[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Hidden Service Hosting (Free experimental, offer)
I am using another way to solve IP leaks problem.
my host-os is CentOS and only installed VirtualBox
I have 2 virtual machines running on the host-os
the first one is a CentOS with 2 network adapter, one is NAT , another is
Internal(ip: 192.168.222.1).
it running Tor and ShadowSocks(bypass GFW) , Tor through ShadowSocks and
listen on 192.168.222.1:9050 (Internal Adapter)
Another is also CentOS and running apache, only one network
adapter(Internal ip:192.168.222.2)
when this virutal machine wants to access internet , must set socks5 proxy
to 192.168.222.1:9050
so even this VM gets hacked, the attacker still can't know the real IP....
2015-01-03 6:21 GMT+08:00 Larry Brandt <lbrandt@xxxxxxx>:
> I'm interested but a slow mover. Work sometimes gets in my way. I am
> putting together pages for a hidden site but I don't think I can be ready
> to put it on line til month's end. It will be a legal site everywhere.
> This is a wonderful offer Thomas. Hope someone takes you up on it.
> Larry Brandt
>
>
> Just wanted to point out that I think it's awesome Thomas is doing this!
> Buy him a beer if you see him.
>
> Tom
>
>
>
> Thomas White schreef op 02/01/15 om 09:42:
>
> Hey all,
>>
>> So following my other mail, I just want to offer people on this
>> mailing list a chance to test something out before I go into the wider
>> public with it.
>>
>> I have been reviewing some ways in which to offer "hosting" solutions
>> for hidden services, and although there are ways to do like regular
>> shared hosting environments by isolating users on an apache server for
>> example, I feel a little experimental way to give people more freedom
>> is to assign individual VPS's which are accessed via a separate .onion
>> over SSH. For example, the HS address would be example1*.onion but to
>> SSH into it, for security, would use a different address such as
>> sshaddress*.onion. This ensures no user of the service would know the
>> true IP of the server it is hosted on and allows for shared
>> environments without putting others at risk.
>>
>> If anyone wants to test this out with me, I am offering the VPS for
>> free for a few weeks/months so I can get the architecture right and
>> fine tune the setup. All the traffic on the VPS is automatically
>> routed through Tor so IP leaks won't be a huge problem, but of course
>> you still maintain responsibility for the security of your machine and
>> whatever you install on it. The use cases are unlimited but for
>> obvious reasons it must be legal under British & Swedish law (feel
>> free to ask beforehand but if it is legal I will defend it to the best
>> of my ability).
>>
>> If you'd like to take up this offer and try it out please email me
>> privately (my key is below). I ask that if you wish to request one,
>> please mention anything specific like RAM/CPU/Hard disk requirements
>> (no bandwidth limitations) so I can appropriately assign them. For now
>> unfortunately only debian installs will be available and nothing
>> except sshd will come preconfigured on the VPS so if you aren't
>> familiar with the command line on debian you may not find this useful.
>> Also any custom onion address you want please keep it to 7 characters
>> or below for now as my GPU is really on it's last limb after
>> generating over 1.4 million keys.
>>
>> I offer no guarantees on the availability of this, nor do I take
>> responsibility for it, this is an entirely experimental project and I
>> am hoping any participants take up this offer to perhaps
>> mirror/reverse proxy their blogs, or of course bring any interesting
>> ideas to the table. All feedback on it is welcome too
>>
>> Time to give these hidden services some lovin'
>>
>> Regards,
>> T
>>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk