AddingAnOnionService
parent
4c2e7330fa
commit
1894fb9284
@ -7,15 +7,15 @@ number of nodes. This is already happening in places like Iran.
|
|||||||
|
|
||||||
It would help if all the BS node operators could also run a Tor client
|
It would help if all the BS node operators could also run a Tor client
|
||||||
(not exit node), in addition to running their node. There are no risks
|
(not exit node), in addition to running their node. There are no risks
|
||||||
to the BS operator from running a Tor client (not exit node), and the
|
to the BS operator from running a Tor client in any country that Tor
|
||||||
overhead in negligible. The onion server is a 127.0.0.1 service, so
|
is still legal as it's not exit node, and the overhead in negligible.
|
||||||
cannot be seen by your ISP. The BS service is on the opennet anyway
|
The onion server is a 127.0.0.1 service, so cannot be seen by your ISP.
|
||||||
so an onion is just another access method. So we get dozens of Tor
|
The BS service is on the opennet anyway so an onion is just another
|
||||||
onion nodes running quickly, we could test out running Tox *in* Tor
|
access method. So we get dozens of Tor onion nodes running quickly,
|
||||||
using Hidden Services. If the Tox nodebase was improved to serve BS
|
we could test out running Tox *in* Tor using Hidden Services. If the
|
||||||
nodes, it would be much more resilient. I'm assuming the adversaries
|
Tox nodebase was improved to serve BS nodes, it would be much more
|
||||||
cannot block .onion addresses within Tor, which I think is a valid
|
resilient. I'm assuming the adversaries cannot block .onion addresses
|
||||||
assumption for now.
|
within Tor, which I think is a valid assumption for now.
|
||||||
|
|
||||||
There are [simple instructions](https://community.torproject.org/onion-services/setup/)
|
There are [simple instructions](https://community.torproject.org/onion-services/setup/)
|
||||||
to get Tor up and running, and you can test it by setting you browser
|
to get Tor up and running, and you can test it by setting you browser
|
||||||
@ -24,7 +24,7 @@ to use the SOCKS proxy on ```127.0.0.1:9050```.
|
|||||||
Configure your boostrap server with an extra tcp_port that is not
|
Configure your boostrap server with an extra tcp_port that is not
|
||||||
listed publically in the nodes.json file. We will use 33446 as an example.
|
listed publically in the nodes.json file. We will use 33446 as an example.
|
||||||
|
|
||||||
In your ```/etc/tor/torrc`` or equivalent, you need to add 2 sections.
|
In your ```/etc/tor/torrc``` or equivalent, you need to add 2 sections.
|
||||||
|
|
||||||
The first is:
|
The first is:
|
||||||
```
|
```
|
||||||
@ -44,9 +44,9 @@ Replace 33446 with your real port number.
|
|||||||
The next time tor starts up, a new directory will be created in
|
The next time tor starts up, a new directory will be created in
|
||||||
```/var/lib/tor/tox-hsv3/``` and it will have a file called
|
```/var/lib/tor/tox-hsv3/``` and it will have a file called
|
||||||
```hostname```. Look in the file for the onion address to your site.
|
```hostname```. Look in the file for the onion address to your site.
|
||||||
Now add the onion address followed by a colon and post it to the
|
Now add the onion address followed by a colon and the port number
|
||||||
[mailinglist](https://lists.tox.chat/pipermail/bootstrap/),
|
and post it along with your node's public key to the
|
||||||
along with your node's public key.
|
[mailinglist](https://lists.tox.chat/pipermail/bootstrap/).
|
||||||
|
|
||||||
You can also add this pair to the onions slot in your entry in the
|
You can also add this pair to the onions slot in your entry in the
|
||||||
DHTnodes.json file. If there is not an onions slot, create one.
|
DHTnodes.json file. If there is not an onions slot, create one.
|
||||||
@ -55,3 +55,4 @@ DHTnodes.json file. If there is not an onions slot, create one.
|
|||||||
Details:
|
Details:
|
||||||
* https://git.plastiras.org/emdee/tox_profile/ToxAndTorInChinaAndIran
|
* https://git.plastiras.org/emdee/tox_profile/ToxAndTorInChinaAndIran
|
||||||
* https://community.torproject.org/onion-services/setup/
|
* https://community.torproject.org/onion-services/setup/
|
||||||
|
* https://community.torproject.org/onion-services/
|
||||||
|
Loading…
Reference in New Issue
Block a user