Jul 27, 2017 · 4 comments
Open

Resolve .onion domains when Tor integration is enabled #1346

ameshkov opened this issue Jul 27, 2017 · 4 comments

Comments

@ameshkov
Copy link
Member

We can pass traffic through Orbot's proxy, but .onion domains are still unusable.

Possible solution: intercept DNS requests, resolve .onion domains to a private IP and pass .onion domain to SOCKS or HTTPS proxy instead of that private IP.

@ameshkov ameshkov added this to the 3.0 milestone Jul 27, 2017
@ameshkov ameshkov removed this from the 3.0 milestone Dec 4, 2017
@ameshkov
Copy link
Member Author

Needs to be checked with new CoreLibs that supports sending UDP over SOCKS5

@ameshkov ameshkov modified the milestones: 3.6, 3.5 Mar 20, 2020
@adguard-bot adguard-bot modified the milestones: 3.5, 4.0 Jun 8, 2020
@sfionov
Copy link
Member

sfionov commented Nov 30, 2020

Feature request is created in CoreLibs repo:
AdguardTeam/CoreLibs#1386

@sfionov
Copy link
Member

sfionov commented May 27, 2024

AdGuard for Android 4.4 provides new "FakeDNS" setting of outbound proxy. It allows to access .onion domains on Android.

@pedroapero
Copy link

Note: it looks like CloudFlare is now hosting a DOH onion service: https://blog.cloudflare.com/welcome-hidden-resolver/
Might be suitable for Tor integration also.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants