This is an educational project that implements part of the SOCKS 5
protocol. It is inspired by the tor-resolve
tool of the Tor project, which passes any DNS
request through the Tor network instead of onto the open Internet.
I wanted to write this to get some experience with sockets programming in C, as well as use the Tor network to hide my DNS
queries from The Man.
Currently, the files
resolver.c
andsocks5-client-tor.c
are not being used. They are intended for future development.
DNS resolution through Tor:
socks5-client -p 9050 -h stackoverflow.com
This is analogous to:
tor-resolve stackoverflow.com
You can use tcpdump
to filter out all of the traffic except for DNS
on your network adapter. Of course, if sending the request through the Tor network, you shouldn't see any traffic related to your request going out through the network adapter (or on port 53):
$ sudo tcpdump -i wlp3s0 port 53
Instead, you'll need to watch the loopback
interface on listen on port 9050, the default port for the Tor network daemon:
$ sudo tcpdump -i lo port 9050
Benjamin Toll