The Un-Official Proxomitron Forum

Full Version: Pulling my hair out
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
Hi everyone.I use aol and it acts as my "proxy" for all of my online browsing however i discovered a particular site was picking up my REAL ip and not my aol ip.
After doing about 2 horus of research i discovered this website was picking up my real ip also:

https://mathlab.utsc.utoronto.ca/courses...intenv.cgi


Is there anyway i can get these sites to pick up my proxy ip instead?
I don't use AOL, but googling (aol proxy ip) came up with a couple of interesting hits.

http://en.wikipedia.org/wiki/Wikipedia:AOLA

According to that page, AOL is adding the "X-Forwarded-For" header.
My question is where is that header added, by the browser or after it leaves your computer?

If AOL is adding the "X-Forwarded-For" header after the request leaves your computer, not much you can do about it.
Your choices are limited: use a different ISP or try an anonymizing service.

If the browser is sending the header, there may be other options.

First, maybe this guys fix will work for you:
http://whatismyipaddress.com/forum/viewt...opic=10374

It used to be that AOL required you to use the AOL browser which couldn't be chained to a local proxy server.
I don't know if that's still the case.

If you can use a different browser, that would be the simple fix.

Otherwise, you'll have to see if you can chain the AOL browser to a local proxy server, such as Proxomitron.
Proxomitron can easily remove that header.

HTH
z12

Edit:
After having a few cups of coffee, I realize i misinformed you.
No matter what browser you use, the web sites will always have your real ip.
Otherwise, the internet wouldn't work.

The only way to "hide" it is to use an anonymizing proxy.

z12
How would i remove the xff header..??I have aol hooked up to proximitron
technically speaking, it is IMPOSSIBLE to "hide" your IP Address...

if you could, the ONLY thing your web browser would EVER show is host name lookup failures, DNS failures, 404 errors, et cetera... NOTHING would EVER make it back to your browser without an IP Address...

as mentioned above, you'd have to "chain" through a 'proxy server' (if you "dare" to TRUST the owner of that proxy server)...


hiding your IP Address is a MYTH... it can NOT be done, NOTHING would find its way back to you if it could...

the ONLY way to 'effectively' conceal your IP Address is to unplug your modem...
ps - you might be interested in doing a Google Search for "JakxPack"... it's not for the 'faint of heart' and not for the Proxo-newbie, but if you are "serious" about getting Proxo to "spoof" x-forwarded-for and the like, you need JakxPack...
Oh, I understand that..Im just wanted to block the x-ff headers not my ACTUAL ip.

Sorry if i asks too many questions, im a bit new to the whole proxy thing
here's one that will do that, "results may vary":
Code:
In = FALSE
Out = TRUE
Key = "X-Forwarded-For: Spoof     5.01.24 (cch!) [jak sd] (d.1) (Out)"
URL = "$TST(keyword=*.(i_spoof:[12]|f_ua_gbot).*)"
Replace = "$GET(hIP)$SET(hIP=)"

it won't work unless it's coupled with the "rest of" sidki's config (download can be found on this site)...
where do i put that at?
it can't be used "by itself", you MUST use sidki's config for it to do ANYTHING...

i don't remember where the d/l is "here", but you can grab it from his web site - http://sidki.proxfilter.net/prox-archive...2-beta.zip
Thanks guys...but i see proxmitron is a dead end, there is no way to use it with the aol software itself..
perhaps that's why it's called "A oh Hell", lol...
I figured out somthing..the only 2 sites that can see my real ip(remote_addr) both are using ssl..Is there a way to block ssl form picking it up?
I'm curious, what headers do you see at the following page when using the AOL proxy?
http://pgl.yoyo.org/http/browser-headers.php

For me there is the following:
Host:
User-Agent:
Accept:
Accept-Language:
Accept-Encoding:
Accept-Charset:
Connection:

Does it show a X-Forwarded-For: or From: header there?

(edit) Also, I assume that the following image link will show the IP of that AOL proxy instead of your own?
http://www.danasoft.com/sig/kyeu.jpg
Accept: */*
Referer: http://prxbx.com/forums/showthread.php?tid=1161
Accept-Language: en-us
X-Pageview: pgl.yoyo.org/http/browser-headers.php
Ua-Cpu: x86
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; AOL 9.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 3.0.04506; .NET CLR 1.1.4322)
Via: HTTP/1.1 (Velocity/3.1.1.5 [uScMs f p eN:t cCMp s ]), HTTP/1.1 spider-mtc-te03.proxy.aol.com[400C7083] (Prism/1.2.1), HTTP/1.1 cache-mtc-af07.proxy.aol.com[400C7547] (Traffic-Server/6.1.5 [uScM])
Host: pgl.yoyo.org


and yes it shows my aol ip.
HateItOrLoveIt;

Hi, and welcome to the forums!

While you noted above that only HTTPS sites were getting your real IP, the site linked by Graycode also got it, and that's using just the standard HTTP protocol. So....

A long-time member here developed a set of header filters that are meant to confuse the logging computer at the other end. In essence, said computer will see a small army of IP addresses, and will have to pick one. Your true IP is buried among them, but the chances of getting just that one, every time, are pretty slim, to say the least.

The thread discussing the whole concept is here: The JakxPak Big Thread. But don't download the first link in the first post! A lot of discussion ensued, subsequent to their release, thus the filters got modified several times over the course of the thread. Instead, go here for the latest iteration: The JakxPak Header Filter Set. Hang on to that one, and implement it as instructed within the thread. Yes, it's a long thread, but each post is short, so it's an easy read.

Try that and then report back to us with your results, please.

HTH



Oddysey
[/i]
(Nov. 30, 2008 07:55 PM)HateitOrLoveit Wrote: [ -> ]and yes it shows my aol ip.

I don't understand that answer. Your PC has an IP that was assigned by your ISP (AOL), and also there's probably a different IP that represents the AOL proxy that is shared by other AOL customers. Which was shown?

There was no X-Forwarded-For: header, so the implication there is that the AOL proxy is only adding that header for a few specific sites like the wikipedia as mentioned by Z12. We don't know how many sites they are or are not adding that header.

The Via: header you saw indicates that your browser's request did go through an AOL proxy. The X-Pageview: and Ua-Cpu: headers may have been added to your request by that proxy.

In the httpS link you have in the original post, is REMOTE_ADDR the only one that displays the IP? It's the IP of whatever actually connected to that server. That value is commonly available to all servers and represents where the network connection originated from. It's normal and required for the TCP protocol to know where communication came from so that responses can be sent back to it. If your PC connected directly to that server then the value should be your PC's network IP. If the request went throughh the AOL proxy then the value would be the network IP of that proxy.

It seems to me that it's the IP of the AOL proxy that is being seen, not the IP of your own PC's connection to AOL. Or maybe AOL has installed their proxy program into your PC.


(Nov. 30, 2008 08:42 PM)Oddysey Wrote: [ -> ]Try that and then report back to us with your results, please.

HateitOrLoveit indicated that "proxmitron is a dead end, there is no way to use it with the aol software itself.." I assume that means there isn't a way to chain Proxo or any other chosen proxy into the AOL configuration.

I'm hoping that what's being seen is the IP of the shared AOL network proxy and not the IP of the PC.
Pages: 1 2
Reference URL's