mirror of
https://github.com/benbusby/whoogle-search.git
synced 2026-04-25 20:25:51 +03:00
[GH-ISSUE #1028] [FEATURE] add obfs4proxy support #631
Labels
No labels
Fixed (Pending PR Merge)
Stale
bug
enhancement
enhancement
good first issue
help wanted
keep-open
needs more info
pull-request
question
theme
unfortunate
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/whoogle-search#631
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Pinkolik on GitHub (Jul 6, 2023).
Original GitHub issue: https://github.com/benbusby/whoogle-search/issues/1028
Hello! I'm trying to run whoogle search via docker-compose on my Orange PI 3 LTS (aarch64) but it looks like the container doesn't support obfs4proxy and I can't connect to the Tor network without it, because it's blocked in my region. Is there any workaround?
I also tried to run whoogle as systemd service but for some reason service was ignoring WHOOGLE_CONFIG_TOR property and was sending requests through clear-net.
Any help is appreciated!
@benbusby commented on GitHub (Jul 11, 2023):
What problem are you getting with obs4proxy? It seems like it should work fine from what I can tell. Could you just pull the docker image, build obs4proxy inside it manually, and then use that modified image?
With the systemd
WHOOGLE_CONFIG_TORissue, did you check that the the home pageUse torconfig option was checked? Since user sessions persist between launches, tor might've stayed disabled for your session, since that's the default behavior. If the option on the home page was enabled and requests were still not using tor, that's likely a bug I need to check out.@Pinkolik commented on GitHub (Jul 11, 2023):
@benbusby, thanks for the tip!

I've managed to build obfs4proxy inside Dockerfile and it seems to be working according to logs. (
Bootstrapped 100%at the beginning andNew control connectionon my every request).However, somehow google still detects my IP address, location and language when I'm executing queries
Am I still leaking my IP somehow?
I have these in my .env
Edit: It seems that it's leaking not my PC IP address but my server's IP.
@benbusby commented on GitHub (Jul 12, 2023):
How are you checking that your IP is detected? There should be a "You are using Tor" banner at the top of all search results that used Tor to perform the request. If not, and the home page config indicates that Tor is enabled, then there's likely a deeper problem.
Regarding location/language, Google uses geolocation based on wherever the request is made from to modify the returned results. So for Tor requests it kinda depends on where your exit node is, but it seems like in this case there's possibly still a problem with the Tor connection.
@Pinkolik commented on GitHub (Jul 12, 2023):
@benbusby , you're right. Tor was disabled for some reason.

How do I troubleshoot that? Here's logs
@Pinkolik commented on GitHub (Jul 12, 2023):
@benbusby, never mind, I had a wrong password in control.conf :D
Anyway, everything is working now as it should.
Should I create a PR with obfs4proxy build steps commented out in a Dockerfile? Just in case someone stumbles upon this again
@Pinkolik commented on GitHub (Jul 12, 2023):
@benbusby I guess I made a conclusion too early. After some time (like hour or two) on every search request I get this.

What could that be?
@benbusby commented on GitHub (Jul 12, 2023):
Seems like Google might be changing how they block requests from Tor. It used to be that they would return a Captcha for requests received from a Tor node, but now it looks like they just return a 403 error. Unfortunately I'm not too sure what to do about this, as they've been increasingly aggressive towards anything coming from Tor. The only real option is to keep trying new connections until you reach an exit node that Google hasn't flagged yet, but that can sometimes take a long time.
Sure! I'm open to that.