[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] What hidden services does my relay node know about?
- To: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-dev] What hidden services does my relay node know about?
- From: Matt Traudt <pastly@xxxxxxxxxxxxxx>
- Date: Mon, 29 Jul 2019 11:19:03 -0400
- Autocrypt: addr=pastly@xxxxxxxxxxxxxx; prefer-encrypt=mutual; keydata= mQINBFYSsCYBEACtCAyNCpmHR4A3L4AWF9UbhZDu76D3LxZHSuPkCWOI++7Lm1SZ0QTuDsd0 ncp6qmzx56wbL9rmRwgNHFCPxlEv1zHmGDoGS/h1CVLsOXpEKqmyyCysYygp+Fc6N5aXIlCm lBj4xEnjz3aSdA0T6RAUOJRLDvmH0hs3guPsJ5Ic12+WekkgqXrNPKoI8PEa1MVFB8RT/49+ SZp28zTk951LXFy2Gte+r/FmNIoKCgMvyBJ5y+vRDIERZhA3S/U9w66zflpBhSRco9VG2fZX Pe2Y5OiC9sLJoHHce7QLIsMbepzGDWIDyIkveMDHPByJL2i3+ajQvv4mRl/WFOUXQJ+HgtA4 o7ul8KSPghmkXJBPTc1nb4U6yPE+cJgx1PhAkc6pcHOo3bf9tnozr4IdkiG/1bvInLqTqm30 nJOloNLVLt6WhhWEt9tUJrcXMSZwhuABgxzz+HvvE19XFzvCCm9xU0dh2kgQ2PAnmK8QsH4b h2M9bkH+WEgMZdh4tNcJdj4UtH/OL8R22+E198lq4C9SMj5DEocllshIVpXRJb2wz91rgP+t dYfjGV/nlnQDKCK1S/+rjSnu4Li3dzTrcNS2rewlVuyUeM5gCnmp6vVZh9xiF/HvYPhKr68J heuo7mq9EJeeuMOcedf5d/zC5fNcdmalYbM8Ow5BT0ZLveIzuQARAQABtCNNYXR0IFRyYXVk dCA8cGFzdGx5QHRvcnByb2plY3Qub3JnPokCVAQTAQgAPhYhBLfhBfxObZN3+Jy6TIO8qVKU +7sKBQJaNsqdAhsDBQkJZgGABQsJCAcCBhUICQoLAgQWAgMBAh4BAheAAAoJEIO8qVKU+7sK AzIP/RQyFjvD7r3AldeH67uEkmGdbkKNYv5I/pO6p8KZTY0SORu+bYP00EcpnprWADmZabCY /JvsMvAVsyZ8g+NKL/EzanBu/xW/A8BoMDYs3WkXLGJJA1A6sPS7kijQtnubD0K/quVGQ48G NMTZz2oNcjsWvKk0pFsF9e68h0coRRTyDC0jLTIZlIDkuqgEfwwlMxsyDT8G5Rit2YWTT+7+ /HuRXcAvI13U9F0LypwgfZVpeLMBXwNf3K6mK07lLKrld8tWHlvYQoBlfqtm+Sz6jNJI+bNg k+UIMrts/BB2G5S/xvNTro0wXNG9aeDX7pbQsnnIzSfDMfAyAEP3IDMPNuN3FodlstVgrJlG 9Py90mNaG9h5ihm09+xZXtlCdtqUXQv6rAqj3y+h2HMmUNfJ/X/MCvTY8pGksqGPdlI/DS7b PTw9DCElsBaDSmjpwvKxFfGkSzarRmlvG9dB920zrDTkJByAWS9JO89xjHD7K06bnzTwfMBc SVaddrCBP5JUY1KlRGi07iKU7HJF9kLMdM+7Umnd1+orCFJiLra4/yL1soAqwXhbzR8rk4Du ziAfCbUmPBSD/yjujsQOj9W2whgBCjq1rJh9lF+V/31ihVCY47uxO6TTcfueaquIbPaOuFq2 Q5nMOcXeTo3Lfpy/Ksfmp+gGo/LNs/0O5TeJ1GXcuQINBFYSsCYBEACqS7ebFvWcarIc2pAb BFAcgdZvS5uHCV4eq23adCQbg1xBMNXDVzq7WU2jc7Cu0HwPJ9OoUUcPuf/EgwiF+a0A/IrZ C2zjVyzvdLZ7+MqPje8ff2/HjxZs7G5Ss1auISFqOO67wPh4jRcy/M91U+JBgFZH2SAsDNgc GxK2T6nFWiEXd8Y+ntEUJhXsMrakq+opidtYMRkK5PxW3InQFP9y52SXR77S5jzmpZc0pVg+ e4Euletz26yGTM2piwd4jbY0rM34oeHNN8w2MEo0krYla7NhK3dmAKoHu7kSUymp//KdJi6R dO7P0meBS4HS+sapQUJz+pQf+4yuHJFPyAVFDXbkJg+QCZhENuq4zmJPi8g/4V/E9K1NrL8d NxhWwQ43ZeS33Ts6FAFAPhdde3QVSa59u/tKF4sqMAlitzypRobVJmjnok87jMVxislfiZL3 LbZUTV2jxMwEXdRzNsyKUoAfVOc2ePFfFwsv7lNK9ED0vdOoStOzpRGRgb0AFOJAjALQhUS3 3ORQSeIvYze1KIf9wX3VGXIIq4mXY7k02Xv2tFpefu03fd1jcCbWnz7N+HvM7xiV4+hCTaaA ZQ78t4PuMPr0Rq7jCWP8ft4CDI+xQaaqfTmdbxezx9oVpwT6AbAgOAkaiY3UY6zXUtN7vez+ SGxiVYf84XUsMWUPAQARAQABiQIlBBgBAgAPBQJWErAmAhsMBQkJZgGAAAoJEIO8qVKU+7sK 888P/21HChE8q1LTfD6SgMiJmiTLTzL6Pg5D9urPRY3qn2DEo4oB8jIfwlvnbWvviC2fAC9/ 1dgILONvNQCRhI72sHdffBLjE+aV1Wu/HR6KEk26gN0J6QqJwxzrcycrBK/BXbSlv/VoUNZl kdlcUXNT7g5dTIC+bcRRjb5Rjv/L8yRh0ygyMOjTjwBvZT4AUUL8/Wo6IdcqkR4xHpsiZ7nX 4BztwEMmK5KmetfL6dlm8qLodrEAroeRN4CV+JjoeF5D3nOM/7MCAlu0KLj1Y92RAhCL5ycb qvyBXb0yiM0A3kWZouhMzyJDZTIV3rUered5+t8KWL+KNaO2goC0N/zHFx/GA5AOI74bWdKI S0Yuq3z56lEXJX5vuHEWl+yDc53zlc2lHa+DQLKacnhbj4ln9GRKvWE/bn5M4j+tkL0Sy5Qc 9GSJXDcJ/f7/YGadxuhFmJ4xymtHkfE9v4U7dbpr6sVkpa6jE1JqwYbKuEPsGDschFmdsAz5 1vlAsZydDHrPMoWOwvimN2OFjoi5gp26f0a+69nR1EezkCGR1el41jyf+230m82W2NnbQBGV 9I3/fmms6sUaNzmqu0pAKNwKAV2Gu+X2YN0kj3IW1ZlihdRr4QBFTh3YxC/YaeA8f1p5KH/I xGB5mjkyqzrgez8ZRgidcaduTIwqPDWw4BX0IXEc
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Mon, 29 Jul 2019 11:19:20 -0400
- In-reply-to: <LkyGns7--N-1@tutanota.com>
- List-archive: <http://lists.torproject.org/pipermail/tor-dev/>
- List-help: <mailto:tor-dev-request@lists.torproject.org?subject=help>
- List-id: discussion regarding Tor development <tor-dev.lists.torproject.org>
- List-post: <mailto:tor-dev@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- References: <LkxXwdd--3-1@tutanota.com> <d7e58891-71cc-59b8-ddb7-f80b35f7956a@torproject.org> <d4de426e-a3f9-1e9b-9b01-2309039cbf85@torproject.org> <LkyGns7--N-1@tutanota.com>
- Reply-to: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-dev" <tor-dev-bounces@xxxxxxxxxxxxxxxxxxxx>
On 7/29/19 11:09, clive.jenson@xxxxxxxxxxxx wrote:
>
> Onion services will use your relay to store descriptors once it
> has the
> HSDir flag.
>
> https://metrics.torproject.org/rs.html#details/ED279FC87D17921131CB629BA1D4E6B0F8C00BF8)
>
>
> Is the HSDir flag the same as V2Dir, or something different? You
> correctly identified my relay. I see it is a V2Dir but do not know how
> to determine if it is a HSDir.
HSDir is different than V2Dir. You'll get the HSDir flag and see it on
Relay Search when you've earned it.
Ctrl-f in this document to learn more about possible flags and their
requirements. https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt
"HSDir" -- A router is a v2 hidden service directory if it stores and
serves v2 hidden service descriptors, has the Stable and Fast flag, and
the authority believes that it's been up for at least 96 hours (or the
current value of MinUptimeHidServDirectoryV2).
>
> You can't determine which onion services or how many onion
> services are using you without code changes.
>
> Doing this is considered being a malicious relay and will get
> your relay
> removed from the Tor network.
>
> If this question came up and was sent to tor-dev@ because you intend to
> perform research: it may be prudent to stop what you're doing and
> content the Research Safety Board.
>
> https://research.torproject.org/safetyboard/
>
> I'm just a curious user, this is not part of a formal research project.
> Is there a public tor testnet that I could have joined my node to for
> this sort of experimentation (I don't have the resources to build my
> own)? I can understand why you don't want production nodes logging data
> that could potentially cause harm to other network users, but also do
> not think curious users should be discouraged from poking around in the
> code.
>
There's no public Tor testnet, but you can easily run your own on your
own machine with Chutney[0] (easy, but less powerful) or Shadow[1]
(harder, but very powerful). Chutney is more than enough for what it
sounds like you want to do.
I did not mean to suggest curious users should not poke around code
**safely**. Go for it. Learn a lot. And maybe even find a bug and
contribute a fix? ;)
Hope that helps.
Matt
[0]: https://gitweb.torproject.org/chutney.git
[1]: https://github.com/shadow/shadow
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev