[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: First Vidalia Prototype including User Authorization on Hidden Services
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: First Vidalia Prototype including User Authorization on Hidden Services
- From: Ringo Kamens <2600denver@xxxxxxxxx>
- Date: Mon, 07 Jul 2008 18:28:52 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 07 Jul 2008 18:29:02 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:subject:references:in-reply-to :x-enigmail-version:content-type:content-transfer-encoding; bh=NKJfRKaNUY6CkoCYcRy6yX12cksTlKw6tePI6Z9mcJA=; b=XLoYucQvzCBf6xZpRi0Lzh/Nkfa/7vwClNwMvJ6xrcVok2uMuBRXesSh/101iqq5Ej mt+MJ11ONDUyKAwwokKUZWYSloGEDkq1z3jPwhhw9pIf37f94qIxj+KeY8hDQA7Qa9qF 7+S3KlfHjBQrGi35Fxe8hJJwPeLsyZ/ITpwQQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; b=IHxFHntMRgvFGg/F35DyqDHOrQNKEqKUC35PIhwC57wg7nG/cKnCMN1Gf6S0zyqN7e S21L1++xr6T8fVG3TZPhT3FI3CeypALv6C0ldBipQzWJKeWmraEdd24AePiyCkT8R3Ki R3oZyrw4O8yfEprN7+Rpf6U4le6BGfR4XwuHI=
- In-reply-to: <FBFE41C2-818B-48A1-B781-7A9A9C45D090@xxxxxx>
- References: <FBFE41C2-818B-48A1-B781-7A9A9C45D090@xxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.14 (X11/20080502)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This looks really cool, thanks for all of your hard work!
Comrade Ringo Kamens
Domenik Bork wrote:
> Hey list,
>
> a few of you may know me from IRC, ohers may not. I'm one of this years
> Google Summer of Code students. My project is about implementing Vidalia
> support for Hidden Services with User Authorization, according to the
> Tor proposal 121-hs-authorization of Karsten Loesing.
> A Hidden Service is a service that is reachable by a .onion adress, but
> the IP-Adress of the service provider is hidden. My goal is now to let
> Vidalia configure those Hidden Services, give a Service provider the
> possibility to create User Authorization data(.onion adress and a
> descriptor cookie) for each user he wants to access the service.
> Additionally there should be the option to store authorization data
> needed to access other hidden services in Vidalia. So a Service Provider
> has then the opportunity to create individual authorization data for
> single users and it would be no problem to exclude users from a service
> if he wants to let them no longer access the service.
>
> As a few of you may have noticed I uploaded the first prototype of my
> Google Summer of Code Project. This prototype includes the complete
> functionality explained above with all the communication to/from Tor as
> well as persistent storage of the configuration.
>
> Within this Mail I give you a little How2 for the installation of my
> Vidalia branch and the correct Tor branch you need to run it with User
> Authorization.
>
> Here starts the little installation help:
>
> Tor related:
> 1)Download the newest version of Karstens Tor branch (svn co
> https://tor-svn.freehaven.net/svn/tor/branches/121-hs-authorization/)
> 2)start a terminal and switch into the directory of 121-hs-authorization
> 3)type in the following command lines
> 1. ./autogen.sh [Enter]
> 2. ./configure [Enter]
> 3. make
> 4) if everything worked fine there shoul be the Tor binary in
> /121-hs-authorization/src/or/
>
> Vidalia related:
> 1)Download the newest branch of my Vidalia branch (svn co
> https://svn.vidalia-project.net/svn/vidalia/branches/hidden-services)
> 2)start a terminal and switch into the directory of hidden-services branch
> 3)type in the following command lines
> 1. cmake . && make [Enter]
> 4)if everything worked fine there should be a Vidalia binary in
> hidden-services/src/vidalia/
> 5)click on the binary to start Vidalia
> 6)click on settings and then on „General“ to configure the path to the
> Tor executable in that way that it points to the 121-hs-authorization
> version
> 7)click on „Save“
> 8)click on „Stop Tor“
> 9)click on „Start Tor“
> 10)now the new Tor version should be started and you can start
> configuring Hidden Services with/without User Authorization etc by
> clicking on „Settings“ and then „Services“.
>
> Possible configurations of Hidden Services:
> • normal Hidden Service with one single adress for all users
> • Hidden Service with User Authorization to easily include/exclude
> single users while the service is still reachable with the „old“ adress
> by other users who are configured.
> • Store the Authorization Data you need to access Hidden Services.
>
> I would really appreciate it if I can find a few people who are
> interested in testing it and giving me some feedback or/and bug reports.
> Remember, this is just the first prototype and there are bugs and things
> i'm going to change in the next weeks. So this test phase is thought to
> give some feedback about the look and feel, whether the communication
> to/from Tor works as it should etc.. GUI stuff.
>
> Best regards,
>
> - --Domenik
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIcpikmBTzXUpNYqQRAln2AKCSV53gheuM6er7HM1QFOaw+nOx1gCeMwNq
9U0pUtWopElyVKUFrAnmYR8=
=JEOa
-----END PGP SIGNATURE-----