On Wed, 2015-02-18 at 14:12 +0000, blobby@xxxxxxxxxxxxxxx wrote: > At the same time, perhaps I'm wrong and it's easy to set-up a hidden > server to look for SSH connections? Perhaps I'm assuming that things are > harder than they are in order to persuade myself not to learn. I'm also > "time poor" at the moment which doesn't help! Step 1: Install Tor ('apt-get install tor' on Debian) Step 2: Create a directory where the HS data will be stored ('mkdir /var/lib/tor/ssh-hs && chown debian-tor.debian-tor /var/lib/tor/ssh-hs' on Debian, as root) Step 3: Add the following lines to the Tor configuration file: (/etc/tor/torrc on Debian): HiddenServiceDir /var/lib/tor/ssh-hs/ HiddenServicePort 22 127.0.0.1:22 Step 4: Make Tor reload its configuration file ('service tor reload') or simply restart Tor ('service tor restart'). Step 5: Read the hidden service address from /var/lib/tor/ssh-hs/hostname, write it down somewhere. Once Tor has had a couple of minutes to get the service descriptor onto the network, try to connect ('usewithtor ssh your_hs_address.onion'). It's definitely not more complicated than setting up a VPN or much more complicated than using SSH in general. --ll
Attachment:
signature.asc
Description: This is a digitally signed message part
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk