Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Privacy: tor ephemeral hidden services #25

Open
fireduck64 opened this issue Jan 16, 2020 · 1 comment
Open

Privacy: tor ephemeral hidden services #25

fireduck64 opened this issue Jan 16, 2020 · 1 comment

Comments

@fireduck64
Copy link
Member

For outbound connections, using tor is relatively easy:
Make sure to use tor socks5 proxy (with dns from socks)

For inbound on static hidden services it is easy:
Answer on the port, let tor bring the traffic in. Set the hostname in the config.

Tor also supports making ephemeral hidden services, which is what most nodes will want to use. Easier on sys admin, and changes as people restart which is always fun. However, to use them I think we will need to have something talk to tor service control port.

But maybe the socks5 open a listen thing can do it? Not sure.

Needs to be investigated.

@fireduck64
Copy link
Member Author

https://git.torproject.org/torspec.git

Reading socks-extensions.txt, tor doesn't support socks5 bind, so will have to use the control interface.

Control interface seems to be defined in control-spec.txt

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant