[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] How to protect apache local-restricted from secret service access?
On 02/04/2015 08:19 AM, contact_tor@xxxxxxxxxx wrote:
> Hi
>
> When you have a website that is available from a tor secret service, how
> do you forbid access to url restricted to ip=localhost?
>
> I'm thinking of apache default http://xxxxx.onion/server-status for example.
>
> Using "a2dismod status" is the obvious solution for that one, but does
> anyone had a more generic solution?
> Maybe a full VM with a vif interface? That's an heavy solution...
> Anything more simple?
You can use firewall rules.
> The web site I'm thinking about has a public address, nothing to hide,
> and the .onion address is only there to protect the users. But I'd
> rather not introduce too many security issues...
Running hidden services and non-Tor websites on the same server is
generally considered bad practice.
> (BTW, a warning about these issues on
> https://www.torproject.org/docs/tor-hidden-service.html would be nice)
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk