[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #29863 [Obfuscation/Snowflake]: Add disk space monitoring for snowflake infrastructure
#29863: Add disk space monitoring for snowflake infrastructure
-----------------------------------+------------------------------
Reporter: cohosh | Owner: (none)
Type: task | Status: needs_review
Priority: Medium | Milestone:
Component: Obfuscation/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: snowflake | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor: Sponsor19
-----------------------------------+------------------------------
Comment (by dcf):
Replying to [comment:12 anarcat]:
> it would be quite annoying, to say the least, to wrap probes in tor - i
don't actually know if we could do that.
The way this would work is we would give you an onion name and an auth
cookie. You put those in [https://www.torproject.org/docs/tor-
manual#HidServAuth HidServAuth] in torrc as
{{{
HidServAuth xxxxxxxxxxxxxxxx.onion authcookieauthcookie
}}}
Then, instead of configuring prometheus to fetch from
!http://snowflake.bamsoftware.com:9100/, you configure it to fetch from
!http://xxxxxxxxxxxxxxxx.onion:9100/ with a `proxy_url` of
!socks5://127.0.0.1:9050/.
On the server side, we would add [https://www.torproject.org/docs/tor-
manual#HiddenServiceAuthorizeClient HiddenServiceAuthorizeClient] to
torrc:
{{{
HiddenServiceDir /var/lib/tor/prometheus_node_exporter
HiddenServicePort 9100 127.0.0.1:9100
HiddenServiceAuthorizeClient basic prometheus
}}}
and then get the auth cookie from
/var/lib/tor/prometheus_node_exporter/hostname.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/29863#comment:16>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs