home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 110,361 of 112,125   
   D to karl@bogus.net   
   Re: Question about Tor and it's 'onion'    
   11 Jul 24 00:48:39   
   
   [continued from previous message]   
      
   >To protect Tor's control port from unauthorized access there are   
   >two authentication methods, both supported by OmniMix. Switching   
   >between them requires editing the 'torrc' configuration file   
   >manually.   
   >If you intend to control Tor from different computers, 'Password'   
   >authentication would be the right choice. At the 'ConTor' tab   
   >select 'Password' authentication and enter your password, e.g.   
   >'my_password'. Be aware, that leading and trailing spaces are   
   >relevant! Then at the command prompt within the Tor directory   
   >calculate the hash value for the chosen password with the command   
   >g:\Programs\OmniMix\tor>tor --hash-password my_password   
   >Oct 06 22:36:45.707 [notice] Tor v0.1.1.23. This is experimental   
   >software. Do not rely on it for strong anonymity.   
   >16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31   
   >Finally, to enable Tor to check, whether the sent password is   
   >correct, add the 'HashedControlPassword' option with the   
   >resulting hash code to the 'torrc' file   
   >HashedControlPassword   
   >16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31   
   >The alternative to a constant password would be the 'Cookie'   
   >authentication method, where at each launch Tor generates a file   
   >named 'control_auth_cookie' anew within its data directory   
   >containing 32 random bytes. Those bytes then have to be read by   
   >the controller application in order to use them for   
   >authentication. That's why apart from the activation of that   
   >method by adding   
   >CookieAuthentication 1   
   >to the 'torrc' file, the location of this file has to be set by   
   >means of the 'Cookie' file selector.   
   >Cookie authentication, which usually is limited to local   
   >controllers, as it requires access to a file in Tor's data   
   >folder, is the default method when using the OmniMix system's   
   >Tor instance.   
   >There are further torrc parameters relevant for anonymity   
   >reasons:   
   >*MaxCircuitDirtiness  defines for how long (in seconds) Tor   
   >                      continues reusing a circuit for new   
   >                      connections.   
   >                      'MaxCircuitDirtiness 0' makes Tor set   
   >                      up a new route for every connection   
   >                      request.   
   >*NewCircuitPeriod     determines how often (in seconds) Tor   
   >                      retries making new circuits if current   
   >                      ones are dirty, which means already used.   
   >At the 'Command' tab you find all instruments to influence a running   
   >Tor instance, but for sending commands a connection to the control   
   >port of the respective Tor instance has to be established.   
   >At the 'Events' list select the data you want to be logged at the 'Tor'   
   >tab. If you're connected press 'Set' to transfer the new settings to   
   >Tor. With 'Off' no more data are listed. That's advisable in particular   
   >for the period you request certain data from Tor by selecting an item   
   >from the dropdown list and pressing the 'Info' button. Otherwise you'd   
   >get a mixture of Tor events and the specific data you requested.   
   >Once connected   
   >*Info    requests the information specified by the pulldown menu   
   >         adjacent to it.   
   >*NewNym  initiates the switch to a clean server circuit. This is a   
   >         secure way to use separate Tor circuits for different jobs   
   >         that are done one after another.   
   >The available 'Info' data are   
   >*Version           The version of the server's software, including the   
   >                   name of the software.   
   >*Config location   The path to Tor's configuration file 'torrc' on your   
   >                   disc.   
   >*Network Status    A short space-separated listing of all router   
   >                   identities.   
   >*Known Routers     A detailed listing of all routers known to Tor and   
   >                   their characteristics.   
   >*IP Address        The best guess at our external IP address.   
   >*Circuit Status    Information about the circuits built.   
   >*Stream Status     Information about the stream status.   
   >*Connection Status Information about the onion routing connection   
   >                   status.   
   >*Entry Guards      Listing of the currently chosen entry guards.   
   >A smart way to access the OmniMix system at home from throughout the   
   >Internet are Tor Hidden Services. You don't have to know the server's   
   >IP address and the communication is completely hidden and end-to-end   
   >encrypted, as it never leaves the Tor network.   
   >The 'Hidden' tab allows to attach four local server ports, which don't   
   >necessarily have to be offered by OmniMix, to the Tor network, making   
   >them available from the Internet.   
   >For each of the local services you intend to offer you just have to   
   >check the 'Active' box, enter the port number under which it has to be   
   >accessed from the Internet at 'Port Ext', the local IP address of your   
   >service at 'Address Int' and its local port number at 'Port Int'. To   
   >install the Hidden Service Tor finally has to be restarted. It now   
   >initializes the Hidden Service by creating an encryption key associated   
   >with a random .onion address, the future address of your Hidden Service.   
   >These credentials are stored in the files 'hostname' and 'private_key',   
   >located in the folder defined in the 'Hidden Svc Dir' field. You may   
   >backup them in a safe place.   
   >Instead of reading your Hidden Service's .onion address directly from   
   >the 'hostname' file you can also get it from the 'Data' tab. With a   
   >click on 'Update' OmniMix not only requests the Hidden Service's address,   
   >which you can copy to the clipboard by using the '*' button. It also   
   >tries to retrieve Tor's current SOCKS and control port number as well as,   
   >if available, the WAN IP address of Tor's host computer. By the way, the   
   >latter offers OmniMix a great opportunity to replace external DDNS   
   >services, which is explained in the 'TorIP' chapter.   
   >If you want to change the .onion address because you don't like the   
   >randomly created term, or you need a new one for a different task, press   
   >the '-' button next to the 'HS Address' field and restart Tor. But keep   
   >in mind, only backing up the files 'hostname' and 'private_key' from the   
   >Hidden Service directory before they are removed with a reset allows you   
   >to reactivate the old address some day.   
   [end quote]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca