[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Securing a hidden service
> I'm trying to make my hidden service more secure. It runs on a server
> running Ubuntu 12.04.1 LTS server version. I have set up full disk
FDE is nice, but only helps once it's too late. Once someone physically
obtained the disk and being unable to force you to reveal the password.
> and a basic firewall but I want to do more. If an attacker
> managed to compromise nginx or apache (whichever I decide to use), is there
> a way I can prevent the web server from sending any data outside of the Tor
> network? An apparmor profile or something?
Yes. Isolating proxy.
My project Whonix is exactly about this topic. Feel free to learn from
the concept, design, source code (configuration files), build it from
source or use the download version.
Physical Isolation. (Tor-Gateway runs on a second piece of hardware.
Server can only connect through the Gateway.)
If you understand Physical Isolation, it is the most safe Tor
configuration. Whonix documentation also gives you a lot inspiration to
further improve security. You could end up with hardened gentoo etc. etc...
tor-talk mailing list