On Tue, 2011-08-16 at 16:14 -0400, andrew@xxxxxxxxxxxxxx wrote: > On Tue, Aug 16, 2011 at 11:38:35AM -0400, tedks@xxxxxxxxxx wrote 2.6K bytes in 68 lines about: > : Is there a reason for doing this over a hidden service instead of just > : Tor? I use a hidden service to check if my home server is reachable, but > : if I'm on a network I don't trust (which is most of them) I just connect > : to things through Tor. > > I do this because I don't want to have to trust the exit node, the isp > of the exit node, and the networks between the exit node and the > destination. I use tor for lots of stuff, banking, general browsing, > etc. But checking my email, ssh access, and such I do via hidden service > so, in theory, no one knows what I'm doing. > > For clarity, every server I access has a hidden service setup in torrc, > like so: > > HiddenServiceDir /usr/local/var/lib/tor/hidden/ssh/ > HiddenServicePort 22 127.0.0.1:22 > > HiddenServiceDir /usr/local/var/lib/tor/hidden/web/ > HiddenServicePort 80 127.0.0.1:80 > > HiddenServiceDir /usr/local/var/lib/tor/hidden/imaps/ > HiddenServicePort 995 127.0.0.1:995 > > and so on for each different service. > > Some hosts have 10 different hidden services on them. I've been doing > this for years. It lets me keep a simple deny all incoming firewall, and > not have to worry about NAT and such. Hidden services just work and are > globally accessible. > Is there a reason why you use a different service for each port, instead of having them all on one service?
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk