Eric and Matt have covered the circular dependency issue (and the related bug), but just a note here, since you mentioned "leak the IP". We do not consider proxies as part of the privacy preservation story at present (try saying that three times fast!). While we continue to invest in solutions to reduce the information leakage to network observers, and will continue to do so, the use of "proxy" for privacy is not part of the security or privacy model of the code, and so such side-channels are not considered bugs.
That is, proxies are an access method, to enable access where otherwise the network operator has restricted/prevented things, but they're not a privacy method for when the network operator is monitoring things. For situations of "guaranteed zero leakage", the only appropriate mitigation is whole-OS network encapsulation (i.e. a VM or a physically-separate network device doing encapsulation). I realize that's probably not a very satisfying answer, but it's at least a clear statement about the (current) security/privacy guarantees of proxies and other forms of local device shaping/redirection.