[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [tor-talk] Hidden Service Hosting (Free experimental, offer)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Very similar to the setup I have in terms of using one virtual machine
as a Tor gateway for others to connect to via an internal network. My
concern is how well the model will scale and whether it can hold
multiple high traffic hidden services. I am looking around the config
options to see what can be optimised etc.

Question to the tor devs: In the torrc when setting "NumEntryGuards
NUM", does this specify how many guards may be used simultaneously or
only how many from a pool may be rotated between? Any input on how to
speed up the connection (losing a little location anonymity is fine
right now) for hidden services would also be appreciated :)

T

Xiaolan.Me:
> I am using another way to solve IP leaks problem. my host-os is
> CentOS and only installed VirtualBox I have 2 virtual machines
> running on the host-os the first one is a CentOS with 2 network
> adapter, one is NAT , another is Internal(ip: 192.168.222.1). it
> running Tor and ShadowSocks(bypass GFW) , Tor through ShadowSocks
> and listen on 192.168.222.1:9050 (Internal Adapter)
> 
> 
> Another is also CentOS and running apache, only one network 
> adapter(Internal ip:192.168.222.2) when this virutal machine wants
> to access internet , must set socks5 proxy to 192.168.222.1:9050 so
> even this VM gets hacked, the attacker still can't know the real
> IP....
> 
> 2015-01-03 6:21 GMT+08:00 Larry Brandt <lbrandt@cni.net>:
> 
>> I'm interested but a slow mover.  Work sometimes gets in my way.
>> I am putting together pages for a hidden site but I don't think I
>> can be ready to put it on line til month's end.  It will be a
>> legal site everywhere. This is a wonderful offer Thomas.  Hope
>> someone takes you up on it. Larry Brandt
>> 
>> 
>> Just wanted to point out that I think it's awesome Thomas is
>> doing this! Buy him a beer if you see him.
>> 
>> Tom
>> 
>> 
>> 
>> Thomas White schreef op 02/01/15 om 09:42:
>> 
>> Hey all,
>>> 
>>> So following my other mail, I just want to offer people on
>>> this mailing list a chance to test something out before I go
>>> into the wider public with it.
>>> 
>>> I have been reviewing some ways in which to offer "hosting"
>>> solutions for hidden services, and although there are ways to
>>> do like regular shared hosting environments by isolating users
>>> on an apache server for example, I feel a little experimental
>>> way to give people more freedom is to assign individual VPS's
>>> which are accessed via a separate .onion over SSH. For example,
>>> the HS address would be example1*.onion but to SSH into it, for
>>> security, would use a different address such as 
>>> sshaddress*.onion. This ensures no user of the service would
>>> know the true IP of the server it is hosted on and allows for
>>> shared environments without putting others at risk.
>>> 
>>> If anyone wants to test this out with me, I am offering the VPS
>>> for free for a few weeks/months so I can get the architecture
>>> right and fine tune the setup. All the traffic on the VPS is
>>> automatically routed through Tor so IP leaks won't be a huge
>>> problem, but of course you still maintain responsibility for
>>> the security of your machine and whatever you install on it.
>>> The use cases are unlimited but for obvious reasons it must be
>>> legal under British & Swedish law (feel free to ask beforehand
>>> but if it is legal I will defend it to the best of my
>>> ability).
>>> 
>>> If you'd like to take up this offer and try it out please email
>>> me privately (my key is below). I ask that if you wish to
>>> request one, please mention anything specific like RAM/CPU/Hard
>>> disk requirements (no bandwidth limitations) so I can
>>> appropriately assign them. For now unfortunately only debian
>>> installs will be available and nothing except sshd will come
>>> preconfigured on the VPS so if you aren't familiar with the
>>> command line on debian you may not find this useful. Also any
>>> custom onion address you want please keep it to 7 characters or
>>> below for now as my GPU is really on it's last limb after 
>>> generating over 1.4 million keys.
>>> 
>>> I offer no guarantees on the availability of this, nor do I
>>> take responsibility for it, this is an entirely experimental
>>> project and I am hoping any participants take up this offer to
>>> perhaps mirror/reverse proxy their blogs, or of course bring
>>> any interesting ideas to the table. All feedback on it is
>>> welcome too
>>> 
>>> Time to give these hidden services some lovin'
>>> 
>>> Regards, T
>>> 
>> -- tor-talk mailing list - tor-talk@lists.torproject.org To
>> unsubscribe or change other settings go to 
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> 

- -- 
Activist, anarchist and a bit of a dreamer.

PGP Keys: key.thecthulhu.com
Current Fingerprint: E771 BE69 4696 F742 DB94 AA8C 5C2A 8C5A 0CCA 4983
Key-ID: 0CCA4983
Master Fingerprint: DDEF AB9B 1962 5D09 4264 2558 1F23 39B7 EF10 09F0
Key-ID: EF1009F0

Twitter: @CthulhuSec
XMPP: thecthulhu at jabber.ccc.de
XMPP-OTR: 4321B19F A9A3462C FE64BAC7 294C8A7E A53CC966
-----BEGIN PGP SIGNATURE-----
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=pdyG
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk