I've read this thread and found useful info regarding running TOR. However, the DNS-leaking problem is still unclear to me. My setup is as follows: Browser proxified with Sockscap to 127.0.0.1:1081, and TOR listening on port 1081. In Sockscap, DNS resolving is set to remote. In my Firewall logs, I see all requests for my browser to/from localhost, and TOR connections to/from the outside. So I presume DNS requests are made in the TOR circuit ? My setup includes a router serving as gateway and DNS server, but I don't see any connection to 192.168.1.1 (router). I've disabled global DNS resolving (I run windows xP), each application being allowed to resolve DNS at 192.168.1.1 How can I check/demonstrate this DNS leaking problem ? Do I still need Privoxy ? Is this DNS leaking only occuring when the system makes DNS requests (as opposed to the application) ?
Found this additional information: http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#head-e0b83d1dae14b598d805a972c1e9b07f717a9be1 Tor ships with a program called tor-resolve that can use the Tor network to look up hostnames remotely; if you resolve hostnames to IPs with tor-resolve, then pass the IPs to your applications, you'll be fine. (Tor will still give the warning, but now you know what it means.) Not sure how to use it though ... I would appreciate some light on this matter...