[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Rendezvous points are implemented: please test them
- To: or-dev@freehaven.net
- Subject: Rendezvous points are implemented: please test them
- From: Roger Dingledine <arma@mit.edu>
- Date: Thu, 8 Apr 2004 06:31:54 -0400
- Delivered-to: archiver@seul.org
- Delivered-to: or-dev-outgoing@seul.org
- Delivered-to: or-dev@seul.org
- Delivery-date: Thu, 08 Apr 2004 06:32:21 -0400
- Reply-to: or-dev@freehaven.net
- Sender: owner-or-dev@freehaven.net
- User-agent: Mutt/1.2.5.1i
We have implemented hidden services in Tor. For example, you can run
a web server without revealing your IP. There are bound to be bugs;
please let us know.
tarball: http://freehaven.net/tor/dist/tor-0.0.6pre1.tar.gz
signature: http://freehaven.net/tor/dist/tor-0.0.6pre1.tar.gz.asc
Go to the url http://550w0rfobvomsywe.onion/ to see a sample website.
(Obviously, this only works through Tor. You also need a socks4a proxy
such as Privoxy.)
If you want to offer your own hidden service: (from the README)
Copy torrc.sample to torrc, and edit the bottom part. Then run Tor. It
will create each HiddenServiceDir you have configured, and it will
create a 'hostname' file which specifies the url (xyz.onion) for that
service. You can tell people the url, and they can connect to it via
their Tor proxy.
I'll put a wiki up at some point (as a hidden service, of course), so
people can have a repository index for listing services that people are
offering. If you have a very stable connection, please feel free to set
this up first. :)
Please report bugs, etc. We still have some more functionality we want
to add, but things should be usable now.
Thanks,
--Roger